Question

CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspects iPhone 5c. Cook stat
popular choice for companies and animations that provided iPhones to their employees for business The iPhone se was easily id
et the iPhone to a H pes the user de and iPad users were for they started using os Tentangled with the uni he iPhone to a co
consumers privacy or in protecting its brand and consumers privacy products 2 What responsibilitie ansibilities should devi
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1.What has Apple’s motive in not giving the FBI access to the San Bernardino suspect’s IPhone? Is Apple genuinely interested in protecting consumers’privacy or in protecting its brand and products?

The F.B.I wanted Apple to help unlock an iPhone used by one of the two attackers who killed 14 people in San Bernardino, but Apple was resisting. After the F.B.I said it had been unable to get access to the data on its own, the cooperation with Apple was necessary. The main reason why they objected was that they did not want to create a “backdoor” that helps to disable the feature that wipes the data on the phone after the 10 incorrect tries. Apple considered this backdoor “too dangerous to create” and looked at the government claim as a way of hacking their own users and damaging the security advancements they have done in the past decades.

2. What responsibility should device manufacturer like Apple have to assist in govt. Investigation?

  1. Disable or bypass the auto-erase function of iOS. This erases your phone if too many wrong passwords are input. A commonly enabled setting on corporate phones — which the iPhone 5c owned by the government agency for which Farook worked — is.
  2. Remove the delay on password inputs so that the FBI can ‘guess’ the passcode on the phone quicker, without it locking them out for minutes or hours, which is what iOS does to stop any random thief from doing this kind of thing. The inputs would be lowered to around 80 milliseconds, which would allow the password to be guessed in under an hour if it were 4 digits and significantly longer if it were more.
  3. Allow the FBI to submit passcode via the physical port on the phone, or a wireless protocol like Bluetooth or WiFi.

3. Should Device manufacturers be compelled to unlock or decrypt devices under certain circumstances ?

Yes ! Device manufacturers should try to help as much possible as they can to save the integrity of a Nation & Protect it from the mass terrorism. They don't have to fully accept the demands of Govt. and implement in the devices but they can come forward as much early as they could to stop such kinds of Incident.
Yes, Protecting the privacy of their consumer must be put forward first but not on the cost mass lives.

4. Overall View on this Case :-

Apple’s CEO Tim Cook made a statement opposing the court’s order. He fears that following the command would “undermine the very freedoms and liberty which the government is meant to protect”.
The following case between FBI & Apple Device manufacturer where Govt. officials were fighting over complete surveillance over the citizens via their personal devices specially with the product of Apple brand on which the encryption & security system was too hard to crack. FBI asked Apple manufacturer to develop a programming software that could be installed and run in the phone's random access memory to disable certain security features that Apple refers to as "GovtOS". Apple declined due to its policy which required it to never undermine the security features of its products. As apple believes in protecting the privacy of its customer from all short of govt. officials as its by law given to each citizen that Right to be left alone.

The FBI and Apple spent weeks fighting and screaming at each other over a cell phone access & Privacy term. they even took the help of court to solve the matter but meanwhile the FBI won, cracking the iPhone access (with the help of some real hackers) belonging to one of the shooters & got the required data.

Add a comment
Know the answer?
Add Answer to:
CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Read the case study below and answer the questions in a 2 page paper: The FBI...

    Read the case study below and answer the questions in a 2 page paper: The FBI & Apple: Security vs. Privacy In December 2015, the FBI attained the iPhone of one of the shooters in an ISIS-inspired terrorist attack that killed 14 people in San Bernardino, California. As part of the investigation, the FBI attempted to gain access to the data stored on the phone but was unable to penetrate its encryption software. Lawyers for the Obama administration approached Apple...

  • Case Study 1: Apple Merging Technology, Business, and Entertainment Why are data, information, business intelligence, and...

    Case Study 1: Apple Merging Technology, Business, and Entertainment Why are data, information, business intelligence, and knowledge important to Apple? Give an example of each type in relation to the iPad. (1 Mark) Explain how Apple achieved business success through the use of information, information technology, and people. (1 Mark) Evaluate how Apple can gain business intelligence through the implementation of a customer relationship management system. (1 Mark) Case Study 1: Apple Merging Technology, Business, and Entertainment This might sound...

  • In terms of Global Business: Read the Who makes the Apple iPhone? case study and answer...

    In terms of Global Business: Read the Who makes the Apple iPhone? case study and answer the question which follows. In answering the question, relate your discussion to the facts presented within the case. In recent decades, China has become an important location for high-tech companies like Apple to source vital manufacturing inputs. Relating to the attributes highlighted in Porter’s Diamond of Competitive Advantage, analyse and discuss China’s competitive advantage in its high-tech components manufacturing industry. Your answer should include...

  • case study apple iPhone. There are risks and rewards for all in a global economy. The...

    case study apple iPhone. There are risks and rewards for all in a global economy. The globalization of human capital results in a range of winners and losers around the world: companies and their stockholders, consumers, contractors, firms up and down the supply chain, employed people, and unemployed people, as well as their economies. In February 2011, President Obama asked Apple's Steve Jobs why Apple could not bring back all the jobs it used to provide in the United States....

  • Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255....

    Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255. Then discuss the advantages and disadvantages for each company. BUSINESS PROBLEM-SOLVING CASE Google, Apple, and Facebook Battle for Your Internet Experience Apple has a legacy of innovation on its side. In Three Internet titans Google, Apple, and 2011, it unveiled the potentially market disrupting Facebook are in an epic struggle to dominate your Siri (Speech Interpretation and Recognition Internet experience, and caught in the...

  • Provide a short summary of the article (200-400 words) that includes/addresses the following: Why you selected...

    Provide a short summary of the article (200-400 words) that includes/addresses the following: Why you selected this article. Describe at least two things you learned from the article including how they add to your knowledge of Global Information Technology. iPhone 11 Article The iPhone 11 and iPhone 11 Pro will contain an Apple-designed chip called the U1. The U1 chip enables ultra-wideband (UWB) positioning, which means it’s designed to pinpoint the locations of nearby objects. Ultra-wideband used to be called...

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions...

    Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT