{"id":1480,"date":"2016-05-08T16:10:41","date_gmt":"2016-05-08T10:40:41","guid":{"rendered":"https:\/\/codelattice.com\/blog\/?p=1480"},"modified":"2018-04-27T11:57:30","modified_gmt":"2018-04-27T06:27:30","slug":"the-apple-fbi-face-off","status":"publish","type":"post","link":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/","title":{"rendered":"The Apple\/FBI face-off!"},"content":{"rendered":"<p>The Judgement is out..\u00a0 Apple doesn&#8217;t have to help FBI in the Brooklyn iPhone Case.\u00a0 It was indeed a victory for privacy laws of sorts, as earlier last week U.S. Magistrate Judge James Orenstein ruled that Apple cannot be compelled by the FBI to unlock the phone in the Brooklyn drug dealer case as Congress had rejected a bill that would require companies like Apple to make the content on a locked Phone device available for onward investigation.\u00a0 With this ruling, Apple gains an advantage over the Federal Government over access to locked devices.<\/p>\n<p>&nbsp;<\/p>\n<p>Now with a judge in California considering the case where FBI is requesting access to a locked iPhone used by one of the San Bernardino attackers, Rizwan Farook, the Brooklyn iPhone judgement will give Apple the boost needed and an additional caselaw to cite, in the massacre case.\u00a0 The San Bernardino shooting rampage by the husband-wife duo in California claimed 14 lives and wounded 22.<\/p>\n<p>&nbsp;<\/p>\n<p>Taking a stand on cases like this is tough for sure, but like Apple\u2019s Tim Cook revealed that complying with a court order to help the FBI break into an iPhone would set a legal precedent that can violate security &amp; privacy rights in the future.<\/p>\n<p>&nbsp;<\/p>\n<p>In hindsight, there would surely have been a middle ground that should have been explored before the filing in court.\u00a0 It is understood that Apple would have assisted the government in accessing the data on the iPhone in question but a formal application by the Government in court &amp; a legal ruling, was probably the precedent Apple wanted to avoid which some opine is fair.. after all that would change the face of the security measures Apple is much revered for. \u00a0This, of course is not the last we have heard of this case.. after all the US Justice Department is sure to seek review of the decision.<\/p>\n<p>&nbsp;<\/p>\n<p>With the future of digital privacy now hanging in balance, we are sure the opinion wars will have people taking sides.\u00a0 In one hand having to chose between aiding an investigation or chasing your own right to privacy and security, the lines get blurred as both are equally important and cannot be ignored.<\/p>\n<p>&nbsp;<\/p>\n<p>For now though, let\u2019s keep in mind that the US Government has taken\u00a0the decision that it is better off securing such crypto-legislative authority from the courts, as mentioned in Judge James Orenstein\u2019s ruling.\u00a0 It indeed is necessary to find the balance between the necessity of access to investigating agencies and unwarranted intrusion in the life of civilians as we move ahead in this digital universe where our lives are available for all to view. \u00a0What happens next in this case can change the way we look at digital security and privacy.. so its time to wait and watch!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Judgement is out..\u00a0 Apple doesn&#8217;t have to help FBI in the Brooklyn iPhone Case.\u00a0 It was indeed a victory for privacy laws of sorts, as earlier last week U.S. Magistrate Judge James Orenstein ruled that Apple cannot be compelled by the FBI to unlock the phone in the Brooklyn drug dealer case as Congress [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":1483,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[375,387],"tags":[357,204,360,358,359],"class_list":["post-1480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-experience","category-enterprise-mobility","tag-apple","tag-digital","tag-iphone","tag-privacy","tag-security"],"acf":{"heading_txt":"The Apple - FBI face-off!"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Apple\/FBI face-off! - Codelattice Blog<\/title>\n<meta name=\"description\" content=\"An overview of the case where FBI has filed in court for access to the iPhone used by one of the San Bernardino attackers and Apple refuses to give in.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Apple\/FBI face-off! - Codelattice Blog\" \/>\n<meta property=\"og:description\" content=\"An overview of the case where FBI has filed in court for access to the iPhone used by one of the San Bernardino attackers and Apple refuses to give in.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/\" \/>\n<meta property=\"og:site_name\" content=\"Codelattice Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/codelattice\" \/>\n<meta property=\"article:author\" content=\"supriyabalankuniyil\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-08T10:40:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-04-27T06:27:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2016\/03\/privacy-wars.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"566\" \/>\n<meta name=\"author\" content=\"Supriya Balan Kuniyil\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Apple\/FBI face-off!\" \/>\n<meta name=\"twitter:description\" content=\"An overview of the case where FBI has filed in court for access to the iPhone used by one of the San Bernardino attackers and Apple refuses to give in.\" \/>\n<meta name=\"twitter:creator\" content=\"@SupriyaKuniyil\" \/>\n<meta name=\"twitter:site\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Supriya Balan Kuniyil\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/\"},\"author\":{\"name\":\"Supriya Balan Kuniyil\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/7c7029389a4e3c010ba5e641bd8d741a\"},\"headline\":\"Codelattice Blog\",\"datePublished\":\"2016-05-08T10:40:41+00:00\",\"dateModified\":\"2018-04-27T06:27:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/\"},\"wordCount\":477,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2016\/03\/privacy-wars.jpg\",\"keywords\":[\"Apple\",\"Digital\",\"iPhone\",\"Privacy\",\"Security\"],\"articleSection\":[\"Digital Experience\",\"Enterprise Mobility\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/\",\"name\":\"The Apple\/FBI face-off! - Codelattice Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2016\/03\/privacy-wars.jpg\",\"datePublished\":\"2016-05-08T10:40:41+00:00\",\"dateModified\":\"2018-04-27T06:27:30+00:00\",\"description\":\"An overview of the case where FBI has filed in court for access to the iPhone used by one of the San Bernardino attackers and Apple refuses to give in.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#primaryimage\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2016\/03\/privacy-wars.jpg\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2016\/03\/privacy-wars.jpg\",\"width\":650,\"height\":566,\"caption\":\"Apple vs FBI\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codelattice.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Codelattice Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"name\":\"Codelattice Blog\",\"description\":\"Home\",\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\",\"name\":\"Codelattice\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"width\":366,\"height\":366,\"caption\":\"Codelattice\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/codelattice\",\"https:\/\/x.com\/Codelattice\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/7c7029389a4e3c010ba5e641bd8d741a\",\"name\":\"Supriya Balan Kuniyil\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7546821337bd61fe9183243cb2f6835ae9d60867b77a2c3258f47cead2a8640c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7546821337bd61fe9183243cb2f6835ae9d60867b77a2c3258f47cead2a8640c?s=96&d=mm&r=g\",\"caption\":\"Supriya Balan Kuniyil\"},\"description\":\"A MARCOMM Professional with over 14 years of experience in various aspects of branding &amp; communication, Supriya works to build &amp; add brand value on the digital platform through strategized communication, contextual ideation &amp; timely implementation. She can be reached at supriya@codelattice.com\",\"sameAs\":[\"supriyabalankuniyil\",\"https:\/\/x.com\/SupriyaKuniyil\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Apple\/FBI face-off! - Codelattice Blog","description":"An overview of the case where FBI has filed in court for access to the iPhone used by one of the San Bernardino attackers and Apple refuses to give in.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/","og_locale":"en_US","og_type":"article","og_title":"The Apple\/FBI face-off! - Codelattice Blog","og_description":"An overview of the case where FBI has filed in court for access to the iPhone used by one of the San Bernardino attackers and Apple refuses to give in.","og_url":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/","og_site_name":"Codelattice Blog","article_publisher":"https:\/\/www.facebook.com\/codelattice","article_author":"supriyabalankuniyil","article_published_time":"2016-05-08T10:40:41+00:00","article_modified_time":"2018-04-27T06:27:30+00:00","og_image":[{"width":650,"height":566,"url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2016\/03\/privacy-wars.jpg","type":""}],"author":"Supriya Balan Kuniyil","twitter_card":"summary_large_image","twitter_title":"The Apple\/FBI face-off!","twitter_description":"An overview of the case where FBI has filed in court for access to the iPhone used by one of the San Bernardino attackers and Apple refuses to give in.","twitter_creator":"@SupriyaKuniyil","twitter_site":"@Codelattice","twitter_misc":{"Written by":"Supriya Balan Kuniyil","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#article","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/"},"author":{"name":"Supriya Balan Kuniyil","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/7c7029389a4e3c010ba5e641bd8d741a"},"headline":"Codelattice Blog","datePublished":"2016-05-08T10:40:41+00:00","dateModified":"2018-04-27T06:27:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/"},"wordCount":477,"commentCount":0,"publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2016\/03\/privacy-wars.jpg","keywords":["Apple","Digital","iPhone","Privacy","Security"],"articleSection":["Digital Experience","Enterprise Mobility"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/","url":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/","name":"The Apple\/FBI face-off! - Codelattice Blog","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#primaryimage"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2016\/03\/privacy-wars.jpg","datePublished":"2016-05-08T10:40:41+00:00","dateModified":"2018-04-27T06:27:30+00:00","description":"An overview of the case where FBI has filed in court for access to the iPhone used by one of the San Bernardino attackers and Apple refuses to give in.","breadcrumb":{"@id":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#primaryimage","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2016\/03\/privacy-wars.jpg","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2016\/03\/privacy-wars.jpg","width":650,"height":566,"caption":"Apple vs FBI"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codelattice.com\/blog\/the-apple-fbi-face-off\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codelattice.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Codelattice Blog"}]},{"@type":"WebSite","@id":"https:\/\/www.codelattice.com\/blog\/#website","url":"https:\/\/www.codelattice.com\/blog\/","name":"Codelattice Blog","description":"Home","publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codelattice.com\/blog\/#organization","name":"Codelattice","url":"https:\/\/www.codelattice.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","width":366,"height":366,"caption":"Codelattice"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/codelattice","https:\/\/x.com\/Codelattice"]},{"@type":"Person","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/7c7029389a4e3c010ba5e641bd8d741a","name":"Supriya Balan Kuniyil","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7546821337bd61fe9183243cb2f6835ae9d60867b77a2c3258f47cead2a8640c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7546821337bd61fe9183243cb2f6835ae9d60867b77a2c3258f47cead2a8640c?s=96&d=mm&r=g","caption":"Supriya Balan Kuniyil"},"description":"A MARCOMM Professional with over 14 years of experience in various aspects of branding &amp; communication, Supriya works to build &amp; add brand value on the digital platform through strategized communication, contextual ideation &amp; timely implementation. She can be reached at supriya@codelattice.com","sameAs":["supriyabalankuniyil","https:\/\/x.com\/SupriyaKuniyil"]}]}},"_links":{"self":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/1480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/comments?post=1480"}],"version-history":[{"count":5,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/1480\/revisions"}],"predecessor-version":[{"id":3727,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/1480\/revisions\/3727"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media\/1483"}],"wp:attachment":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media?parent=1480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/categories?post=1480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/tags?post=1480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}