Apple Security Quotes

Decent Essays
Direct Quote Would you rather risk national security or your own personal privacy? Right now that is the question for all Apple users. The FBI is requiring Apple to create a software to get passed the auto-erase feature on the iPhone of the San Bernardino shooters. They believe that there is important information on their phone about other terrorists. Kurt Opsahl, general counsel for the Electronic Frontier Foundation, a San Francisco-based digital rights non-profit explains that “the “backdoor” means Apple will have to to write brand new code that will compromise key features of the phone’s security,” (Opsahl). If Apple did make a backdoor to the iPhone then all phones would be able to be hacked.
Paraphrase
In this letter written by the

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    My first reason is If apple loses it case they will plan to make a fucher upgraded app phone. And my evidence is if apple loses the case they will have to make a arms race vs the FBI. and who ever wins the case will have to do what they and say to have done. And the Arms Race is that they will have to make a device so that they now who has the most power toll that the can do.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    If the FBI were to receive a way to access this private information, it will be like we are giving a hacker, or a criminal, a password to all devices. In the article Apple states “Building…

    • 325 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    All Writs Act Case Study

    • 1295 Words
    • 6 Pages

    There is great debate in this as well. If Apple goes through with this, nobody will be able to have access to data on any iPhone, no matter what the circumstance is. If this happens, a national security threat may occur and the FBI would not have any access to the data that they needed. The only way to prevent this from happening is not to force Apple to create a weakness within their software, in which Apple will not have to respond with encrypting their operating…

    • 1295 Words
    • 6 Pages
    Superior Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Some have tried to claim that it was dubious as to whether it was even possible for Apple to create a piece of software that performed what the FBI was demanding. This is a much more logically consistent counter argument because one cannot do the impossible, but the counter argument can be refuted via induction. Apple could automatically update iPhones without permission (Landau 1398). Apple has automatically updated iPhones without permission in the past (Landau 1398), and so Apple could do so again to install this back door. Also, based on the research lead by Dr. Choi (an expert in computer engineering), updates to the firmware of the smart phone could be utilized to create a back door program (39).…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    9/11 Ethical Dilemmas

    • 1132 Words
    • 5 Pages

    The attacks on September 11, 2001 instilled great fear in the government as well as millions of Americans. In order to protect ourselves and prevent future terrorists attacks, President George W. Bush signed a bill called The USA Patriot Act which allowed government agencies such as The National Security Agency access to anything they needed to intercept acts of terrorism. The NSA then gained the power to wiretap individual’s phones,obtain their business records and spy on anyone they deemed could be suspected of terrorism. It was a time of panic for the United States, and these excessive searches without warrants weren’t given a second thought. However, it is now 2014 and citizen’s privacy is still being compromised more than ever without…

    • 1132 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Killer's Phones

    • 130 Words
    • 1 Pages

    The government is attempting to find information on a killer's phone according to the New York Times article In Nods to Law Enforcement in Apple Case, by Julian Sanchez. President Obama tries to end the straddle for privacy to divide. President Obama is trying to convince Apple to get into hacking a terrorist phone named Sayed Rizwan Farook, who resides in San Bernardino, California. The NY Post "Can an 18th Century Law Force Apple into Hacking Killer's Phone?" by Shear D. Michael…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    A cryptography writer and technologist, Bruce Schneier, spoke on the subject: “We have examples of the NSA going in and deliberately weakening security of things that we use so they can eavesdrop on particular targets.” He also posed the question: “Should we compromise the security of everybody in order to access the data of the few?” It was reported that 90 percent of the people that are effected by the NSA’s methods and are caught in their dragnet of surveillance are innocent citizens.…

    • 1003 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    9/11 Security Issues

    • 1440 Words
    • 6 Pages

    We live in a society now that is more inter-connected than any other in history. There are cameras in every phone and on every street corner, microphones in all 'smart' devices and a seemingly infectious apathy towards these windows in to our private lives. Post 9/11 saw the world, primarily the United States, crack down on its security by instituting legislation like the Patriot Act, which was a law basically stripping away the basic rights granted to an American citizen if the government deemed you a threat. Now that the innate fear of terrorism has fallen since then, a massive discussion has arisen regarding what information the government can ethically obtain through digital means and what is really ‘too far’ and should not be breached…

    • 1440 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Many people say that the government needs to be able to have control over people's cell phones and they need to know what everyone is doing on the internet. This issue is called Privacy v.s. Safety. Many people would want to give up their ‘right to privacy’ in order to be safe and other people would just rather have their privacy.…

    • 1088 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    As the article, “That’s No Phone. That’s My Tracker” points out, the government is already exploiting the extensive usage of cell phones to gather data (Peter, Rajagopalan). Such projects as the Patriot Act and PRISM that grant the government unprecedented access to cellular data without consent pose a serious threat to the free world as it is known today. Certainly a day when the government will begin to invade the camera feeds of cell phones is just around the corner at the rate society is currently…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    New technologies are putting more pressure on the boundaries of privacy. New ways are emerging that aid in tracking private information on individuals. No matter what new technology emerges, individual privacy rights should be respected at all levels. Americans are concerned of how to maintain an equilibrium between their personal privacy rights and the need for government to track potential terrorist threats since Edward Snowden leaked National Security Agency's (NSA) documents which included collections of information regarding data from cellphone and internet of millions of Americans. Freedom, privacy and safety are the rights of Americans and should not be compromised to confirm safety from terrorism.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays