“Building a ‘backdoor’ to the iPhone: an ethical dilemma”
Full Answer Section
QUESTION 2: Everyday use devices with the ability to store digital traces- Smart home devices: Smart home devices, such as thermostats, security cameras, and voice assistants, can store data about users' activities and routines. This data could be used to track users' movements and identify their habits.
- Wearable devices: Wearable devices, such as smartwatches and fitness trackers, can store data about users' health and fitness. This data could be used to track users' movements and identify their physical activities.
- Browsing history
- Search engine queries
- Social media activity
- Online purchases
- Financial transactions
- Gaming activity
- Fitness data
- Sleep data
Sample Solution
UESTION 1: Digital traces stored in the terrorists' iPhones
- Location data: The terrorists' iPhones would have stored location data, such as GPS coordinates and cell tower IDs. This data could be used to track the terrorists' movements and identify places they visited.
- Communication data: The terrorists' iPhones would have stored communication data, such as call logs, text messages, and email messages. This data could be used to identify the terrorists' associates and uncover their plans.