Police Magazine Logo
MenuMENU
SearchSEARCH

Here's Why the FBI Forcing Apple to Break Into an iPhone Is a Big Deal

When U.S. Magistrate Sheri Pym ruled that Apple must help the FBI break into an iPhone belonging to one of the killers in the San Bernardino, CA, shootings, the tech world shuddered. Apple's CEO doesn't want to create a "backdoor" to let the FBI in.

February 17, 2016
3 min to read


When U.S. Magistrate Sheri Pym ruled that Apple must help the FBI break into an iPhone belonging to one of the killers in the San Bernardino, CA, shootings, the tech world shuddered. Why? The battle of encryption "backdoors" has been longstanding in Silicon Valley, where a company's success could be made or broken based on its ability to protect customer data, reports USA Today.

The issue came into the spotlight after Edward Snowden disclosed the extent to which technology and phone companies were letting the U.S. federal government spy on data being transmitted through their network.

Ad Loading...

Since Edward Snowden's whistleblowing revelations, Facebook, Apple and Twitter have unilaterally said they are not going to create such backdoors anymore.

So here's the "backdoor" the FBI wants: Right now, iPhone users have the option to set a security feature that only allows a certain number of tries to guess the correct passcode to unlock the phone before all the data on the iPhone is deleted. It's a security measure Apple put in place to keep important data out of the wrong hands.

Federal prosecutors looking for more information behind the San Bernardino shootings don't know the phone's passcode. If they guess incorrectly too many times, the data they hope to find will be deleted.

That's why the FBI wants Apple to disable the security feature. Once the security is crippled, agents would be able to guess as many combinations as possible.

Kurt Opsahl, general counsel for the Electronic Frontier Foundation, a San Francisco-based digital rights non-profit, explained that this "backdoor" means Apple will have to to write brand new code that will compromise key features of the phone's security. Apple has five business days to respond to the request.

Ad Loading...

What does Apple have to say about this? Apple CEO Tim Cook said late Tuesday that the company would oppose the ruling. In a message to customers published on Apple's website, he said: "We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data."

Back in December, Cook defended the company's use of encryption on its mobile devices, saying users should not have to trade privacy for national security, in a broad interview with 60 Minutes. In the interview, Cook stood by the company's stance of refusing to offer encrypted texts and messages from users.

What does this mean for the next time the government wants access? The order doesn't create a precedent in the sense that other courts will be compelled to follow it, but it will give the government more ammunition.

What now? This could push the tech companies to give users access to unbreakable encryption. To some extent, it's already happening. Companies like Apple and Google — responding to consumer demands for privacy — have developed smart phones and other devices with encryption that is so strong that even the companies can't break it.

More Technology

Tinted blue background image of traffic with inset images for an ALPR camera, a police dispatcher, and a logo for Flock Safety.
TechnologyApril 16, 2026

Flock Safety Introduces Audit Assistance, Its Latest Trust & Compliance Tool

Audit Assistance is the latest tool in the Flock Trust & Compliance suite, a first-of-its-kind set of products and services that provides communities with guardrails and customization for accountability, transparency, and responsible use of the Flock platform.

Read More →
image of one closed laptop and one open laptop with Toughbook logo on screen, all against a blue gradient background
TechnologyApril 16, 2026

Panasonic Connect Launches the Toughbook 56

The Toughbook 56, the latest rugged laptop from Panasonic Connect, delivers enhanced performance, refined design, new levels of security, and power-efficient workflows in demanding environments.

Read More →
Collection of traffic control signs against a city backdrop and logos for Radarsign and Sourcewell.
TechnologyApril 16, 2026

Radarsign Awarded Sourcewell Contract Expanding Access to Traffic Safety Solutions

Radarsign’s traffic safety portfolio, including radar speed signs, flashing beacon systems, and more, are now available through Sourcewell purchasing contracts.

Read More →
Ad Loading...
Rooftop view off a drone detection devise with two small rubber antennas with an view overlooking a large domed event venue.
TechnologyApril 9, 2026

D-Fend Solutions’ EnforceAir C-UAS System Secures Key Event with RF-Cyber Counter-Drone Technology

D-Fend Solutions deployed its EnforceAir C-UAS system in support of local police to help secure a 19,000-attendee event, leveraging its non-jamming approach to keep communications and authorized drones operational while safeguarding against rogue drone threats.

Read More →
Graphic showing four priorities for secure enterprise cloud adoption and a logo for Genetec.
TechnologyApril 2, 2026

Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security

With World Cloud Security Day on April 3, Genetec outlines how enterprises can strengthen resilience as they modernize physical security in the cloud.

Read More →
police car geotab thumbnail for services whitepaper
SponsoredApril 1, 2026

A police department’s guide to fleet management and vehicle health

Today’s police departments face rising fleet costs and must stay ready to respond, no matter the call. In this eBook, get powerful insights to enhance your police fleet’s cost-efficiency, reliability and performance through data-driven tactics.

Read More →
Ad Loading...
An automated license plate reader mounted on rear trunk of a car.
TechnologyMarch 26, 2026

Public Safety Surveillance Technology: Built on Compliance and Trust

ALPR solutions provider Leonardo explains why leveraging technology for safety must never come at the expense of constitutional rights or community trust. Every action within an ALPR system should be logged in a tamper-proof audit trail with query records of who accessed what data, when, and for what purpose.

Read More →
Promotional graphic for Patrolfinder featuring a police chief’s headshot inside a circular frame alongside a police SUV in the background. The headline reads: “Built for Patrol: How One Police Chief Fixed Communication, Boosted Visibility, and Changed the Culture.”
SponsoredMarch 17, 2026

Built for Patrol: How One Police Chief Fixed Communication, Boosted Visibility, and Changed the Culture

Patrol work hasn’t changed—but the expectations on officers have. See how one police chief helped officers get the right information at the right time, improve patrol visibility, and strengthen trust without adding complexity or surveillance. This real-world story shows how patrol-driven technology can make the job safer, smarter, and more effective—starting on day one.

Read More →
Back small device with headline ATD Gunshot Detection System and a logo for Acoem set against a tinted blue background image of a large city.
TechnologyFebruary 25, 2026

Acoem ATD to Showcase 96-Attribute Acoustic Intelligence Engine for Gunshot Detection

Unlike legacy gunshot detection architectures that require multiple sensors arranged in fixed meshes, Acoem ATD localizes threats with a single sensor by analyzing both the muzzle blast and the ballistic shockwave of a projectile.

Read More →
Ad Loading...
Image of a persons hands on keyboard of laptop with screen that displays multiple images from security cameras
TechnologyFebruary 11, 2026

Genetec Adds New Capabilities for Security Center SaaS Users

Genetec has launched new investigation capabilities in Genetec Security Center SaaS to reduce investigation time from hours to minutes across complex, multi-site, and multi-vendor environments.

Read More →