Privacy And Security

Improved Essays
Privacy is a right guaranteed to Americans under the Fourth Amendment of the United States Constitution. While items in the physical realm have be easily understood as being protected by this amendment, it is not exactly the case with digital items such as data and information files. As a result, technology companies such as Apple introduced encryption security measures to protect their information from being accessed. However, this has resulted in conflict over how to access data relating to crimes and similar heinous acts. An example of this is the conflict between Apple and the Federal Bureau of Investigation.
In February, a federal magistrate ordered Apple to assist the FBI in breaking the security measures of one of their iPhone devices.
…show more content…
Federal courts have struggled with the privacy implications of gathering and intercepting information on various devices, though progress has been made. In order to access information on computers, law enforcement officers had to obtain a search warrant. In addition, recent rulings have limited what type of information can be gathered and how certain information may be handled. Subpoenas must detail the actual risks of the information specified, and any data not important to the case must either be destroyed or returned to the respected party (Weinstein, Drake and Silverman 733-734). However, the radical shift to more handheld devices like smartphones has significantly changed the surveillance environment. People currently have the ability to store information in more places and communicate through connecting users through devices and applications. Information is not stored on hard drives, but rather in networks and online programs like cloud-based …show more content…
Other companies, such as Bank of America, American Express and Amazon, began using encryption on their website to protect information transferred between the company and the user, minimizing the threat that user data will be seized by hackers (Soghoian 374-375). Using a series of mathematical operations and algorithms, users can protect their data (Saitta). These algorithms are created through processes such as passwords, which are often created through a device or program user. Each password is individualistic and cannot be easily hacked through hacking software as a result of their unique nature (CGP Grey, “Should all locks have keys? Phones, Castles, Encryption, and You). When it comes to Apple, data was encrypted on the company’s line of iPhones by default beginning in late 2014

Related Documents

  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The book Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis has often given me the impression that this book was intended to warn its audience of the many dangers of technology, and that the benefits of using technology are not worth the risks. The book’s third chapter, “Ghosts in the Machine,” however, was different, because I noticed that the authors were just giving information about things that computers do that people may not realize, but not necessarily implying that all of these abilities are dangerous or harmful. For this reason, and for many other reasons, I enjoyed reading this chapter of Blown to Bits more than I have enjoyed reading any other chapter so far. The first topic discussed in this chapter left me with feelings of both concern and relief.…

    • 871 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    If the FBI were to receive a way to access this private information, it will be like we are giving a hacker, or a criminal, a password to all devices. In the article Apple states “Building…

    • 325 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Apple Vs Fbi Essay

    • 521 Words
    • 3 Pages

    This means that people's phones can hold personal information including financial records, friends, addresses, location data, personal photos and more”(Smith 7).One of the reasons supporters may take Apple's stance is because if Apple has the capability of creating a backdoor to their…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Potapchuk, John L. “A Second Bite at the Apple: Federal Courts' Authority to Compel Technical Assistance to Government Agents in Accessing Encrypted Smartphone Data, Under the All Writs Act.” Boston College School of Law, vol. 57, no. 4, 2016, pp. 1403–1446. ABI/INFORM Global, doi:10.2139/ssrn.2768374.…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    However, despite all of are major accomplishments in the past forty years, we’re facing a major problem with our privacy. As a result of almost 90% of Americans using the internet on a day to day basis, the Senate of the United States has just passed a resolution that removes our very right to privacy. As of matter of fact, the resolution known as “SJ Resolution 34” has been passed as a law and will remain a law until a supreme court justice deems it unconstitutional or the legislation repeals it. Presently, as of May…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    As Daniel Zwerdling states in his article, that “you can't claim that information is private" (NPR) If it has been shared with companies that hold the e such as phone companies, electric companies, etc. The government justifies the examination and seizure of personal records with this argument. As a result, with this view of the Fourth Amendment, the U.S. government has been able to conduct multiple investigations, including some that are relevant to terrorism and others that are…

    • 1215 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    According to the United Nations, privacy is basic human right that should be protected by law. The United States Constitution also implies a right to privacy in the Fourth Amendment. Recent laws passed by the government have raised questions about whether the government’s actions infringe upon a citizen’s right to privacy. The USA Patriot Act was the first of many laws that increased the powers of government organizations such as the NSA and the FBI. The law allowed these agencies to access private records of US citizens without the need of a warrant or judge’s consent.…

    • 716 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Apple should not provide the encryption code to unlock the iPhone of Syed Farook- one of the San Bernardino Shooters. Though the U.S government is seeking this encryption code in the name of national security, this access to millions of American’s personal information can too easily lead to the compromise of people’s 4th amendment rights. Moreover, this access may increase the targeting of minority groups such as Muslim American and African Americans. Using examples from Rampage and The New Jim Crow, I will demonstrate that this breach of privacy should be avoided and prove that it is inessential to combating domestic terrorism.…

    • 1154 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Patriot Act

    • 596 Words
    • 3 Pages

    A current court case is Doe v. Holder. This case challenges the constitutionality of someone authorizing the FBI to look at everyone’s records in secret without judicial supervision, including internet service providers and phone companies. The Patriot Act permitted the FBI to send national security letters to phone and internet companies along with libraries, banks, and many other businesses asking for the customer’s private information. On September 28, 2004, Judge Victor Marrero of the Southern District of New York took down the national security letter statute. Marrero said that the FBI’s application required a “compulsory secret, and was not a reviewable product of the information” because it violated the fourth…

    • 596 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    Privacy is not frequently undermined by a solitary great act, yet rather by a moderate aggregation of little unobtrusive acts. Every act may appear to be innocuous, yet in time the government will be watching and knowing every little thing about us. Solove states that even if you don't have anything to hide, the government can hurt coincidentally, because of mistakes or carelessness. All in all, he fights that when you comprehend the immeasurable measure of privacy concerns connected with government data gathering and observation, the nothing-to-hide argument is less powerful. This essay addresses the ramifications of proceeded with government data accumulation and reconnaissance, before these practices get to be marked into perpetual law as a major aspect of the USA Patriot Act.…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Introduction This article, Building A “Backdoor” To The iPhone: An Ethical Dilemma, discusses Tim Cook, CEO of Apple, ethical dilemma to safeguard its customer’s trust and digital privacy or assist the U.S. government and the Federal Bureau of Investigation (FBI) to gain access to an iPhone device used by a terrorist to commit a heinous crime against society in the city of San Bernardino, California. In addition, evaluate methods in which managers with power and responsibilities characterized by Badaracco, an ethics professor at Harvard University, as the “dirty-hands problem” and the “right-versus-right” difficulties where “the moral dilemmas of management are, at bottom, clashes among different, conflicting moralities, among very different…

    • 1298 Words
    • 6 Pages
    Great Essays