Argumentative Essay: The Iphone That Shook The Tech World

Improved Essays
The iPhone that shook the Tech World Does the FBI have the right to order Apple to open a terrorist’s iPhone? No, Apple has many facts and confident ways to shut down the FBI’s offense. Apple says that the process would take too long, it would set a very bad precedent, and there is no way to confine the software to one iPhone. The FBI, on the other hand, claims that justice needs to be served for the San Bernardino victims, National Security needs to be protected, and the All Writs Act makes Apple have to comply. So, even though the All Writs Act of 1789 demands organizations to help the government in cases, Apple should not have to help unlock a terrorist’s iPhone for the FBI. This all started on December 2, 2015 when two terrorist’s killed multiple people in an Inland Regional Center(Hollister and Guglielmo). One of the terrorists by the name of Syed Farook had an iPhone 5c that may contain information on other terrorists, or nothing at all(Balakrishnan). After the men, who committed the attacks in San Bernardino, destroyed all other personal belongings, this phone was the only way to help in the case. There is a failsafe feature along with a passcode on the phone preventing the FBI from gaining access to the info on the phone. …show more content…
The information on the iPhone could lead to other terrorists around the world. The San Berdarndino attack was the deadliest attack in the United States since the 9/11 attack. After the 9/11 attacks there were major changes to help keep people safe and this might be a time that new “upgrades” need to be put in place just as they were after the 9/11 attacks. However, there is no way to know for sure if there is information on the iPhone that would lead to other terrorists(Hollister and Guglielmo). There is only speculation that vital information is on the phone(Hollister and Guglielmo0. Are you ready to give up your privacy on

Related Documents

  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    All Writs Act Case Study

    • 1295 Words
    • 6 Pages

    Even though the FBI has gotten data off of the cell phone, Apple will increase the encryption and implement new security features to prevent the FBI from accessing data on any iPhone. Apple has said multiple times that it cares greatly for the customers security, and some speculate that Apple may even make their operating system encrypted, meaning no-one, even Apple, could have gained access to the information on the iPhone. “Apple has made great efforts to remove from the equation by making it impossible for them to decrypt customer data even if requests were made” (Panzarino). Since Apple has done this in the past, there is great reasoning that Apple may do this again in the future.…

    • 1295 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Technology has changed a lot over the years, but has it changed for the better? Many people think it has not. All over the world, people are on their cellular devices. Little do they know that the government can see everything they do and search on their phone. Therefore, I propose a 28th Amendment to the United States Constitution stating that Technology privacy will now be issued among everyone and the government will no longer have access to anyone's history.…

    • 433 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Also they have invented a wiretap for busting any crimes such as planting bugs in certain rooms or chips right in the memory of your phone. This raises the question of “are we really free” or “I wonder what place doesn't have a microphone in it…

    • 544 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IPhone Unlock Debate In resent weeks the FBI has attempted to make Apple come up with a way to unlock the San Bernardino shooters IPhone. The FBI wants to know if the shooter had any plans before that might have been kept in secret on his phone. Although this would give Americans peace at mind Tim Cook, the CEO of Apple, refuses to make a so-called “back door” to the phone for security and privacy reasons. Tim says that making a way to get into a locked device without erasing valuable information would be extremely dangerous if it got into the wrong hands.…

    • 395 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The argument made by David Morris in FBI Will Help Local Police Unlock iPhones is that now that the FBI has the ability to crack into the data stored on iPhones, the agency will utilize this capability in many situations, including local law enforcement cases and federal counter-terrorism cases. More specifically, Morris argues that there will be an increased number of iPhones that are broken into in order to investigate crimes. He writes, “The agency has since unlocked other phones, and, CBS reports, now ‘owns the proprietary rights’ to its unlocking method.” In this passage, Morris suggests that this technique will become a common tactic in law enforcement, and Apple, while improving the security of their products, has to take the government’s…

    • 330 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Apple Vs. The FBI Case

    • 327 Words
    • 2 Pages

    This phone belonged to a terrorist and the FBI wanted to . Apple was not just gonna unlock this phone because it violates their privacy contracts. There has been much controversy on how far the FBI can go with this and our security. Apple has said that they would not help the FBI because it breaks their contracts.…

    • 327 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Killer's Phones

    • 130 Words
    • 1 Pages

    The government is attempting to find information on a killer's phone according to the New York Times article In Nods to Law Enforcement in Apple Case, by Julian Sanchez. President Obama tries to end the straddle for privacy to divide. President Obama is trying to convince Apple to get into hacking a terrorist phone named Sayed Rizwan Farook, who resides in San Bernardino, California. The NY Post "Can an 18th Century Law Force Apple into Hacking Killer's Phone?" by Shear D. Michael…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    I believe that Apple should cooperate with the FBI so that they can find the information that they need. Recently there was an investigation in the FBI that needed information from an IPhone,which is a product of Apple, because they believed it held information that could help understand why they did it and if there was going to be another attack. When the FBI asked Apple if they could get into the IPhone they said no. In the article “PRO/CON:Should Apple have resisted FBI pressure to hack an IPhone?” by Tribune News Service it says,”Instead, the FBI wanted Apple to write a new software to unlock Syed Farook’s IPhone.”…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Apple Vs. FBI In today 's generation, many adults and teenagers keep everything from contact numbers to their social security numbers on their smartphones. When customers, including criminals and terrorists purchase their smartphones, they are buying it with the assurance that not some, but all of their information and privacy will be safeguarded. The issue occurring today deals with the suspected terrorist of the San Bernardino, California on December 2, 2015 shooting involving over 30 injured people.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    4th Amendment

    • 1476 Words
    • 6 Pages

    In the article “Can Your Phone Testify Against You” in the New York Times UPFRONT written by Patricia Smith she states that “Chief Justice Roberts acknowledged that the ruling will make things harder for police. Cell phones can provide valuable incriminating information about dangerous criminals he wrote but, he emphasized, privacy comes with a cost.” An example of how this can be useful is when a person wants to rob a bank or bomb a place. They might have some information that can help law enforcement stop them from committing the crime or can help catch them if they do commit the crime. Important information like where to meet up, where they are going to buy supplies, what day it’s going to happen and why they are doing it is all the information that they say should not be considered private and can be used to stop future crimes.…

    • 1476 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    The excuse, of course, was to gain access in the San Bernardino killer's iPhone, however, Apple has expressed this can lead to a more serious situation. If Apple complied and made this software,…

    • 366 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Apple Security Attack

    • 680 Words
    • 3 Pages

    Apple is a well-known, successful company with a lot of customer gratitude and support. On December 2nd, 2015, a terrorist attack in San Bernardino occurred, effecting Apple’s company entirely (Waddell). Apple was asked to pull down a security wall on their devices to help with the investigation through the shooters IPhone 5C. However, Apple should not have to risk the security and safety imposed on their devices for the investigation of the San Bernardino attacks.…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Both devices were passcode protected. An Illinois state judge issued a warrant ordering Apple and Google to unlock the phones and share with authorities…

    • 910 Words
    • 4 Pages
    Improved Essays