NPR logo
Submit Your Questions On The Dispute Between Apple And The FBI
  • Download
  • <iframe src="https://www.npr.org/player/embed/470776641/470776642" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript
Submit Your Questions On The Dispute Between Apple And The FBI

National Security

Submit Your Questions On The Dispute Between Apple And The FBI

Submit Your Questions On The Dispute Between Apple And The FBI
  • Download
  • <iframe src="https://www.npr.org/player/embed/470776641/470776642" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

The FBI wants Apple to unlock an iPhone used by 1 of the San Bernardino shooters. Morning Edition wants to hear what questions listeners have about the dispute, and we'll answer them on a later show.

RENEE MONTAGNE, HOST:

All the scheduled briefs are in for the legal battle between Apple and the FBI. The parties will be in a federal courtroom in the Central District of California next week.

MARY LOUISE KELLY, HOST:

On the surface, the case is about unlocking the iPhone used by Syed Rizwan Farook. He and his wife were the shooters who killed 14 people in San Bernardino.

MONTAGNE: But this fight is between one of the most powerful companies on earth and one of the most powerful law enforcement agencies on earth - high stakes. And it's become clear it raises technical and legal questions that reach far beyond one iPhone.

(SOUNDBITE OF ARCHIVED RECORDING)

TIM COOK: Can the government compel Apple to write software that we believe would make hundreds of millions of customers vulnerable around the world, including in the U.S.?

KELLY: That's Apple CEO Tim Cook speaking on ABC News. He said the FBI wants his engineers to write, quote, "the software equivalent of cancer." President Obama, meanwhile, says the bigger issue really is about the law and being above the law in the digital age.

(SOUNDBITE OF ARCHIVED RECORDING)

PRESIDENT BARACK OBAMA: If technologically it is possible to make an impenetrable device or system where the encryption is so strong that there's no key, there's no door at all, then how do we apprehend the child pornographer? How do we solve a - or disrupt a terrorist plot?

KELLY: A lot of us are struggling with this about what the limits of encryption should be and how hard it should be to unlock the content of our smartphones, these handy, addictive little devices.

MONTAGNE: We want to hear your questions and answer them on our blog and on air with the best research and insights, so take a look at our coverage at npr.org/applefbi and share your follow-up questions in the comments section or by e-mailing tech@npr.org. That's tech@npr.org.

Copyright © 2016 NPR. All rights reserved. Visit our website terms of use and permissions pages at www.npr.org for further information.

NPR transcripts are created on a rush deadline by Verb8tm, Inc., an NPR contractor, and produced using a proprietary transcription process developed with NPR. This text may not be in its final form and may be updated or revised in the future. Accuracy and availability may vary. The authoritative record of NPR’s programming is the audio record.

Comments

 

Please keep your community civil. All comments must follow the NPR.org Community rules and terms of use, and will be moderated prior to posting. NPR reserves the right to use the comments we receive, in whole or in part, and to use the commenter's name and location, in any medium. See also the Terms of Use, Privacy Policy and Community FAQ.