SlideShare a Scribd company logo
1 of 5
Computer & Society
“Apple vs. FBI”
Instructor : Dr.Riham AbdelKader
Assistants:
Mr.Ali Ghosn
Ms.Madona Zankar
Course # : Cmps325
Hani Abdallah
201601941
vs
The Problem :
The FBI recovered an Apple iPhone 5C—owned by the San Bernardino County,
California government—that had been issued to its employee, Syed Rizwan Farook, one of the
shooters involved in the December 2015 San Bernardino attack. The attack killed 14 people and
seriously injured 22. The two attackers died four hours after the attack in a shootout with police,
having previously destroyed their personal phones. Despite having recovered Farook's work
phone, the authorities were at a loss, for it had been locked with a four-digit password and was
also programmed to automatically delete all its data after ten failed password attempts.
On February 9, 2016, the FBI announced that it was unable to unlock the county-owned phone it
recovered, due to its advanced security features, including encryption of user data. The FBI first
asked the National Security Agency to break into the phone, but they were unable to since they
only had knowledge of breaking into other devices that are commonly used by criminals, and not
iPhones. As a result, the FBI asked Apple Inc. to create a new version of the phone’s IOS
operating system that could be installed and run in the phone’s random access memory to disable
certain security features that Apple refers to as "GovtOS". Apple declined due to its policy which
required it to never undermine the security features of its products. The FBI responded by
successfully applying to a United States magistrate judge, Sheri Pym, to issue a court order,
mandating Apple to create and provide the requested software.
Pros:
1- Help ensure and guarantee more security in the country.
2- Help to predict citizen social behavior by monitoring citizens.
3- Stop hateful and bad ideas from spreading on social media.
4- Guarantee a civilized and secure community.
Cons :
1- Not respecting the privacy of each individual.
2- Oppose against apple regulations and rules.
3- Cracking into 1 device will allow to get into more and more devices.
4- These private data could be stolen or sold to another parties.
5- Make Apple customers lose trust with Apple as a company.
vs
ETHICAL THE RIS :
vs
Kantianism:
-Rule 1: Its unacceptable , because by giving the FBI access to user iPhones we are no more
respecting the privacy of these users.
-Rule 2 : Its unacceptable , because if Apple gave access to FBI , Apple would be using users
privacy in order to satisfy FBI needs.
Social Contract Theory:
It’s unacceptable by the social contract theory , since Apple as a company has rules and privacy
policies and its to protect and ensure the data privacy of all its customers so giving access to user
data will be against Apple rules and policies.
Utilitarianism:
-Act: Its acceptable because the good in giving access to FBI is more than the bad since ensuring
a secure and protected environment is more important than caring about users privacy.
-Rule: Its acceptable because on long term the society will be more secure for every citizen to
live in , ensuring more civilized community.
vs
Point of view:
Apple was right for not giving access to FBI to access their phones even if they was asking
for one time entry , because this would lead to more and more accesses in the future which
will be against the right of privacy for apple customers and what apple promised for.

More Related Content

What's hot

Dropbox it just works-case study solution
Dropbox  it just works-case study solutionDropbox  it just works-case study solution
Dropbox it just works-case study solutionMustahid Ali
 
Dell case study (management)
Dell case study (management)Dell case study (management)
Dell case study (management)Vineeth Kamisetty
 
Teaching Firewall Configuration in a Game Environment
Teaching Firewall Configuration in a Game EnvironmentTeaching Firewall Configuration in a Game Environment
Teaching Firewall Configuration in a Game EnvironmentSibylle Katharina Sehl
 
Drop box case study analysis
Drop box case study analysisDrop box case study analysis
Drop box case study analysisDinker Vaid
 
Presentation on apple inc.
Presentation on apple inc.Presentation on apple inc.
Presentation on apple inc.KaranBhardwaj60
 
Facebook aquires WhatsApp
Facebook aquires WhatsAppFacebook aquires WhatsApp
Facebook aquires WhatsAppafzal usmani
 
Case study - Strategy Review at Blackberry
Case study - Strategy Review at BlackberryCase study - Strategy Review at Blackberry
Case study - Strategy Review at BlackberryNeha Randhawa
 
APPLE AND ITS SUPPLIERS CORPORATE SOCIAL RESPONSIBILITY
APPLE AND ITS SUPPLIERS  CORPORATE SOCIAL RESPONSIBILITYAPPLE AND ITS SUPPLIERS  CORPORATE SOCIAL RESPONSIBILITY
APPLE AND ITS SUPPLIERS CORPORATE SOCIAL RESPONSIBILITYNicole Heredia
 
Apple Case Study.pptx
Apple Case Study.pptxApple Case Study.pptx
Apple Case Study.pptxsdfasd14
 
Trouble at tessei
Trouble at tesseiTrouble at tessei
Trouble at tesseiAnkit Sha
 
What happened to Blackberry
What happened to BlackberryWhat happened to Blackberry
What happened to BlackberryHinal Kotak
 
A presentation on hazards of cell phones
A presentation on hazards of cell phonesA presentation on hazards of cell phones
A presentation on hazards of cell phoneskalyanikatta
 
Blackberry case study-As an academic subject of Strategic Management having q...
Blackberry case study-As an academic subject of Strategic Management having q...Blackberry case study-As an academic subject of Strategic Management having q...
Blackberry case study-As an academic subject of Strategic Management having q...Kartik Mehta
 
Journey to Sakhalin: Royal Dutch Shell in Russia | HBS Case Study Presentation
Journey to Sakhalin: Royal Dutch Shell in Russia | HBS Case Study Presentation Journey to Sakhalin: Royal Dutch Shell in Russia | HBS Case Study Presentation
Journey to Sakhalin: Royal Dutch Shell in Russia | HBS Case Study Presentation Md. Adib Ibne Yousuf
 
Carolinas healthcare system
Carolinas healthcare system Carolinas healthcare system
Carolinas healthcare system Sanmeet Dhokay
 
Evolution of-mobile-phone
Evolution of-mobile-phoneEvolution of-mobile-phone
Evolution of-mobile-phoneShipat Bhuiya
 
BlackBerry Consumer Preferences and Segmentation
BlackBerry Consumer Preferences and SegmentationBlackBerry Consumer Preferences and Segmentation
BlackBerry Consumer Preferences and SegmentationCarrie Martinelli
 

What's hot (20)

Dropbox it just works-case study solution
Dropbox  it just works-case study solutionDropbox  it just works-case study solution
Dropbox it just works-case study solution
 
Dell case study (management)
Dell case study (management)Dell case study (management)
Dell case study (management)
 
Teaching Firewall Configuration in a Game Environment
Teaching Firewall Configuration in a Game EnvironmentTeaching Firewall Configuration in a Game Environment
Teaching Firewall Configuration in a Game Environment
 
Drop box case study analysis
Drop box case study analysisDrop box case study analysis
Drop box case study analysis
 
Presentation on apple inc.
Presentation on apple inc.Presentation on apple inc.
Presentation on apple inc.
 
Facebook aquires WhatsApp
Facebook aquires WhatsAppFacebook aquires WhatsApp
Facebook aquires WhatsApp
 
Case study - Strategy Review at Blackberry
Case study - Strategy Review at BlackberryCase study - Strategy Review at Blackberry
Case study - Strategy Review at Blackberry
 
APPLE AND ITS SUPPLIERS CORPORATE SOCIAL RESPONSIBILITY
APPLE AND ITS SUPPLIERS  CORPORATE SOCIAL RESPONSIBILITYAPPLE AND ITS SUPPLIERS  CORPORATE SOCIAL RESPONSIBILITY
APPLE AND ITS SUPPLIERS CORPORATE SOCIAL RESPONSIBILITY
 
Apple Case Study.pptx
Apple Case Study.pptxApple Case Study.pptx
Apple Case Study.pptx
 
Trouble at tessei
Trouble at tesseiTrouble at tessei
Trouble at tessei
 
Apple inc.
Apple inc.Apple inc.
Apple inc.
 
Worldcom
WorldcomWorldcom
Worldcom
 
What happened to Blackberry
What happened to BlackberryWhat happened to Blackberry
What happened to Blackberry
 
A presentation on hazards of cell phones
A presentation on hazards of cell phonesA presentation on hazards of cell phones
A presentation on hazards of cell phones
 
Blackberry case study-As an academic subject of Strategic Management having q...
Blackberry case study-As an academic subject of Strategic Management having q...Blackberry case study-As an academic subject of Strategic Management having q...
Blackberry case study-As an academic subject of Strategic Management having q...
 
Journey to Sakhalin: Royal Dutch Shell in Russia | HBS Case Study Presentation
Journey to Sakhalin: Royal Dutch Shell in Russia | HBS Case Study Presentation Journey to Sakhalin: Royal Dutch Shell in Russia | HBS Case Study Presentation
Journey to Sakhalin: Royal Dutch Shell in Russia | HBS Case Study Presentation
 
Carolinas healthcare system
Carolinas healthcare system Carolinas healthcare system
Carolinas healthcare system
 
Evolution of-mobile-phone
Evolution of-mobile-phoneEvolution of-mobile-phone
Evolution of-mobile-phone
 
Ipremier case
Ipremier caseIpremier case
Ipremier case
 
BlackBerry Consumer Preferences and Segmentation
BlackBerry Consumer Preferences and SegmentationBlackBerry Consumer Preferences and Segmentation
BlackBerry Consumer Preferences and Segmentation
 

Similar to FBI–Apple encryption dispute

Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiEkankita Agrawalla
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docxEdwardk3aWallacey
 
Individual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxIndividual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxannettsparrow
 
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxiPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxvrickens
 
iPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be gradediPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be gradedmariuse18nolet
 
iOS Security and Encryption
iOS Security and EncryptioniOS Security and Encryption
iOS Security and EncryptionUrvashi Kataria
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprisecentralohioissa
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!iFixScreens
 
Presentation3
Presentation3Presentation3
Presentation3ChantallD
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
Mobile app privacy
Mobile app privacyMobile app privacy
Mobile app privacyLeo Lau
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
How to view search history on iPhone?
How to view search history on iPhone?How to view search history on iPhone?
How to view search history on iPhone?SpymasterPro1
 

Similar to FBI–Apple encryption dispute (20)

Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
 
Individual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxIndividual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docx
 
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxiPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
 
iPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be gradediPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be graded
 
iOS Security and Encryption
iOS Security and EncryptioniOS Security and Encryption
iOS Security and Encryption
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
 
cabao
cabaocabao
cabao
 
Presentation3
Presentation3Presentation3
Presentation3
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Cosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of ByodCosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of Byod
 
File000092
File000092File000092
File000092
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Mobile app privacy
Mobile app privacyMobile app privacy
Mobile app privacy
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
How to view search history on iPhone?
How to view search history on iPhone?How to view search history on iPhone?
How to view search history on iPhone?
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

FBI–Apple encryption dispute

  • 1. Computer & Society “Apple vs. FBI” Instructor : Dr.Riham AbdelKader Assistants: Mr.Ali Ghosn Ms.Madona Zankar Course # : Cmps325 Hani Abdallah 201601941
  • 2. vs The Problem : The FBI recovered an Apple iPhone 5C—owned by the San Bernardino County, California government—that had been issued to its employee, Syed Rizwan Farook, one of the shooters involved in the December 2015 San Bernardino attack. The attack killed 14 people and seriously injured 22. The two attackers died four hours after the attack in a shootout with police, having previously destroyed their personal phones. Despite having recovered Farook's work phone, the authorities were at a loss, for it had been locked with a four-digit password and was also programmed to automatically delete all its data after ten failed password attempts. On February 9, 2016, the FBI announced that it was unable to unlock the county-owned phone it recovered, due to its advanced security features, including encryption of user data. The FBI first asked the National Security Agency to break into the phone, but they were unable to since they only had knowledge of breaking into other devices that are commonly used by criminals, and not iPhones. As a result, the FBI asked Apple Inc. to create a new version of the phone’s IOS operating system that could be installed and run in the phone’s random access memory to disable certain security features that Apple refers to as "GovtOS". Apple declined due to its policy which required it to never undermine the security features of its products. The FBI responded by successfully applying to a United States magistrate judge, Sheri Pym, to issue a court order, mandating Apple to create and provide the requested software.
  • 3. Pros: 1- Help ensure and guarantee more security in the country. 2- Help to predict citizen social behavior by monitoring citizens. 3- Stop hateful and bad ideas from spreading on social media. 4- Guarantee a civilized and secure community. Cons : 1- Not respecting the privacy of each individual. 2- Oppose against apple regulations and rules. 3- Cracking into 1 device will allow to get into more and more devices. 4- These private data could be stolen or sold to another parties. 5- Make Apple customers lose trust with Apple as a company. vs
  • 4. ETHICAL THE RIS : vs Kantianism: -Rule 1: Its unacceptable , because by giving the FBI access to user iPhones we are no more respecting the privacy of these users. -Rule 2 : Its unacceptable , because if Apple gave access to FBI , Apple would be using users privacy in order to satisfy FBI needs. Social Contract Theory: It’s unacceptable by the social contract theory , since Apple as a company has rules and privacy policies and its to protect and ensure the data privacy of all its customers so giving access to user data will be against Apple rules and policies. Utilitarianism: -Act: Its acceptable because the good in giving access to FBI is more than the bad since ensuring a secure and protected environment is more important than caring about users privacy. -Rule: Its acceptable because on long term the society will be more secure for every citizen to live in , ensuring more civilized community.
  • 5. vs Point of view: Apple was right for not giving access to FBI to access their phones even if they was asking for one time entry , because this would lead to more and more accesses in the future which will be against the right of privacy for apple customers and what apple promised for.