Essay On Backdoor Technology

Improved Essays
A company called Apple, has always blanketed every one of their customers with security and safety, although there is one minimal problem. Based off of the angry, concern-filled letter written by the CEO of Apple Company Tim Cook, the government is willing to take off the security blanket in hopes of cracking the San Bernardino case, while carelessly leaving many others at risk of being exposed. An idea of creating a backdoor technology will contribute to loss of people’s security and privacy rights, leaving a world destroyed by its own government’s actions and terrorism.
The FBI is planning to bypass the Congress using the All Writs Act of 1789 to access the information they strive for on the attackers’ iPhones. The All Writs Act of 1789
…show more content…
From Apple’s perspective, the FBI’s idea of creating a backdoor technology is a desperate and selfish move in the San Bernardino case.The FBI is certainly not showing respect to the privacy of many people around the world by demanding a one time free access into the attackers’ phones, as it may not truly be a one time thing and could happen again many times in the future. Imagine the backdoor technology being in the wrong hands. The people’s justice and security would soon be taken away as their lives on a single device would forever be exposed and stolen from many people like hackers, criminals, and even the government. It’s an act of ruthless obstruction of justice and civil liberty, regarding the FBI’s dismissal on how threatening and harmful their consideration of backdoor technology is for all the people in the world. Hence Apple’s strong-spirited patriotic support for the freedom and rights of people, as Apple strongly believes that the supposed “democratic” government should not force Apple or other companies to invade everyone’s privacy through the use of their

Related Documents

  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The FBI Takes a Bite Out of Apple Imagine someone taking your phone and invading all your personal information. Thats was the Federal Bureau of Investigation (FBI) wanted to do to Syed Farook. Syed Farook is a gunman who killed 14 people. The FBI wanted Apple to write a new software so they could unlock Farook´s phone.…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    After reading the article “Apple vs. The United States Government,” I agree with Apple’s stance. The San Bernardino shooting was a very tragic event that occurred last December and I do understand where the FBI is coming from, but they cannot expect Apple to risk the privacy of their customers.. There are many reasons why I agree with Apple’s stance. Smartphones have become a very sufficient part of people's lives, and we depend on them for almost everything. We have put forth our trust in these phones, by relying on them to keep all of our private information.…

    • 325 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    All Writs Act Case Study

    • 1295 Words
    • 6 Pages

    Up until now, the FBI has been working closely with Apple to help gain information from the iPhone that was needed to help insure national security. However, recently the FBI wanted Apple to create a new form of IOS, Apple’s operating system, that would allow for the FBI to input a passcode electronically and deactivate the limited amount of times you can put in a passcode before you are forced to wait a set time period. The FBI has gotten a warrant for Apple to unlock the iPhone,…

    • 1295 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    In The United States of America the National Security Agency has been working for ages to assure that the country is safe, but recently it has become a rising concern that they have overstepped their boundaries of American citizen’s privacy by operating surveillance technology all around the country and storing data form every phone call of citizens. With the American Citizens’ privacy at stake, each branch of government took its stand against the matter. The Judicial Branch has to come up with a legal compromise; the Legislative Branch and Congress are working to make surveillance laws that would better please its citizens, and the Executive Branch and the president have agreed to come up with an alternative to Section 215 of The Patriot Act. The Supreme Court has to establish a legal compromise to the surveillance of the American citizens considering it was said that what the National Security Agency/Central Security was doing went against Section 215 of the Patriot Act.…

    • 702 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Some have tried to claim that it was dubious as to whether it was even possible for Apple to create a piece of software that performed what the FBI was demanding. This is a much more logically consistent counter argument because one cannot do the impossible, but the counter argument can be refuted via induction. Apple could automatically update iPhones without permission (Landau 1398). Apple has automatically updated iPhones without permission in the past (Landau 1398), and so Apple could do so again to install this back door. Also, based on the research lead by Dr. Choi (an expert in computer engineering), updates to the firmware of the smart phone could be utilized to create a back door program (39).…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Decent Essays

    Killer's Phones

    • 130 Words
    • 1 Pages

    The government is attempting to find information on a killer's phone according to the New York Times article In Nods to Law Enforcement in Apple Case, by Julian Sanchez. President Obama tries to end the straddle for privacy to divide. President Obama is trying to convince Apple to get into hacking a terrorist phone named Sayed Rizwan Farook, who resides in San Bernardino, California. The NY Post "Can an 18th Century Law Force Apple into Hacking Killer's Phone?" by Shear D. Michael…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Apple and the FBI are in a dispute over whether or not Apple should unlock one of the San Bernardino shooters phones in order to obtain personal records regarding potential terrorist activity. Apple believes they should not have to disclose this information and unlock the phone because it violates their “terms and agreements”. However, the FBI thinks Apple should unlock the phone because it will let them retain vital and personal information about the shooters. According to CNN writer Mike Rodgers, “The FBI was unable to access the encrypted smartphone to map the terrorist's connections to ISIS…” The FBI asked apple for help but they refused.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The National Surveillance Agency was birthed as a result of alarmist politics. The terrorist attacks of 9/11 inspired a governmental overhaul of its security measures. With the entire world in shock, the United States federal government approached security threats with new governmental programs designed to protect the public. Although the public did not learn about this program until a few years after it was created, this program was the United States’ preemption against terrorists and enemies alike. Several years have gone by since the program was known to the public, and as a result, many individuals and courts have seen the detrimental harms that the NSA has done to the rights of people.…

    • 1412 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Dangerous Precedent

    • 985 Words
    • 4 Pages

    In the article titled “Forcing Apple to Hack That IPhone Sets a Dangerous Precedent”, Congressman Darrell Issa argues that protecting the privacy of millions of people should be more important that forcing Apple to unlock an iPhone that a terrorist used. Congressman Issa suggests that forcing Apple to create new software to unlock the device will put privacy of millions of people at risk. Congressman Issa writes this article in response to the controversial decision of the court to force Apple to create software to unlock a phone of a terrorist, who “killed 14 people” in San Bernardino (Issa, Paragraph 2). In the article, through the use of rhetorical question, simile and statistical facts, Congressman Issa is able to effectively show the readers…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    NSA Should be Shut Down The National Security Agency (NSA) is created in 1952 to protect national communication systems and seek information about foreign government’s secret communications. The organization consist a large amount of the workforce, which they design cryptographic systems to guard national security and spy on foreign governments’ movements. However, NSA became more strict with tighter security on all the American citizens after the 9/11 attack. NSA has taken away people’s freedom by spying on everyone’s action in the United States, and the Patriot Act legalized the NSA invasion on the citizens’ privacy (Rouse).…

    • 996 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Surveillance has presented numerous challenges to the right of privacy. There is a need to develop a high technology surveillance system that will come with great benefits without intrusion. With new advances in technology each day, it is becoming easier to communicate with each other. Yet with all these new forms of communication there have been unpleasant side effects, since this new advanced technology is not only for harmless interactions between one another it is also used to plot against governments and countries. Governments have found themselves under attack a countless number of times and have had no other choice but to resort to monitoring their citizen’s online and phone activities.…

    • 729 Words
    • 3 Pages
    Improved Essays