Social Security Analysis: Apple Vs. FBI

Improved Essays
Apple Vs. FBI

In today 's generation, many adults and teenagers keep everything from contact numbers to their social security numbers on their smartphones. When customers, including criminals and terrorists purchase their smartphones, they are buying it with the assurance that not some, but all of their information and privacy will be safeguarded. The issue occurring today deals with the suspected terrorist of the San Bernardino, California on December 2, 2015 shooting involving over 30 injured people. Syed Farook, the suspected terrorist Apple IPhone is locked with a 4 digit code password and the government wants Apple to create a backdoor operating system that allows them to computerize as many passcodes they can to unlock the terrorists
…show more content…
Subsequently, Apple creating a backdoor system will create a domino effect that will negatively affect not only IPhone owners, but all smartphone owners. Furthermore, according to source H “If Apple obeys the FBI’s order, it would set a dangerous precedent for the future, both brief claims…”, meaning that once Apple creates a backdoor system, the government now has proof that an alternative way to access the system is possible. Consequently, the next time an incident occurs like this but instead with a Samsung Galaxy, the precedent will mandate Samsung to also create a similar backdoor system. More importantly, according to source H, thirty two social media companies are siding with Apple on this controversy. Mindful of the possible precedent, a majority of these companies probably do not agree with the FBI because they could possibly ask these companies for the same information. In addition to this, the precedent might not seem like a big issue now, but when it begins to affect social media, and technology companies then it really would affect those who typically leave their information in the hands of …show more content…
As stated before, Apple 's best interest is to look out for their customers and the FBI has spent more time over simplifying the truth. The FBI handles their issues much more differently than Apple does, they claim that they only want one piece of software from Apple but later they will undeniably ask for more. Furthermore, according to source G, a similar case to that is the one of Lavabit, when the founder Ladar Levison had to install a pen to obtain the metadata which eventually resulted in his company shutting down. However the FBI demanded for Levison’s company encryption key, the same is likely to happen to Apple if they create the operating system. The FBI operates so they can get whatever they need from a company, whether it 's an encryption key or any additional needed information, they fail to keep in mind that these demands will deteriorate a majority of these companies customer’s privacy. In addition, the FBI has seemingly been aware that any backdoor operating system created would not only operate for this particular suspect 's IPhone. Source D, states “ Once created(backdoor operating system), the technique could be used over and over again, on any number of devices.”this means that once he FBI obtains this new IOS system, they would not have to ask for it again in another situation similar to

Related Documents

  • Superior Essays

    Domestic Wiretapping and Surveillance without a court order. Civilized human beings tend to discuss personal private information with each other everyday. Whether they want the information to be known or not by other people is out of their control. People conduct phone calls and texts messages with each other day in and day out. People assume that these are private one-on-one conversations with each other, but little do they know that there is a third party monitoring their conversations.…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Apple should not provide the encryption code to unlock the iPhone of Syed Farook- one of the San Bernardino Shooters. Though the U.S government is seeking this encryption code in the name of national security, this access to millions of American’s personal information can too easily lead to the compromise of people’s 4th amendment rights. Moreover, this access may increase the targeting of minority groups such as Muslim American and African Americans. Using examples from Rampage and The New Jim Crow, I will demonstrate that this breach of privacy should be avoided and prove that it is inessential to combating domestic terrorism.…

    • 1154 Words
    • 5 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Accessed 7 Mar. 2017. Landau, Susan. “The Real Security Issues of the IPhone Case.” Science, vol. 352, no. 6292, 17 June 2016, pp.…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    Iphones, Inc. Case Study

    • 1642 Words
    • 7 Pages

    A very recent topic that has been circulating in the news is the topic of the FBI and the company known as Apple. Apple is known for its many products ranging from iPhones, MacBook’s, and watches that most of you, I imagine, have. The controversy surrounds an iPhone 5c that was found to be the work phone of one of the two Islamic San Bernardino terrorists. The FBI is requesting that Apple creates a backdoor to install on the phone to disable its security features. Apple does not want to do this for privacy reasons.…

    • 1642 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Apple Vs Fbi Essay

    • 521 Words
    • 3 Pages

    This means that people's phones can hold personal information including financial records, friends, addresses, location data, personal photos and more”(Smith 7).One of the reasons supporters may take Apple's stance is because if Apple has the capability of creating a backdoor to their…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Dangerous Precedent

    • 985 Words
    • 4 Pages

    In the article titled “Forcing Apple to Hack That IPhone Sets a Dangerous Precedent”, Congressman Darrell Issa argues that protecting the privacy of millions of people should be more important that forcing Apple to unlock an iPhone that a terrorist used. Congressman Issa suggests that forcing Apple to create new software to unlock the device will put privacy of millions of people at risk. Congressman Issa writes this article in response to the controversial decision of the court to force Apple to create software to unlock a phone of a terrorist, who “killed 14 people” in San Bernardino (Issa, Paragraph 2). In the article, through the use of rhetorical question, simile and statistical facts, Congressman Issa is able to effectively show the readers…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Accommodating with this request, would lead to Apple consumers no longer having any privacy. If a judge says they want access to encrypted devices, and that access is granted, privacy no longer…

    • 534 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The semantics of the issue are the driving force behind the dispute between Apple and the FBI. One of Apple’s primary security features on their iPhones is the random, embedded encryption key that is generated at the time of production. This allows users to only have the ability to access their phones with the correct pin and encryption key combination. If the pin is entered more than ten times, the encryption key is erased, and even Apple claims to have no way to recover the data on the locked phone. The FBI wanted Apple to change this feature, so they can use traditional methods of trying many different access codes until the right combination is entered to access the phone (Michael).…

    • 489 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The current Apple case doesn’t involve a backdoor in the traditional sense. The FBI is asking Apple to create a tool that would circumvent a feature that deletes all of the information on the phone after 10 failed password attempts. Apple doesn’t want to break anyone’s encryption or set a master key loose on the land. Also, the authority over the master key that Apple would grant the FBI could be used again across a range of scenarios that weaken Apple’s privacy and security as well. 5.…

    • 701 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Imagine living in a world where the government had complete control and access to your personal secrets. This world might soon come upon us if we don’t take a stand against the F.B.I. The Federal Bureau of Investigation is convinced that they have the right to forcefully intrude on an individual daily life when they choose. In March of 2016 went against the F.B.I beliefs by sticking to its ideals and protecting individuals rights. Apple did this by refusing to help the F.B.I unlock an iPhone belonging to Syed Farook. In this writing I will focus on the importance of privacy, security, and consumer trust.…

    • 832 Words
    • 4 Pages
    Improved Essays