Kialo requires cookies to work correctly.
Should Apple Help the FBI Hack Terrorists' Phones?
should give in to all the FBI's
and provide authorities with a signed iOS update that allows for brute force attacks.
The seized iPhone may contain a "dormant cyber pathogen" (a unique term for 'computer virus') threatening to disrupt San Bernadino's infrastructure and therewith posing a continuous risk (
Ramos, p. 4
Law enforcement and intelligence agencies face significant challenges in protecting the public against crime and terrorism. They should get every help they need.
Access to the iPhone may enable victims' families to comprehend why their loved ones had to die.
All Writs Act
, the FBI has a legal basis for their demands. As long as this law is in place, private companies have to comply.
The information on the phone may help find possible accomplices of the
San Bernardino shooters
and prevent future crimes.
Peoples' security is a higher good than privacy.
Government agencies don't have an incentive to securely store their software.
The information on the phone cannot be used for an investigation against the shooters because they are dead.
Other tech companies can do the same job, thus security considerations forwarded by Apple are less credible.
There are other ways to reach the same information without creating a back door that makes every iPhone hackable.
If Apple unlocks the phone, this will create a precedent for them to do so in the future.
Objecting to the FBI's demands makes Apple appear as a fighter for individuals' privacy and data protection, which is positive promotion and an effective marketing campaign in times of big data collection.
Code and software is a
form of speech
. Asking Apple to create and sign its digital key to the code that the FBI is requesting they create is the equivalent of
, something which the principles of free speech and constitutional law in the US are designed to protect against.
Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks.
Was the FBI Right to Keep the Pedophile Site Playpen Online After Hacking It?
Is wireless charging a worthwhile feature on a phone?
Should mobile phones be used in the classroom?