The Master Key To Iphone Case Study

1129 Words 5 Pages
The Master Key to Iphones is Unethical

The San Bernardino vs Government case has been in the news for the last months, ever since the terrorist attack last December. It has reminded the world of the importance of encryption which is essential for our lives and privacy in this new era of technology. It also has started a legal battle between the FBI and Apple, one of the biggest technology companies in the world. After the attack, the FBI asked Apple for help to access an iphone that belonged to Syed Rizwan Farook, one of the perpetrators of the attack. The FBI could not access it due to the modern encryption and security features newer iPhones have. Apple was not completely opposed to helping the FBI. The company helped by offering everything
…show more content…
Apple gave complete access to the backup data stored in iCloud from Farook’s iPhone, but the information obtained was dated six weeks prior to attack. The FBI still needed more private information from the iPhone such as, texts, phone calls, and the GPS locations after the attack. Apple is now being forced by the federal court to create a software to bypass the security features of the iPhone to completely access its data. Apple is refusing to create this software because the company says this would put the privacy of every Apple customer in danger. The company says that once they create this backdoor to the iPhone, they cannot guarantee keeping it safe. Once created, the software can be modified to open an infinite numbers of iPhones and have complete access their data. Many people are concerned about this issue and most experts agree that if the program is created more security issues will arise. These issues will be not only within individuals, but also nationally, and possibly international users will also be at risk being …show more content…
FBI officials say, they want to use the software to access only iphone that belonged to Farook, but again who is to protect our personal and private information from our own government. The only entity so far trying to protect our private information is Apple. Experts say this can cause a bigger problem in privacy, As hackers are constantly trying to access information useful for accessing information to steal, or make money. In reality Apple engineers are only one step ahead of hackers. Privacy became a very serious point of discussion for Apple and Google in 2013, after the Snowden case, and the presumably global surveillance programs created by the United States. The companies announced that they would lock down data with encryption in a way that not even they would be able to access it ( Blaze 2015). If the software is created, the whole integrity of the encryption would be in jeopardy. In 1994 the U.S government tried to balanced the encryption issue by using the act of 1651 that allowed the government to access encrypted information in computers when necessary, by installing a clipper chip during assembly that could access encrypted data. As Matt Blaze mentions “We learned this the hard way. Just over two decades ago, in 1993, the government proposed a new standard encryption system called “key escrow,” in which an National Security Agency-designed encryption device, called the “Clipper chip,” could be used in

Related Documents