Apple Vs FBI

Brilliant Essays
Bryce Hickle
Prof. Whitaker
Rhetoric
14 March 2017
Apple v. FBI: Apple should have complied
Syed Farook is one of the terrorists involved in the massacre that took place in San Bernardino in 2015 which resulted in the murder of fourteen people. Apple v. FBI was a legal dispute involving whether or not Apple should comply with a warrant demanding them to install a back door program into this dead terrorist’s cellphone. People who defended Apple’s position had made claims stating that it was legal for Apple to choose not to comply and that making a back door program would be either not possible, dangerous, or both. However, these statements are not true. Not only was it possible for Apple to comply with the FBI’s demands without endangering
…show more content…
Some have tried to claim that it was dubious as to whether it was even possible for Apple to create a piece of software that performed what the FBI was demanding. This is a much more logically consistent counter argument because one cannot do the impossible, but the counter argument can be refuted via induction. Apple could automatically update iPhones without permission (Landau 1398). Apple has automatically updated iPhones without permission in the past (Landau 1398), and so Apple could do so again to install this back door. Also, based on the research lead by Dr. Choi (an expert in computer engineering), updates to the firmware of the smart phone could be utilized to create a back door program (39). Firmware (also known as embedded software) is software installed onto a piece of hardware that performs specific low level tasks such as battery maintenance, but it can also be used to install security updates in devices such as smart phones (Choi, Byung-Chul, et al. 39). Updates at this level of software can usually subvert most security mechanisms including encryption (Choi, Byung, et al. 39). So this is the method that Apple uses for automatic updates and installs, and would have been the method of installing the proposed back door program. The fact that Apple uses these techniques already prove that it would have been easy for Apple to perform the task that the FBI’s warrant …show more content…
“Secure Firmware Validation and Update for Consumer Devices in Home Networking.” Secure Firmware Validation and Update for Consumer Devices in Home Networking, vol. 62, no. 1, Feb. 2016, pp. 39–44. IEEE Xplore, ieeexplore.ieee.org/document/7448561/authors. Accessed 28 Mar. 2017.
Crowley, Michael G, and Michael N Johnstone. “Protecting Corporate Intellectual Property: Legal and Technical Approaches.” Business Horizons, vol. 59, no. 6, 2016, pp. 623–633. ScienceDirect, doi:10.1016/j.bushor.2016.08.004. Accessed 28 Mar. 2017.
Potapchuk, John L. “A Second Bite at the Apple: Federal Courts' Authority to Compel Technical Assistance to Government Agents in Accessing Encrypted Smartphone Data, Under the All Writs Act.” Boston College School of Law, vol. 57, no. 4, 2016, pp. 1403–1446. ABI/INFORM Global, doi:10.2139/ssrn.2768374. Accessed 7 Mar. 2017.
Landau, Susan. “The Real Security Issues of the IPhone Case.” Science, vol. 352, no. 6292, 17 June 2016, pp. 1398–1399., science.sciencemag.org/content/352/6292/1398. Accessed 28 Mar. 2017.
Oyen, Timothy “Stare decisis.” LII / Legal Information Institute, 6 Aug. 2007, www.law.cornell.edu/wex/stare_decisis. Accessed 4 Apr.

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    History has allowed for police officers to search an arrestee’s person and vehicle without a warrant under certain circumstances. However, under the Fourth Amendment, is it constitutional for police officers to search through electronic data and information instilled in a cellphone? A cellphone may contain evidence pertaining to crimes, but cellphones also hold an immense amount of personal information of not only the owner’s, but of other people as well. Riley v. California seeks to establish a fine line between law enforcement and the protection of privacy.…

    • 942 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    4th Amendment Case Study

    • 276 Words
    • 2 Pages

    The FBI has been trying to hack Syed Farook’s iPhone but Apple would not allow them due to the 4th amendment. “Basic American rights were at stake, and the purpose of the law is to protect people’s rights” (Tribune News Service). That information shows how the FBI would be going against one of the rights listed in the constitution. Furthermore, customers could have…

    • 276 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    After reading the article “Apple vs. The United States Government,” I agree with Apple’s stance. The San Bernardino shooting was a very tragic event that occurred last December and I do understand where the FBI is coming from, but they cannot expect Apple to risk the privacy of their customers.. There are many reasons why I agree with Apple’s stance. Smartphones have become a very sufficient part of people's lives, and we depend on them for almost everything. We have put forth our trust in these phones, by relying on them to keep all of our private information.…

    • 325 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    All Writs Act Case Study

    • 1295 Words
    • 6 Pages

    Up until now, the FBI has been working closely with Apple to help gain information from the iPhone that was needed to help insure national security. However, recently the FBI wanted Apple to create a new form of IOS, Apple’s operating system, that would allow for the FBI to input a passcode electronically and deactivate the limited amount of times you can put in a passcode before you are forced to wait a set time period. The FBI has gotten a warrant for Apple to unlock the iPhone,…

    • 1295 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Apple proves that being secretive holds power. The success of using the tactic of withholding information from consumers has been proven time and time again to phenomenally increase sales each time their product hits the stores (Kinicki & Williams, 2013). Whenever Apple comes out with new product people are filled with a strong desire to want to know what was made they scramble to stores to buy its latest gadget (Eadicicco, 2014). The power of secrecy is a good marketing strategy for Apple; they do not spend vast amounts of money like its competitors did on advertising. The business strategy's goal was to create mystery about their product line which results in massive crowds at retail stores and the end results equals high profits for Apple.…

    • 157 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Apple’s decision on not allowing the FBI to hack into people’s iPhone was right. In the article entitled PRO/CON: Should Apple have resisted FBI pressure to hack an iPhone? By Tribune New Service, examines the area in which Apple had the right or not to refuse FBI orders. The articles published that in the last December (2015), Farook and his wife killed 14 people during mass in San Bernardino, California.…

    • 371 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This law enforcement has the power to broadly access American citizen’s internet researches, telephone calls, text messages or also, emails…

    • 338 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nelson And Rubio Essay

    • 629 Words
    • 3 Pages

    Dear Senators Bill Nelson and Marco Rubio, It has been brought to my attention that the Government has access to surveillance systems that can monitor our phone calls, text messages, emails and etc if needed. I agree that the government should have this right, but I believe there must be some strict guidelines placed in order to ensure the personal privacy of citizens. While discussing this topic, it may seem scary to think as a citizen, that everything in our personal lives isn’t as private as we imagined it to be. But, the questions we all seem to ask ourselves about this issue is, “Why is all of our information so important to the government anyways?” or, “I haven’t done anything wrong, so why would they need to look at my texts or listen to my phone calls?”, and last but not least, “How is this legal?…

    • 629 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It’s going to be tough for the FBI to force Apple to give them a backdoor to people’s privacy information because if we think about it there isn’t any real…

    • 619 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Fourth Amendment Debate

    • 1538 Words
    • 7 Pages

    The topic of constitutional rights has long been a hot button that brings out fierce opinions and conflict. One specific topic that draws more attention than the others is the fourth amendment, or the protection from illegal search and seizure. This protection is fiercely enforced in the physical realm, but is grossly overlooked and abused in the digital by means of hacking and data collection requests. One instance of this is the longstanding practice of data turnover orders by the government towards companies such as Microsoft and Apple. On April 14, 2016 Microsoft filed suit due to the fact that “Over the past 18 months, the U.S. government has required that we maintain secrecy regarding 2,576 legal demands” (blog.microsoft.com)…

    • 1538 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The appellant, Chester Comerford, was a licensed attorney and previous law professor who operated a website for a group whom he founded, called the guardians. The guardians questioned President Obama’s citizenship; in 2011 Comerford was convicted of aiding and abetting threats on the President, however the Supreme Court of the United States reversed his conviction the following year. After his conviction was reversed, Comerford went to a local merchant to purchase a smart-phone. Knowing that a phone could be tracked through GPS technology, Comerford disabled the GPS tracking capability, with help from online instructions.…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays