ipl-logo

Boston Marathon

1873 Words8 Pages

There is a constant battle between surveillance and privacy along with the power the government has to hack into technology throughout the United States. It is an all consuming loop between society and the government. On April 15, 2013, there were two bombs that exploded near the finish line of the 117th Boston Marathon in Boston, Massachusetts. April 15, 2013, Patriots Day a Massachusetts tradition is to talk to anyone from Boston about Patriots Day; the weekend to be in Boston. The centerpiece of the day is the city’s world famous marathon where everyone participating for the marathon are preparing themselves. On the opposite side of Boston across the Charles River two brothers are also preparing for the marathon in a much more sinister way. …show more content…

Presumably the FBI has all his data up until that day. The question of course is, ‘Why did he stop backing up his phone six weeks before the attack?’ Was it because he started communicating more with terrorist’s sleeper cells around the U.S. and he wanted to make sure that data didn’t get into the Cloud, or was it just because Apple kept making him change his iCloud password so often that it got incredibly confusing and it wouldn’t let him change it back to his previous password and he just couldn’t access it anymore!? I really do not get the last one though because Farook only used a four-digit password meaning there’s only ten thousand possible combinations. Now that might sound like a lot, but if you allow four seconds to type in each four-digit passcode you could actually try all ten thousand combinations in only eleven hours. It seems like instead of asking Apple to make such a serious modification to the software a single FBI agent could have sat there and tried all possible combination. It is important to note that Apple hasn’t said that they can’t create this backdoor only that they wont. The reason being in a metaphor Apple CEO once used, “if you put a key under the front mat for the government, there’s nothing to stop burglars from finding the key as well.” Which means they are assuming that once the backdoor exists, it is only a matter of time before it is exploited by hackers and perhaps, more importantly, other Governments. Because if Apple provides the U.S Government with this backdoor in the name of national security now it exists and what’s to say that China can not come to Apple and say, “Hey! We want that backdoor too, also for our national security, but if you do not give it to us, we are not going to let you sell your iPhone’s to our one

Open Document