Pandora's Box Of Cyberspace Case Study

Superior Essays
Pandora’s Box of Cyberspace In December of 2015, a man in San Bernardino walked into his place of work, the Department of Health during a holiday party and opened fire, left, and then returned again killing a total of 14 people and injuring 21 people. It was highly speculated that this man was a terrorist linked to a radical organization and was possibly planning multiple attacks following the shooting in December. Law enforcement officers believed the information about these future attacks and his correspondence with the radical organization was stored in his iPhone 5c. The FBI wanted Apple to make it easier for them to guess the 4 or 6-digit password without having to worry about the phone wiping away the information. The FBI issued …show more content…
Apple was resilient against the federal government for the protection of their users. The FBI unlawful overstepped boundaries as a government official. Vivek Wadhwa was quoted in “Apple-FBI battle over San Bernardino terror attack investigation: All the details” saying “Apple is obstructing law enforcement’s [investigation] and effectively aiding terrorists [since] they changed [their] technology” to purposely limit the access of the FBI. Apple has the right to change their intellectual property. Apple was enhancing their security to meet the growing demands of their users and to protect their information. It is similar to tactics and approaches used by law enforcement, which have changed over time, to effectively deescalate threats such as bombs or a suspect with a gun. They both progressed for the safety of their patrons. Bill Gates said, in support of the FBI, “[this] is a specific case where the FBI is asking for access to information.” Granted, this was an exceptional case of large-scale domestic terrorism but all the facts weren’t on the table. For example, not disclosed to the public were the 12 other iPhones that the Department of Justice wanted access to from Apple in pending criminal cases by court order. The public is being expected to make an educated decision about what is right when all the facts are not the as widely distributed. The people are being coerced by the FBI to believe that without Apple’s complete compliance Apple does not care about safety and national security. The FBI sought to gain something far more dangerous than possible accomplices and schemes but the absolute power to access anyone’s information. As reported in “The Apple-FBI Fight Isn’t About Privacy vs. Security. Don’t Be Misled” by Brian Barrett, “as computer scientists with extensive security and systems experience, law enforcement is asking for a great deal of access to

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    They thought there might be information about the attack. The FBI should not force Apple to write a new software to unlock Syed Farook's Iphone because it violates the 4th Amendment. The 4th Amendment guarantees the right to privacy, and unreasonable searches and seizures. Although the fourth amendment does say that the government has a right to search personal property if its a warrantable cause, this does not say that third…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    After reading the article “Apple vs. The United States Government,” I agree with Apple’s stance. The San Bernardino shooting was a very tragic event that occurred last December and I do understand where the FBI is coming from, but they cannot expect Apple to risk the privacy of their customers.. There are many reasons why I agree with Apple’s stance. Smartphones have become a very sufficient part of people's lives, and we depend on them for almost everything. We have put forth our trust in these phones, by relying on them to keep all of our private information.…

    • 325 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IPhone Unlock Debate In resent weeks the FBI has attempted to make Apple come up with a way to unlock the San Bernardino shooters IPhone. The FBI wants to know if the shooter had any plans before that might have been kept in secret on his phone. Although this would give Americans peace at mind Tim Cook, the CEO of Apple, refuses to make a so-called “back door” to the phone for security and privacy reasons. Tim says that making a way to get into a locked device without erasing valuable information would be extremely dangerous if it got into the wrong hands.…

    • 395 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    As a result of 9/11, the government understandably was committed to keeping Americans safe at any cost. Setting overly protective standards but as the years have gone by the objectives of the Patriot Act have shifted. The government has abused the Patriot Act, a 2007 report by the Inspector General of the Justice Department, reported various FBI cases that misused the Patriot Act to…

    • 408 Words
    • 2 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Bryce Hickle Prof. Whitaker Rhetoric 14 March 2017 Apple v. FBI: Apple should have complied Syed Farook is one of the terrorists involved in the massacre that took place in San Bernardino in 2015 which resulted in the murder of fourteen people. Apple v. FBI was a legal dispute involving whether or not Apple should comply with a warrant demanding them to install a back door program into this dead terrorist’s cellphone. People who defended Apple’s position had made claims stating that it was legal for Apple to choose not to comply and that making a back door program would be either not possible, dangerous, or both. However, these statements are not true. Not only was it possible for Apple to comply with the FBI’s demands without endangering…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    9/11 Ethical Dilemmas

    • 1132 Words
    • 5 Pages

    The attacks on September 11, 2001 instilled great fear in the government as well as millions of Americans. In order to protect ourselves and prevent future terrorists attacks, President George W. Bush signed a bill called The USA Patriot Act which allowed government agencies such as The National Security Agency access to anything they needed to intercept acts of terrorism. The NSA then gained the power to wiretap individual’s phones,obtain their business records and spy on anyone they deemed could be suspected of terrorism. It was a time of panic for the United States, and these excessive searches without warrants weren’t given a second thought. However, it is now 2014 and citizen’s privacy is still being compromised more than ever without…

    • 1132 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    9/11 Security Issues

    • 1440 Words
    • 6 Pages

    For those unfamiliar, the FBI recently was found to have hired some of Best Buy's Geek Squad technicians as paid informants to track down and eliminate child pornography. For most this issue is pretty cut and dry; if the FBI wants to hunt child abuse/pornography then let them. But when you examine the consequences of this FBI policy you realize that there are a couple of constitutionally-questionable practices that compromises the integrity of what the FBI says they are trying to accomplish. For example, there was a case of a surgeon out of California who brought in his computer to Geek Squad for repairs. An employee ended up alerting the FBI after finding an image on the guys computer, but when brought to court to prosecute the judge threw out all charges because the FBI obtained this information without obtaining a warrant.…

    • 1440 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Apple and the FBI are in a dispute over whether or not Apple should unlock one of the San Bernardino shooters phones in order to obtain personal records regarding potential terrorist activity. Apple believes they should not have to disclose this information and unlock the phone because it violates their “terms and agreements”. However, the FBI thinks Apple should unlock the phone because it will let them retain vital and personal information about the shooters. According to CNN writer Mike Rodgers, “The FBI was unable to access the encrypted smartphone to map the terrorist's connections to ISIS…” The FBI asked apple for help but they refused.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    When suspicious people were assumed to be boarding planes, only their luggage was checked, as seen specifically with one of the hijackers in the 9/11 crisis(9/11 Commission Report, 1). The law enforcement and intelligence agencies were actually restricted by law in the amount of information they could share with each other in order to honor the ‘civil liberties’ of the citizens (Friedman, 15). The Patriot Act which was passed in order to ‘preserve the life and liberty of citizens’ had many features concerning how terrorists could now be handled by the government. Now, increased surveillance was allowed and encouraged, assumed terrorists no longer had the right to know they were being investigated, and court orders to obtain business records when concerning national security could be issued as well(Ball, 37). Search warrants can be immediately issued to law enforcement when terrorist-activity as assumed, and hackers can be monitored immediately once a victim reports it to the authorities.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Recently the National Security Agency has been under fire since Edward Snowden released information about a secret program they have been conducting with major cell phone companies. Basically this program allowed the NSA to retain certain information from phone calls made across the country. When this information was released to the public many people began to worry about the information the government really had access to. They can obtain information including who is calling who, how long the call is, and what kind of device and service they are using to make the phone call. Controversy over this rose because it was understood that many people’s phone calls were being watched and put into a database and they had no idea that it was even happening.…

    • 742 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The Importance Of The NSA

    • 1376 Words
    • 6 Pages

    The sole purpose of the NSA program was to safeguard our national security in a more expansive, efficient manner. The center on law and security (2007) states “…this requirement to demonstrate all of the substantive and procedural elements of FISA to the Attorney General's satisfaction before any surveillance can begin, would fatally impair the President's ability to carry out his constitutional responsibility to collect foreign intelligence to protect our Nation from attack” (p. 9). Any implementation involving citizen’s privacy is assured to draw controversy, and the root of the problem with this program was a management…

    • 1376 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    There are Chinese immigrants who are trying to decide between their old lives in China and their new lives in the United States. Likewise, taking on the responsibilities to support their love ones back in China and the disadvantage they face in the act of kindness. As well as, keeping up with their culture and respecting their ancient ancestor’s way of life which is to be respectful to your elders and superiors. As, in the novel a good fall (Ha Jin) The Bane of the internet where Yuchin is taking advantage of her elder sister who lived in the United State and disrespecting their culture to get what she wanted.…

    • 1391 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays