Terrorist Attack Case Study

Superior Essays
Terrorist attack, a surprise attack involving the deliberate use of violence against civilians in the hope of attaining political or religious aims. In the year 2015 there has been 355 terrorist attacks across the world. The 355th one being in San Bernandino, California on December 2, 2015. A man and his wife proposed this attack with strict intentions of killing many civilians with a mass shooting and an attempted bombing. The attackers had an IPhone that the FBI believes should be unlocked because it may be storing information valuable to investigators. However, the phone is locked by sophisticated encryption software that Apple is refusing to remove due to many reasons. Apple agreeing to unlock the IPhone would help the FBI get leads on the …show more content…
The attack was not expected and took everyone by surprise. So many people were killed as well as injured. Families were not expecting to lose their loved ones so soon due to terrorism. Terrorist attacks period are so unexpected and you just never know when you could be a possible victim. Apple should unlock the iPhone no matter their reasoning not to. Families of the people who were killed need answers, as well as the rest of the world. If this is the way to get them then shouldn’t they be doing everything in their power to get the answers? Stephan Larson, a lawyer representing some of the victims, said that his clients had an interest in the contents of the terrorist phone. They were targeted by terrorist Larson said and they need to know how and why this had happen. (McCormick) Some of the victims families spoke on the issue to the public expressing how they feel. One of the victims fathers said, “This makes me a little angry with Apple, it makes me question there interest in the safety of this country.” The Victims of the December terrorist shooting are owed a full and thorough

Related Documents

  • Improved Essays

    The San Bernardino shooting was a tragic event. A cell phone recovered after the shooting has been collected as evidence. Law enforcement believes that unlocking the phone which is an iPhone would help them learn more about the attack and plans. They also believe that this would allow them to intercept future attacks and protect innocent people. Guessing the code incorrectly ten times is believed to erase the data on the phone (Lichtblau).…

    • 571 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Terrorism has been a threat to mankind, since many years. So, unlocking Farooq’s iPhone might definitely help the FBI team, to solve the Farooq’s case to some extent, in finding the true culprits responsible for the slaughter, at San Bernandino. 2. Unlocking an iPhone, which no one ever thought could be unlocked, could be considered another advancement in science. 3.…

    • 701 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    And my evidence is that only about 51% say that is should be unlocked and about 39% people say that they should not unlocked the phone. But the Apple company is like they should not give the software to the FBI but if they lose the case they will have to unlock the phone. But then the Apple company is have trouble with the FBI but the Apple company has some rules so that they will not unlock the phone. I wonder if the Apple company will still make a updated phone so that the FBI will not get in people phone any more. But I hope the FBI will leave the Apple compon alone and just find some hacker to open it.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    14 citizens were killed due to the shooting, yet Apple wouldn’t decide to help the FBI. Apple is looked at as a bully, and denying the request from the FBI has started a small war about human rights. People only fear that creating a method to obtain data would fall into the wrong hands, however, with highly specialized encryption every phone user could become a potential threat. We pledge allegiance to our country for security, and honor a code to help the government protect the people. With the FBI being professional, Apple could develop a technique that could be shared to enhance personal security while balancing private security.…

    • 1810 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    James Comey, the FBI director, discussed that this problem should not be solved by a company that sells phones or by an agency that protects citizens but rather by the people their trying to protect. It should be up to the American people to choose what means more to them, security or privacy (Willens, 6). On the contrary, Apple believes that creating a back door could potentially cause the FBI to use that backdoor for evil. They would be allowed into anyone’s iPhone whether they were allowed to or not. Also, they could allow spyware onto users phones at any time.…

    • 932 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Pandora’s Box of Cyberspace In December of 2015, a man in San Bernardino walked into his place of work, the Department of Health during a holiday party and opened fire, left, and then returned again killing a total of 14 people and injuring 21 people. It was highly speculated that this man was a terrorist linked to a radical organization and was possibly planning multiple attacks following the shooting in December. Law enforcement officers believed the information about these future attacks and his correspondence with the radical organization was stored in his iPhone 5c. The FBI wanted Apple to make it easier for them to guess the 4 or 6-digit password without having to worry about the phone wiping away the information. The FBI issued…

    • 1293 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The FBI operates so they can get whatever they need from a company, whether it 's an encryption key or any additional needed information, they fail to keep in mind that these demands will deteriorate a majority of these companies customer’s privacy. In addition, the FBI has seemingly been aware that any backdoor operating system created would not only operate for this particular suspect 's IPhone. Source D, states “ Once created(backdoor operating system), the technique could be used over and over again, on any number of devices.”this means that once he FBI obtains this new IOS system, they would not have to ask for it again in another situation similar to…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    government”Points in Cook’s open letter to Apple’s customer in response to the court order for the iPhone– While overlapping with the points discussed previously, Cook’s letter and the key points expressed from Apple’s perspective well illustrate Cook’s dilemmas (Jayakumar & Tahora, 2016):oThe U.S. government demanded Apple to create the backdoor to the iPhone the company didn’t have or considered too dangerous to create (as cited in Jayakumar & Tahora, 2016). This touches the dilemma Cook had between customer privacy or national security.oThe software the FBI wanted Apple to create for the terrorist’s iPhone had the potential to unlock any iPhone regardless of possession (as cited in Jayakumar & Tahora, 2016). This puts Cook in such dilemma that even international terror groups can exploit the U.S. government’s classified information. oThere was no guarantee that the use of the backdoor would be limited to the San Bernardino case (as cited in Jayakumar & Tahora, 2016). This presented another dilemma for Cook because this might open the flood gate.oBuilding the backdoor defeated the purpose of encryption (as cited in Jayakumar & Tahora, 2016).…

    • 1814 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    The cellular devices have many capabilities such as SIRI, and they are also known for their tight security. Therefore, protecting the privacy of their consumers is vital for this company because once a Apple product is lost or stolen, it then becomes useless for the abductors. However, the Federal Department of Investigation thinks indifferent because according to Greg Keizer “Essentially, what the FBI has asked Apple to do -- with a federal magistrate 's concurrence -- was to make it possible for investigators to brute-force the passcode on the iPhone 5C by subverting iOS 's limitations on entering such codes, as well as removing the auto-wipe feature, triggered when several incorrect passcodes are entered (Keizer, 2016).” The FBI has been cautious about the amount of password attempts to access the December’s terrorist attackers phone. The FBI believes that the IPhone 5c might have vital information stored on the device.…

    • 805 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    From Apple’s perspective, the FBI’s idea of creating a backdoor technology is a desperate and selfish move in the San Bernardino case.The FBI is certainly not showing respect to the privacy of many people around the world by demanding a one time free access into the attackers’ phones, as it may not truly be a one time thing and could happen again many times in the future. Imagine the backdoor technology being in the wrong hands. The people’s justice and security would soon be taken away as their lives on a single device would forever be exposed and stolen from many people like hackers, criminals, and even the government. It’s an act of ruthless obstruction of justice and civil liberty, regarding the FBI’s dismissal on how threatening and harmful their consideration of backdoor technology is for all the people in the world. Hence Apple’s strong-spirited patriotic support for the freedom and rights of people, as Apple strongly believes that the supposed “democratic” government should not force Apple or other companies to invade everyone’s privacy through the use of their…

    • 811 Words
    • 4 Pages
    Improved Essays