Social Security Analysis: Apple Vs. FBI

Improved Essays
Apple Vs. FBI

In today 's generation, many adults and teenagers keep everything from contact numbers to their social security numbers on their smartphones. When customers, including criminals and terrorists purchase their smartphones, they are buying it with the assurance that not some, but all of their information and privacy will be safeguarded. The issue occurring today deals with the suspected terrorist of the San Bernardino, California on December 2, 2015 shooting involving over 30 injured people. Syed Farook, the suspected terrorist Apple IPhone is locked with a 4 digit code password and the government wants Apple to create a backdoor operating system that allows them to computerize as many passcodes they can to unlock the terrorists
…show more content…
Subsequently, Apple creating a backdoor system will create a domino effect that will negatively affect not only IPhone owners, but all smartphone owners. Furthermore, according to source H “If Apple obeys the FBI’s order, it would set a dangerous precedent for the future, both brief claims…”, meaning that once Apple creates a backdoor system, the government now has proof that an alternative way to access the system is possible. Consequently, the next time an incident occurs like this but instead with a Samsung Galaxy, the precedent will mandate Samsung to also create a similar backdoor system. More importantly, according to source H, thirty two social media companies are siding with Apple on this controversy. Mindful of the possible precedent, a majority of these companies probably do not agree with the FBI because they could possibly ask these companies for the same information. In addition to this, the precedent might not seem like a big issue now, but when it begins to affect social media, and technology companies then it really would affect those who typically leave their information in the hands of …show more content…
As stated before, Apple 's best interest is to look out for their customers and the FBI has spent more time over simplifying the truth. The FBI handles their issues much more differently than Apple does, they claim that they only want one piece of software from Apple but later they will undeniably ask for more. Furthermore, according to source G, a similar case to that is the one of Lavabit, when the founder Ladar Levison had to install a pen to obtain the metadata which eventually resulted in his company shutting down. However the FBI demanded for Levison’s company encryption key, the same is likely to happen to Apple if they create the operating system. The FBI operates so they can get whatever they need from a company, whether it 's an encryption key or any additional needed information, they fail to keep in mind that these demands will deteriorate a majority of these companies customer’s privacy. In addition, the FBI has seemingly been aware that any backdoor operating system created would not only operate for this particular suspect 's IPhone. Source D, states “ Once created(backdoor operating system), the technique could be used over and over again, on any number of devices.”this means that once he FBI obtains this new IOS system, they would not have to ask for it again in another situation similar to

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The FBI Takes a Bite Out of Apple Imagine someone taking your phone and invading all your personal information. Thats was the Federal Bureau of Investigation (FBI) wanted to do to Syed Farook. Syed Farook is a gunman who killed 14 people. The FBI wanted Apple to write a new software so they could unlock Farook´s phone.…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    After reading the article “Apple vs. The United States Government,” I agree with Apple’s stance. The San Bernardino shooting was a very tragic event that occurred last December and I do understand where the FBI is coming from, but they cannot expect Apple to risk the privacy of their customers.. There are many reasons why I agree with Apple’s stance. Smartphones have become a very sufficient part of people's lives, and we depend on them for almost everything. We have put forth our trust in these phones, by relying on them to keep all of our private information.…

    • 325 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    All Writs Act Case Study

    • 1295 Words
    • 6 Pages

    Even though the FBI has gotten data off of the cell phone, Apple will increase the encryption and implement new security features to prevent the FBI from accessing data on any iPhone. Apple has said multiple times that it cares greatly for the customers security, and some speculate that Apple may even make their operating system encrypted, meaning no-one, even Apple, could have gained access to the information on the iPhone. “Apple has made great efforts to remove from the equation by making it impossible for them to decrypt customer data even if requests were made” (Panzarino). Since Apple has done this in the past, there is great reasoning that Apple may do this again in the future.…

    • 1295 Words
    • 6 Pages
    Superior Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Bryce Hickle Prof. Whitaker Rhetoric 14 March 2017 Apple v. FBI: Apple should have complied Syed Farook is one of the terrorists involved in the massacre that took place in San Bernardino in 2015 which resulted in the murder of fourteen people. Apple v. FBI was a legal dispute involving whether or not Apple should comply with a warrant demanding them to install a back door program into this dead terrorist’s cellphone. People who defended Apple’s position had made claims stating that it was legal for Apple to choose not to comply and that making a back door program would be either not possible, dangerous, or both. However, these statements are not true. Not only was it possible for Apple to comply with the FBI’s demands without endangering…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    After the attacks of 9/11, nearly 263 government agencies were reorganized as well as the creation of the Department of Homeland security, which nearly doubled the intelligence budget from 2001 (Freedman, 2011). Much of the technology used in surveillance efforts is off-the-shelf and is lacking in innovation. Moreover, the technological boom in the private sector has afforded the Government many avenues in which to collect information on private citizen including social media, cell phone records, GPS information, financial records, medical information and other third-party services that are capable of storing gigabytes of information on an individual (Shamsi & Abado, 2011). This notion leads to the issues of that information’s security…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Apple and the FBI are in a dispute over whether or not Apple should unlock one of the San Bernardino shooters phones in order to obtain personal records regarding potential terrorist activity. Apple believes they should not have to disclose this information and unlock the phone because it violates their “terms and agreements”. However, the FBI thinks Apple should unlock the phone because it will let them retain vital and personal information about the shooters. According to CNN writer Mike Rodgers, “The FBI was unable to access the encrypted smartphone to map the terrorist's connections to ISIS…” The FBI asked apple for help but they refused.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Many users on the internet distrust communication, sharing, and storing in fear of government surveillance. Many cannot express their will freely because they are aware the government will be supervising their data. If people know that there is a government data base that records information and stores every search or call, this poses a chilling effect for their free speech. The large amounts of data removes a person’s ability to move on from past experiences if it can be recalled (Schneier 2015). The 3rd amendment has been interpreted by courts that there would be privacy of the home; there is no privacy because individuals are constantly monitored.…

    • 1412 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Domestic Wiretapping and Surveillance without a court order. Civilized human beings tend to discuss personal private information with each other everyday. Whether they want the information to be known or not by other people is out of their control. People conduct phone calls and texts messages with each other day in and day out. People assume that these are private one-on-one conversations with each other, but little do they know that there is a third party monitoring their conversations.…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Recently the National Security Agency has been under fire since Edward Snowden released information about a secret program they have been conducting with major cell phone companies. Basically this program allowed the NSA to retain certain information from phone calls made across the country. When this information was released to the public many people began to worry about the information the government really had access to. They can obtain information including who is calling who, how long the call is, and what kind of device and service they are using to make the phone call. Controversy over this rose because it was understood that many people’s phone calls were being watched and put into a database and they had no idea that it was even happening.…

    • 742 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays