infographic
Apple versus the FBI: The moral maze behind the security backdoor
Apple has claimed that it contacted the FBI immediately after the recent shooting in Texas that left 26 dead to help the Bureau extract information from the gunman’s phone.
The FBI originally implied frustration with the tech giant when FBI special agent Christopher Combs railed against industry standard encryption as an impediment to law enforcement accessing data that could aid criminal investigations.
Apple has resisted pressure from the US government to create custom code designed to allow the government easy access – referred to as a security backdoor – to iPhone user data.
Following the San Bernardino mass shooting in December 2015 Magistrate Judge Sheri Pymof ordered Apple to help the FBI access the iPhone owned by one of the gunmen, Syed Rizwan Farook.
The following infographic, which was designed by he New Jersey Institute of Technology’s Online Masters in Computer Science program, explores the tension between the need to identify criminals and trace their movements and activities and protect iPhone users from instrusion into their privacy by their own and foreign governments.

NJIT New Jersey Institute of Technology Online MSCS
Apple versus the FBI: The moral maze behind the security backdoor
Apple has claimed that it contacted the FBI immediately after the recent shooting in Texas that left 26 dead to help the Bureau extract information from the gunman's phone.
IFSEC Global
IFSEC Global | Security and Fire News and Resources
Related Topics
Some Shocking Facts About Fireworks and how to Stay Safe [Infographic]
Fire door facts, figures and regulatory requirements: an infographic
City surveillance and explosion-proof cameras primed for rapid growth
The situation is rather ambiguous. On the one hand, an obstacle to the government can cause serious consequences, since a serious problem is being solved here, namely the situation of mass shooting with numerous victims. On the other hand, if you give access to a certain sphere of society, then there will be no feeling that your data is inviolable.
I like how you write. You are considering topics that most do not dare to talk about. If you have free time, I would like to discuss cooperation in my app promotion services blog with you.