![]() |
Apple vs FBI. ©2016 Merdeka |
Before discussing the matter of law, we should first know the point at issue versus Apple case the FBI. Well, all started when the alleged shooting of San Bernardino, Syed Farook, died at the scene. The FBI was then expressed when the iPhone 5c belonging Farook as the only evidence that could help them solve the case, even uncover other suspects.
Unfortunately, iPhone Farook protected sophisticated encryption system from Apple. This system makes the FBI can not just try to enter a password to unlock the iPhone. Therefore, too many incorrect passwords trial could make the whole iPhone data was erased.
Therefore, the FBI finally asked Apple to create special software that can pass the iPhone encryption system, enabling them to guess passwords without worrying Farook all data will be erased. Furthermore, the FBI admitted that the software 'hacker' iPhone will only be used for one case only.
On the other hand, of course, Apple immediately rejected the request of the FBI because it could jeopardize the security of another iPhone user data if the software was leaked into the wrong hands. When the American government has been deadlocked, they use the All writs Act.
This law says, "The Supreme Court and all courts established by Act of Congress may issue all warrants necessary or appropriate in order to assist decision of the respective jurisdiction and approved by use and the principles of law".
In short, this law allows US courts to issue an official order on a particular party during accordance with the law and have a clear reason.
In response to the application of Law No. 'aging' is, Apple also said that if the founders of America will be shocked by the decision of the Department of Justice (DOJ) using the 'All writs Act' to subdue them, Mashable (15/03).
Having decided to reject the request FBI already approved the trial, the DOJ chose to hear full arguments Apple directly on 22 March. When Apple finally ran out of options and complied DOJ, maybe 2016 could be the end encryption security system.
No comments:
Post a Comment