Privacy Vs. Security Essay

Improved Essays
On February 16 Apple released a letter to all Apple customers explaining why they will not help the FBI create a back door to all iPhones. This poses a question to all smartphone users, whether privacy is more important than security. Apple stated that they will help the FBI try to find the passcode however, someone reset the phone which makes it harder. Privacy is crucial to America and the government should not get involved with citizen’s privacy because it violates our individual rights.
On December 2014 Syed Farook and his wife Tashfeen open fired at a Work Christmas party in San Bernardino, California as a part of a terrorist attack killing fourteen and wounding twenty-two ( Willens, 8). Investigators looked for personal electronics that
…show more content…
In October 2015 Apple opened a phone for the FBI when given a subpoena prior to iOS 8 (Willens, 12). However the FBI wants them to create a back door but they don’t have the technology to make a back door to iOS 8. The FBI brings up the All Writs Act of 1789 as their defense (Cook, 17). The All Writs Act of 1789 is used when the federal judge can make an individual do something within the limits of the law (Gent 6). This defense has caused many arguments regarding whether taking away law obeying individual’s privacy is within the limits of the law. However, if the department of justice force Apple to hack the phone the government would be violating Apple’s first amendment rights as a business (Willens …show more content…
James Comey, the FBI director, discussed that this problem should not be solved by a company that sells phones or by an agency that protects citizens but rather by the people their trying to protect. It should be up to the American people to choose what means more to them, security or privacy (Willens, 6). On the contrary, Apple believes that creating a back door could potentially cause the FBI to use that backdoor for evil. They would be allowed into anyone’s iPhone whether they were allowed to or not. Also, they could allow spyware onto users phones at any time. This can also be used to make other smart phone companies obligated to allow the FBI access into people’s phones. Darrell Issa, a Southern California Congress authority or security, told CNBC once Apple is forced to open the iPhone, they will be forced to do it again (Willens,

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    And my evidence is that only about 51% say that is should be unlocked and about 39% people say that they should not unlocked the phone. But the Apple company is like they should not give the software to the FBI but if they lose the case they will have to unlock the phone. But then the Apple company is have trouble with the FBI but the Apple company has some rules so that they will not unlock the phone. I wonder if the Apple company will still make a updated phone so that the FBI will not get in people phone any more. But I hope the FBI will leave the Apple compon alone and just find some hacker to open it.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    All Writs Act Case Study

    • 1295 Words
    • 6 Pages

    “It’s a huge ballooning of the scope of the AWA, and it sets a precedent for allowing the government to force Apple or other companies to modify their systems to allow access to your private data” (Panzario). With this precedent, not only will the government be able to force companies to create weakness in their software to allow the government to access, but also allow the government to get warrants for data even if it’s not necessary to help the investigation. Creating this could lead to a society where the…

    • 1295 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Also they have invented a wiretap for busting any crimes such as planting bugs in certain rooms or chips right in the memory of your phone. This raises the question of “are we really free” or “I wonder what place doesn't have a microphone in it…

    • 544 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The PATRIOT ACT violates the peoples Fourth Amendment which protects "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures . . .." by allowing the government to create an entire organization dedicated to essentially spying on the population of the United States, as well as creating several legal loopholes that allow the involved agencies to delay notification of a search or seizure. One of the redeeming qualities of the PATRIOT Act is the sunset provision which on December 31, 2005 terminated several of the amendments enhancing electronic surveillance…

    • 683 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Potapchuk, John L. “A Second Bite at the Apple: Federal Courts' Authority to Compel Technical Assistance to Government Agents in Accessing Encrypted Smartphone Data, Under the All Writs Act.” Boston College School of Law, vol. 57, no. 4, 2016, pp. 1403–1446. ABI/INFORM Global, doi:10.2139/ssrn.2768374.…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nelson And Rubio Essay

    • 629 Words
    • 3 Pages

    Dear Senators Bill Nelson and Marco Rubio, It has been brought to my attention that the Government has access to surveillance systems that can monitor our phone calls, text messages, emails and etc if needed. I agree that the government should have this right, but I believe there must be some strict guidelines placed in order to ensure the personal privacy of citizens. While discussing this topic, it may seem scary to think as a citizen, that everything in our personal lives isn’t as private as we imagined it to be. But, the questions we all seem to ask ourselves about this issue is, “Why is all of our information so important to the government anyways?” or, “I haven’t done anything wrong, so why would they need to look at my texts or listen to my phone calls?”, and last but not least, “How is this legal?…

    • 629 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Dangerous Precedent

    • 985 Words
    • 4 Pages

    In the article titled “Forcing Apple to Hack That IPhone Sets a Dangerous Precedent”, Congressman Darrell Issa argues that protecting the privacy of millions of people should be more important that forcing Apple to unlock an iPhone that a terrorist used. Congressman Issa suggests that forcing Apple to create new software to unlock the device will put privacy of millions of people at risk. Congressman Issa writes this article in response to the controversial decision of the court to force Apple to create software to unlock a phone of a terrorist, who “killed 14 people” in San Bernardino (Issa, Paragraph 2). In the article, through the use of rhetorical question, simile and statistical facts, Congressman Issa is able to effectively show the readers…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    According to the United Nations, privacy is basic human right that should be protected by law. The United States Constitution also implies a right to privacy in the Fourth Amendment. Recent laws passed by the government have raised questions about whether the government’s actions infringe upon a citizen’s right to privacy. The USA Patriot Act was the first of many laws that increased the powers of government organizations such as the NSA and the FBI. The law allowed these agencies to access private records of US citizens without the need of a warrant or judge’s consent.…

    • 716 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    After 9/11 occurred, the Bush Administration designed a law called the “Patriot Act.” The purpose of the Patriot Act is to surveil cellphones, tablets and anything that has a connection to the internet without you knowing. It is unconstitutional…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Violation Of The NSA

    • 1435 Words
    • 6 Pages

    But, can this action be declared as unconstitutional? Some people have grown to have a very serious problem with this action that the NSA is able to perpetrate. Some argue that the NSA’s ongoing right to view and collect media on cellular devices is in direct violation of the Fourth Amendment of the Constitution, which provides the civil liberties for individuals to be secure in persons, residence, and documentation as well as not being subject to unreasonable searches and seizures. In this paper, I will explore and discuss what rights we as people give up for a democracy, how privacy rights are not specifically stated in the Constitution, and how the NSA is not in violation of the Fourth Amendment.…

    • 1435 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Great Essays

    The Patriot Act Essay

    • 1646 Words
    • 7 Pages

    Where to begin with this clusterfuck of a law? I know! Let’s begin with the 4th Amendment of the Constitution, which states “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” B. What does the USA PATRIOT Act do exactly? As summarized by Huddy and Feldman, it is “the authorization of wiretapping of a suspect’s phone calls and e-mails, government access to a suspect’s medical, library, and financial records, and the detention without legal representation of citizens under suspicion.”…

    • 1646 Words
    • 7 Pages
    Great Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays

Related Topics