In a recent case a federal judge ordered that Apple alter the System Information File on Farook’s phone in order to allow the Federal Investigation Bureau (FBI) to prevent the phone from erasing it’s data after failed passcode attempts, automate the process for guessing passcode combinations, and remove the time barrier that iPhones have after incorrect passcodes are entered. Apple responded by writing a letter to customers stating that it does not want to create backdoors for its products as it is a security risk that hackers could possibly utilize in the future. Apple can’t break the encryption on the device because it made the choice in 2014 to have encryption run as default without the ability for Apple to gain access. Most experts however, agree that bypassing the feature that deletes data is plausible for Apple to do and that Apple is primarily opposing the court order on an idealogical basis. While the FBI has specified that it only wants access to Farook’s phone in specific as a one time deal, there are fears that the precedent in this case could be used by other countries to make similar demands. Apple Inc. fought the order and the FBI ended up cracking the phone without Apple’s help. This resulted in the FBI dropping the case. Apple now wants to know how the FBI got into the phone, but the FBI is reluctant to tell. The FBI is already in the process of unlocking another phone for an unrelated case.