SlideShare a Scribd company logo
1 of 5
Computer & Society
“Apple vs. FBI”
Instructor : Dr.Riham AbdelKader
Assistants:
Mr.Ali Ghosn
Ms.Madona Zankar
Course # : Cmps325
Hani Abdallah
201601941
vs
The Problem :
The FBI recovered an Apple iPhone 5C—owned by the San Bernardino County,
California government—that had been issued to its employee, Syed Rizwan Farook, one of the
shooters involved in the December 2015 San Bernardino attack. The attack killed 14 people and
seriously injured 22. The two attackers died four hours after the attack in a shootout with police,
having previously destroyed their personal phones. Despite having recovered Farook's work
phone, the authorities were at a loss, for it had been locked with a four-digit password and was
also programmed to automatically delete all its data after ten failed password attempts.
On February 9, 2016, the FBI announced that it was unable to unlock the county-owned phone it
recovered, due to its advanced security features, including encryption of user data. The FBI first
asked the National Security Agency to break into the phone, but they were unable to since they
only had knowledge of breaking into other devices that are commonly used by criminals, and not
iPhones. As a result, the FBI asked Apple Inc. to create a new version of the phone’s IOS
operating system that could be installed and run in the phone’s random access memory to disable
certain security features that Apple refers to as "GovtOS". Apple declined due to its policy which
required it to never undermine the security features of its products. The FBI responded by
successfully applying to a United States magistrate judge, Sheri Pym, to issue a court order,
mandating Apple to create and provide the requested software.
Pros:
1- Help ensure and guarantee more security in the country.
2- Help to predict citizen social behavior by monitoring citizens.
3- Stop hateful and bad ideas from spreading on social media.
4- Guarantee a civilized and secure community.
Cons :
1- Not respecting the privacy of each individual.
2- Oppose against apple regulations and rules.
3- Cracking into 1 device will allow to get into more and more devices.
4- These private data could be stolen or sold to another parties.
5- Make Apple customers lose trust with Apple as a company.
vs
ETHICAL THE RIS :
vs
Kantianism:
-Rule 1: Its unacceptable , because by giving the FBI access to user iPhones we are no more
respecting the privacy of these users.
-Rule 2 : Its unacceptable , because if Apple gave access to FBI , Apple would be using users
privacy in order to satisfy FBI needs.
Social Contract Theory:
It’s unacceptable by the social contract theory , since Apple as a company has rules and privacy
policies and its to protect and ensure the data privacy of all its customers so giving access to user
data will be against Apple rules and policies.
Utilitarianism:
-Act: Its acceptable because the good in giving access to FBI is more than the bad since ensuring
a secure and protected environment is more important than caring about users privacy.
-Rule: Its acceptable because on long term the society will be more secure for every citizen to
live in , ensuring more civilized community.
vs
Point of view:
Apple was right for not giving access to FBI to access their phones even if they was asking
for one time entry , because this would lead to more and more accesses in the future which
will be against the right of privacy for apple customers and what apple promised for.

More Related Content

What's hot

Strategic Analysis of Apple inc_ 2015
Strategic Analysis of Apple inc_ 2015Strategic Analysis of Apple inc_ 2015
Strategic Analysis of Apple inc_ 2015Adama KOMOU
 
Apple inc final powerpoint
Apple inc final powerpointApple inc final powerpoint
Apple inc final powerpointmnora001
 
Apple consumer behaviour
Apple  consumer behaviour Apple  consumer behaviour
Apple consumer behaviour Vijay Bolla
 
Apple INC Presentation
Apple INC Presentation Apple INC Presentation
Apple INC Presentation Kapil Shendge
 
Apple case study
Apple case studyApple case study
Apple case studyRita Belo
 
Operation process of apple
Operation process of appleOperation process of apple
Operation process of appleAssad Rifat
 
Apple Inc. Pestel Analysis Presentation
Apple Inc. Pestel Analysis PresentationApple Inc. Pestel Analysis Presentation
Apple Inc. Pestel Analysis PresentationShreyansh Singh
 
Apple Inc. presentation
Apple Inc. presentationApple Inc. presentation
Apple Inc. presentationYash Patel
 
Marketing Mix of Apple iPhone
Marketing Mix of Apple iPhoneMarketing Mix of Apple iPhone
Marketing Mix of Apple iPhonePratik Shah
 
Apple inc presentatioin slides
Apple inc presentatioin slidesApple inc presentatioin slides
Apple inc presentatioin slidesjunaid sabri
 
Apple product strategies
Apple product strategiesApple product strategies
Apple product strategiessalman_zamzam
 
Apple Presentation
Apple PresentationApple Presentation
Apple Presentationbarber24
 
Apple's iPhone market segmentation
Apple's iPhone market segmentationApple's iPhone market segmentation
Apple's iPhone market segmentationBassel Awwad
 
International business strategies of Apple Inc.
International business strategies of Apple Inc.International business strategies of Apple Inc.
International business strategies of Apple Inc.ABV-IIItm , Gwalior
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsungWhirax
 
Apple supply chain
Apple supply chainApple supply chain
Apple supply chainAzhar Jamal
 

What's hot (20)

Strategic Analysis of Apple inc_ 2015
Strategic Analysis of Apple inc_ 2015Strategic Analysis of Apple inc_ 2015
Strategic Analysis of Apple inc_ 2015
 
Apple inc final powerpoint
Apple inc final powerpointApple inc final powerpoint
Apple inc final powerpoint
 
Apple consumer behaviour
Apple  consumer behaviour Apple  consumer behaviour
Apple consumer behaviour
 
Apple INC Presentation
Apple INC Presentation Apple INC Presentation
Apple INC Presentation
 
Apple case study
Apple case studyApple case study
Apple case study
 
Apple Company
Apple CompanyApple Company
Apple Company
 
Operation process of apple
Operation process of appleOperation process of apple
Operation process of apple
 
Apple Inc. Pestel Analysis Presentation
Apple Inc. Pestel Analysis PresentationApple Inc. Pestel Analysis Presentation
Apple Inc. Pestel Analysis Presentation
 
Apple Inc. presentation
Apple Inc. presentationApple Inc. presentation
Apple Inc. presentation
 
Marketing Mix of Apple iPhone
Marketing Mix of Apple iPhoneMarketing Mix of Apple iPhone
Marketing Mix of Apple iPhone
 
Apple inc presentatioin slides
Apple inc presentatioin slidesApple inc presentatioin slides
Apple inc presentatioin slides
 
Apple product strategies
Apple product strategiesApple product strategies
Apple product strategies
 
Apple Presentation
Apple PresentationApple Presentation
Apple Presentation
 
Apple
AppleApple
Apple
 
Apple's iPhone market segmentation
Apple's iPhone market segmentationApple's iPhone market segmentation
Apple's iPhone market segmentation
 
Apple inc
Apple incApple inc
Apple inc
 
International business strategies of Apple Inc.
International business strategies of Apple Inc.International business strategies of Apple Inc.
International business strategies of Apple Inc.
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsung
 
Apple supply chain
Apple supply chainApple supply chain
Apple supply chain
 
Apple Inc.
Apple Inc. Apple Inc.
Apple Inc.
 

Similar to FBI–Apple encryption dispute

Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiEkankita Agrawalla
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docxEdwardk3aWallacey
 
Individual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxIndividual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxannettsparrow
 
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxiPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxvrickens
 
iPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be gradediPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be gradedmariuse18nolet
 
iOS Security and Encryption
iOS Security and EncryptioniOS Security and Encryption
iOS Security and EncryptionUrvashi Kataria
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprisecentralohioissa
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!iFixScreens
 
Presentation3
Presentation3Presentation3
Presentation3ChantallD
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
Mobile app privacy
Mobile app privacyMobile app privacy
Mobile app privacyLeo Lau
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
How to view search history on iPhone?
How to view search history on iPhone?How to view search history on iPhone?
How to view search history on iPhone?SpymasterPro1
 

Similar to FBI–Apple encryption dispute (20)

Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
 
Individual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxIndividual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docx
 
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxiPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
 
iPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be gradediPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be graded
 
iOS Security and Encryption
iOS Security and EncryptioniOS Security and Encryption
iOS Security and Encryption
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
 
cabao
cabaocabao
cabao
 
Presentation3
Presentation3Presentation3
Presentation3
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Cosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of ByodCosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of Byod
 
File000092
File000092File000092
File000092
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Mobile app privacy
Mobile app privacyMobile app privacy
Mobile app privacy
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
How to view search history on iPhone?
How to view search history on iPhone?How to view search history on iPhone?
How to view search history on iPhone?
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 

FBI–Apple encryption dispute

  • 1. Computer & Society “Apple vs. FBI” Instructor : Dr.Riham AbdelKader Assistants: Mr.Ali Ghosn Ms.Madona Zankar Course # : Cmps325 Hani Abdallah 201601941
  • 2. vs The Problem : The FBI recovered an Apple iPhone 5C—owned by the San Bernardino County, California government—that had been issued to its employee, Syed Rizwan Farook, one of the shooters involved in the December 2015 San Bernardino attack. The attack killed 14 people and seriously injured 22. The two attackers died four hours after the attack in a shootout with police, having previously destroyed their personal phones. Despite having recovered Farook's work phone, the authorities were at a loss, for it had been locked with a four-digit password and was also programmed to automatically delete all its data after ten failed password attempts. On February 9, 2016, the FBI announced that it was unable to unlock the county-owned phone it recovered, due to its advanced security features, including encryption of user data. The FBI first asked the National Security Agency to break into the phone, but they were unable to since they only had knowledge of breaking into other devices that are commonly used by criminals, and not iPhones. As a result, the FBI asked Apple Inc. to create a new version of the phone’s IOS operating system that could be installed and run in the phone’s random access memory to disable certain security features that Apple refers to as "GovtOS". Apple declined due to its policy which required it to never undermine the security features of its products. The FBI responded by successfully applying to a United States magistrate judge, Sheri Pym, to issue a court order, mandating Apple to create and provide the requested software.
  • 3. Pros: 1- Help ensure and guarantee more security in the country. 2- Help to predict citizen social behavior by monitoring citizens. 3- Stop hateful and bad ideas from spreading on social media. 4- Guarantee a civilized and secure community. Cons : 1- Not respecting the privacy of each individual. 2- Oppose against apple regulations and rules. 3- Cracking into 1 device will allow to get into more and more devices. 4- These private data could be stolen or sold to another parties. 5- Make Apple customers lose trust with Apple as a company. vs
  • 4. ETHICAL THE RIS : vs Kantianism: -Rule 1: Its unacceptable , because by giving the FBI access to user iPhones we are no more respecting the privacy of these users. -Rule 2 : Its unacceptable , because if Apple gave access to FBI , Apple would be using users privacy in order to satisfy FBI needs. Social Contract Theory: It’s unacceptable by the social contract theory , since Apple as a company has rules and privacy policies and its to protect and ensure the data privacy of all its customers so giving access to user data will be against Apple rules and policies. Utilitarianism: -Act: Its acceptable because the good in giving access to FBI is more than the bad since ensuring a secure and protected environment is more important than caring about users privacy. -Rule: Its acceptable because on long term the society will be more secure for every citizen to live in , ensuring more civilized community.
  • 5. vs Point of view: Apple was right for not giving access to FBI to access their phones even if they was asking for one time entry , because this would lead to more and more accesses in the future which will be against the right of privacy for apple customers and what apple promised for.