The FBI’s request for Apple to crack the San Bernardino terrorist iPhone 5c isn’t as cut and dry as it might appear…
This story has been making headlines for quite some time now, and I honestly think that it will continue to make headlines for some time to come. In fact, I can see this subject staying in the news for at least the next couple of months…
This is perhaps one of the most controversial issues I’ve seen out of the tech sector in a very long time. I’m also not entirely certain that there has EVER been such a controversial or politically charged issue on the minds of nearly every personal computer user – like, EVER.
At the heart of the issue is the iPhone 5c used by Syed Farook. Farook and his wife, Tashfeen Malik killed 14 people and injured another 22 during a training class and party in December 2015. The FBI has tried to access the iPhone 5c, but have not been able to get past its passcode, which resets after 10 failed attempts, rendering the device inaccessible.
During the week of 2016-02-14 to 2016-02-20, a federal judge ordered that Apple must assist the FBI in getting past the passcode screen. Apple, has since refused to comply with this order, stating that they intend to fight the order, which they see as a violation of the right to privacy and of civil liberties.
At issue, is not this one single iPhone, owned by the (uninvolved and unknowing) business that Farook worked for. According to Apple, the only way to gain access to an iPhone locked with a passcode is to crack the encryption and build a back door into the OS. According to the FBI, Apple doesn’t have to create that back door. They can simply modify this one, particular iPhone 5c and give the FBI the access they need.