Utilitarianism Essay

Superior Essays
As the protectors of the citizen’s of the United States, the FBI felt they were obligated to access the data on Syed Farook, one of the San Bernardino terrorists through any means necessary, even by force. They believed that information such as motives or possible accomplices may be hidden on the iPhone 5C and access to that will potentially allow them to capture other perpetrators or perhaps even prevent future terror attacks.
After two months of failing to gain access to the iPhone in question, the FBI appealed to the courts of California and they were successful in gaining an order which demanded that Apple build a backdoor in their software to disable the erase-after-ten-failed-attempts feature (erases all contents of an iPhone after ten
…show more content…
I would do so because I understand that if Apple were to comply, they would make all their existing iOS more vulnerable to malicious hacking. It is Apple’s duty to protect their customers, not to make their devices more vulnerable. In addition to the fact that Apple is duty bound to protect all of their customers, a utilitarian argument can be made for this as well and while I am in no way a practicer of utilitarianism, this certainly helps solidify my opinion. Consider the amount of people who at that time owned a device with iOS 9 installed. Every single one of those people would now be in possession of a device that is practically defenseless against malicious attacks. Now think of the sort of harm that can come to someone if they lose control of the device they are so dependant on. If someone is able to gain access to the iOS, they are capable of completely controlling the device and not only can they access the user’s data but they are able to manipulate the operating system (control the battery, touch screen features etc.). This would render the device useless to the owner especially if they are in a potentially dangerous situation which could in fact be orchestrated by the hacker. The amount of people who can be harmed by assisting the FBI far outnumbers the amount of people the FBI hopes to save by gaining access to the

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    My second reason is Apple does not want to make a software because it can fall in the ronf hand of a person. Hir his my evidence it will fall in the wrong hand of a hack then it will go down to the reason then it will be pass on. And If they do make a Soft ware the device will have to be pass on to military place and this can lead to bad thing. And is can be used for…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Utilitarianism is based on the consequences resulting from actions. Moral actions solely rely on the resulting consequences. Pleasures vary regarding quality and quantity. However, utilitarianism theory gives the quality aspect an upper hand. “Human beings are not satisfied with pleasures they have because they consider them to be of low quality” (Rosen, 2005.…

    • 96 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    4th Amendment Case Study

    • 276 Words
    • 2 Pages

    The FBI has been trying to hack Syed Farook’s iPhone but Apple would not allow them due to the 4th amendment. “Basic American rights were at stake, and the purpose of the law is to protect people’s rights” (Tribune News Service). That information shows how the FBI would be going against one of the rights listed in the constitution. Furthermore, customers could have…

    • 276 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    After reading the article “Apple vs. The United States Government,” I agree with Apple’s stance. The San Bernardino shooting was a very tragic event that occurred last December and I do understand where the FBI is coming from, but they cannot expect Apple to risk the privacy of their customers.. There are many reasons why I agree with Apple’s stance. Smartphones have become a very sufficient part of people's lives, and we depend on them for almost everything. We have put forth our trust in these phones, by relying on them to keep all of our private information.…

    • 325 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IPhone Unlock Debate In resent weeks the FBI has attempted to make Apple come up with a way to unlock the San Bernardino shooters IPhone. The FBI wants to know if the shooter had any plans before that might have been kept in secret on his phone. Although this would give Americans peace at mind Tim Cook, the CEO of Apple, refuses to make a so-called “back door” to the phone for security and privacy reasons. Tim says that making a way to get into a locked device without erasing valuable information would be extremely dangerous if it got into the wrong hands.…

    • 395 Words
    • 2 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Some have tried to claim that it was dubious as to whether it was even possible for Apple to create a piece of software that performed what the FBI was demanding. This is a much more logically consistent counter argument because one cannot do the impossible, but the counter argument can be refuted via induction. Apple could automatically update iPhones without permission (Landau 1398). Apple has automatically updated iPhones without permission in the past (Landau 1398), and so Apple could do so again to install this back door. Also, based on the research lead by Dr. Choi (an expert in computer engineering), updates to the firmware of the smart phone could be utilized to create a back door program (39).…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Decent Essays

    Killer's Phones

    • 130 Words
    • 1 Pages

    The government is attempting to find information on a killer's phone according to the New York Times article In Nods to Law Enforcement in Apple Case, by Julian Sanchez. President Obama tries to end the straddle for privacy to divide. President Obama is trying to convince Apple to get into hacking a terrorist phone named Sayed Rizwan Farook, who resides in San Bernardino, California. The NY Post "Can an 18th Century Law Force Apple into Hacking Killer's Phone?" by Shear D. Michael…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Intro: In this essay I will give a brief overview of U.S Governments request to apple in conjunction with Tim Cook’s argument. Furthermore, I will provide my own opinion on the matter with support from the All Writs Act and the publics opinions, after reference to David Friedman about his views on privacy. Summary of Cook’s Argument: Tim Cook, Apple C.E.O has made a public announcement in regards to the U.S Government’s request to create an Apple Iphone “backdoor.”…

    • 1314 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    For years prior to the terrorist events that occurred on September 11, 2001, the government currently had programs in place that were programs tracking private citizens' phone and internet use. These surveillance technologies being monitored were audio recordings, video recordings, databases, and other technologies. Although these programs were not considered a priority to the Federal Investigation Bureau, they soon became so after the attacks occurred. , FBI Director Robert Mueller suggested that the government might have prevented the 9/11 terrorist attacks if more surveillance programs had been implemented prior to 2001. Many Americans feel that these programs set in place violates their amendment rights.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Apple and the FBI are in a dispute over whether or not Apple should unlock one of the San Bernardino shooters phones in order to obtain personal records regarding potential terrorist activity. Apple believes they should not have to disclose this information and unlock the phone because it violates their “terms and agreements”. However, the FBI thinks Apple should unlock the phone because it will let them retain vital and personal information about the shooters. According to CNN writer Mike Rodgers, “The FBI was unable to access the encrypted smartphone to map the terrorist's connections to ISIS…” The FBI asked apple for help but they refused.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    4th Amendment

    • 1476 Words
    • 6 Pages

    Bill of rights Introduction In December 1791 the states agreed to the 10 amendments to the Constitution now known as the Bill of Rights. At the time these 10 amendments were only applied to white males. Slaves, free black men, and women were excluded from these 10 amendments. The purpose of this document was to defend the citizens because the anti-federalist wanted to make sure that the central government wasn’t too powerful.…

    • 1476 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Utilitarianism is considered as one of the most prominent philosophical concepts. This model's core perspective emphasizes that actions are ethically acceptable or unacceptable depending on their consequences. Based on this understanding, it can be argued that utilitarians hold that the goal of morality is to improve life by enhancing some favorable things such as happiness in the world while minimizing undesirable aspects such as grief (Urmson, 33). Consequently, the core objective of this essay is to define and critique both Act and Rule Utilitarianism, as well as determine the most practical kind of utilitarianism.…

    • 870 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays