Right To Privacy

Improved Essays
I believe everyone can relate to this scenario while growing up; in school, one friend made a mistake or broke school's law and all other friends were also held accountable for one's misdeeds. Apple Vs FBI case from last year feels the same way. One bad guy happens to own an iPhone and commits a crime, and now, FBI wants a backdoor to the iOS operating system so that they can unlock any iPhone for investigation and save bad actors from doing bad things. Apple fulfilling FBI’s request will put hundreds of millions of people at security risk, and it will open the door for massive surveillance which is essentially contradicted the idea of right to privacy and First amendment right to expression. FBI seemed to undermine everything in the name of …show more content…
But, is it the first time law enforcement agencies asked for help or backdoor in the system? No, this is not the first time and not the last time for sure. From the beginning of computing and Internet, Government has kept pushing such technologies that will allow them to do data mining about people, and the tech companies should cooperate with the law enforcement. In 1993, Clinton administration mandated that hardware manufactured in the USA will have embedded security chip call “Clipper Chip”. The Clipper Chip is a cryptographic device that supposes to protect private communication and at the same time give access to the Government and law enforcement officials using master key pairs upon the presentation of legal authorization. The master keys will be divided into two pieces and will be distributed to different Government agencies as a protection against the potential Government abuse and spying. The underlying security implementation and the cryptographic algorithm known as “Skipjack” were developed by the NSA, and it was secure enough to be considered as “Type 1” NSA product which can be used by the Government and the military officials for private and sensitive communication. The goal of that technology was to make it easier for the law enforcement officials to investigate something when needed and provide adequate protection from unwanted intruders. A New York Times article “Of Privacy and Security: The Clipper Chip Debate” from 1994 described the Clipper chip works this way,
“When two people decide they want to secure their communications, they activate their encryption devices. The devices exchange "secret" numerical keys and use the Clipper chip to encode and decode the voice message or data stream, making them gibberish to outsiders. Using current technology, an eavesdropper would be unable to crack the code without having access to the right

Related Documents

  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    The FBI Takes a Bite Out of Apple Imagine someone taking your phone and invading all your personal information. Thats was the Federal Bureau of Investigation (FBI) wanted to do to Syed Farook. Syed Farook is a gunman who killed 14 people. The FBI wanted Apple to write a new software so they could unlock Farook´s phone.…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Bryce Hickle Prof. Whitaker Rhetoric 14 March 2017 Apple v. FBI: Apple should have complied Syed Farook is one of the terrorists involved in the massacre that took place in San Bernardino in 2015 which resulted in the murder of fourteen people. Apple v. FBI was a legal dispute involving whether or not Apple should comply with a warrant demanding them to install a back door program into this dead terrorist’s cellphone. People who defended Apple’s position had made claims stating that it was legal for Apple to choose not to comply and that making a back door program would be either not possible, dangerous, or both. However, these statements are not true. Not only was it possible for Apple to comply with the FBI’s demands without endangering…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    After the attacks of 9/11, nearly 263 government agencies were reorganized as well as the creation of the Department of Homeland security, which nearly doubled the intelligence budget from 2001 (Freedman, 2011). Much of the technology used in surveillance efforts is off-the-shelf and is lacking in innovation. Moreover, the technological boom in the private sector has afforded the Government many avenues in which to collect information on private citizen including social media, cell phone records, GPS information, financial records, medical information and other third-party services that are capable of storing gigabytes of information on an individual (Shamsi & Abado, 2011). This notion leads to the issues of that information’s security…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    While the Fourth Amendment can slow the process of searches and seizures down, there are many more important things that it protects. The Fourth Amendment protects people’s privacy, protects citizens from being violated by unneeded searches and seizures, and also protects them from being arrested without a reason. Just as Obama states, he is committed to “keep the American people safe,” and “to uphold the…

    • 66 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    After September 11, 2001, many things changed in the United States. Because of the potential for additional attacks on Americans here and abroad, the government started monitoring conversations on the Internet and on cell /telephones of citizen of the United States. This monitoring of electronic devises was without the knowledge or consent of the owners. The National Security Agency or NSA was very good at keeping their surveillance a secret from the public but all things done in the dark come to the light sooner or later. The NSA has completed all three branches of the U.S. Government and the American people to reexamine their positions on surveillance as the threat of terrorism increases.…

    • 765 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Apple should not provide the encryption code to unlock the iPhone of Syed Farook- one of the San Bernardino Shooters. Though the U.S government is seeking this encryption code in the name of national security, this access to millions of American’s personal information can too easily lead to the compromise of people’s 4th amendment rights. Moreover, this access may increase the targeting of minority groups such as Muslim American and African Americans. Using examples from Rampage and The New Jim Crow, I will demonstrate that this breach of privacy should be avoided and prove that it is inessential to combating domestic terrorism.…

    • 1154 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Patriot Act reshaped the methods and collection techniques of government ordered surveillance (Welch, 2015). The Patriot Act enabled the government…

    • 231 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    After reading all things about the online privacy and freedom of speech, it can now cause someone to form an opinion on the big question. Should the people really have the right to the First Amendment or anonymity online? The strong arguments from both sides will always be building and building but a person cannot deny that everyone has the constitutional right to their freedom of speech. Although not mentioned in the First Amendment, for obvious reasons, if online is a place someone can speak in the U.S. then they are protected.…

    • 197 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    As you know, when you go to the doctor, you sign your rights to privacy. Which is actually patient privacy rights, the Privacy Act of 1974? Which lead into effect December 31st 1974. An Act to amend title 5, to safeguard individual privacy from the misuse of Federal records, to provide that individuals be granted access to records concerning them, which are maintained by Federal agencies, to establish a Privacy Protection Study Commission, and for other purposes.…

    • 532 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    There has been an increased interest and knowledge in relation to privacy rights and issues. The reason for this is that they are a fundamental right which ensures the personhood of individuals by allowing them to control who has access to personal information about them. Privacy issues are also of importance because it helps individuals avoid unwanted intrusions in their personal dealings. Consequently, for the reason that privacy is such a complex concept, there have been ongoing concerns and discussions in relation to the legal concept of privacy rights. Various theorists have provided their interpretation of privacy which includes an understanding of how privacy rights should be defined as well as what they should protect.…

    • 1075 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Iphones, Inc. Case Study

    • 1642 Words
    • 7 Pages

    A very recent topic that has been circulating in the news is the topic of the FBI and the company known as Apple. Apple is known for its many products ranging from iPhones, MacBook’s, and watches that most of you, I imagine, have. The controversy surrounds an iPhone 5c that was found to be the work phone of one of the two Islamic San Bernardino terrorists. The FBI is requesting that Apple creates a backdoor to install on the phone to disable its security features. Apple does not want to do this for privacy reasons.…

    • 1642 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    Assignment Submitted By Yours Name here Submitted To Yours Instructor Name here To Meet the Needs of the Course Nov., 2015. For this rhetorical analysis task, I have selected the article which is titles as Why Privacy Matters Even if You Have Nothing to Hide, written by Daniel J. Solove.…

    • 1428 Words
    • 6 Pages
    Great Essays