Argumentative Essay On Apple's Ios 8 Operating System

Improved Essays
In June, a father of six was shot dead on a Monday afternoon in Evanston, Ill., a suburb 10 miles north of Chicago. The Evanston police believe that the victim, Ray C. Owens, had also been robbed. There were no witnesses to his killing, and no surveillance footage either.

With a killer on the loose and few leads at their disposal, investigators in Cook County, which includes Evanston, were encouraged when they found two smartphones alongside the body of the deceased: an iPhone 6 running on Apple’s iOS 8 operating system, and a Samsung Galaxy S6 Edge running on Google’s Android operating system. Both devices were passcode protected.

An Illinois state judge issued a warrant ordering Apple and Google to unlock the phones and share with authorities
…show more content…
Between October and June, 74 iPhones running the iOS 8 operating system could not be accessed by investigators for the Manhattan district attorney’s office — despite judicial warrants to search the devices. The investigations that were disrupted include the attempted murder of three individuals, the repeated sexual abuse of a child, a continuing sex trafficking ring and numerous assaults and …show more content…
Recently, a suspect in a Manhattan felony, speaking on a recorded jailhouse call, noted that “Apple and Google came out with these softwares” that the police cannot easily unlock.

Apple, Google and other proponents of full-disk encryption have offered several rationales for this new encryption technology. They have portrayed the new policy as a response to the concerns raised by Edward J. Snowden about data collection by the National Security Agency. They say full-disk encryption makes devices generally more secure from cybercrime. And they assert that, if the companies had master encryption keys, then repressive governments could exploit the keys.

These reasons should not be accepted at face value. The new Apple encryption would not have prevented the N.S.A.’s mass collection of phone-call data or the interception of telecommunications, as revealed by Mr. Snowden. There is no evidence that it would address institutional data breaches or the use of malware. And we are not talking about violating civil liberties — we are talking about the ability to unlock phones pursuant to lawful, transparent judicial orders.

Advertisement
Continue reading the main

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    And my evidence is that only about 51% say that is should be unlocked and about 39% people say that they should not unlocked the phone. But the Apple company is like they should not give the software to the FBI but if they lose the case they will have to unlock the phone. But then the Apple company is have trouble with the FBI but the Apple company has some rules so that they will not unlock the phone. I wonder if the Apple company will still make a updated phone so that the FBI will not get in people phone any more. But I hope the FBI will leave the Apple compon alone and just find some hacker to open it.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The state prosecutor advised the police department to talk with the local cell phone carrier about “cloning” Mr. Doe’s phone. The cell phone carrier created a “clone” phone which allowed the police to read text messages sent and received by Mr. Doe. In no time the police had evidence implicating Mr. Doe as a dealer and…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    They should not discount any electronic device because it seems like it would not have data. Sources that should be responded to are any electronic devices that contains data such as desktop computers, gaming systems, laptops, e-mail, any information system, financial information system, human resources information system, learning management system, Internet service, network, television, chat logs, images, etc. Preserving evidence should be in the forefront of the investigators. If the incident is from a Federal…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    R-1 Narrative Report

    • 622 Words
    • 3 Pages

    C-2 confirms that they are selling the iPhone and R-1 asked to see it. C-2 hands the iPhone to C-1 and he gets out of the vehicle to show R-1 the phone. C-1 was then approached from behind by S-2 who put an unknown object in his back. C-1 turned around to see what was happening and R-1 snatched the iPhone from the C-1’s hand. S-2 fled in an unknown direction and R-1 fled southbound on 16th ST SE towards Minnesota Ave SE.…

    • 622 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The FBI Takes a Bite Out of Apple Imagine someone taking your phone and invading all your personal information. Thats was the Federal Bureau of Investigation (FBI) wanted to do to Syed Farook. Syed Farook is a gunman who killed 14 people. The FBI wanted Apple to write a new software so they could unlock Farook´s phone.…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Also they have invented a wiretap for busting any crimes such as planting bugs in certain rooms or chips right in the memory of your phone. This raises the question of “are we really free” or “I wonder what place doesn't have a microphone in it…

    • 544 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Cell Phones: An Annotated Bibliography The articles and studies below examine several different aspects pertaining to cell phones. In many of the studies below it can be seen that cell phones are not as private as one would think. With that said one would think that only hackers could evade your privacy true hackers are one, but Law enforcement is the biggest. Does Law Enforcement abide by the law or do they think that they are above the law.…

    • 945 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Dangerous Precedent

    • 985 Words
    • 4 Pages

    In the article titled “Forcing Apple to Hack That IPhone Sets a Dangerous Precedent”, Congressman Darrell Issa argues that protecting the privacy of millions of people should be more important that forcing Apple to unlock an iPhone that a terrorist used. Congressman Issa suggests that forcing Apple to create new software to unlock the device will put privacy of millions of people at risk. Congressman Issa writes this article in response to the controversial decision of the court to force Apple to create software to unlock a phone of a terrorist, who “killed 14 people” in San Bernardino (Issa, Paragraph 2). In the article, through the use of rhetorical question, simile and statistical facts, Congressman Issa is able to effectively show the readers…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    4th Amendment

    • 1476 Words
    • 6 Pages

    In the article “Can Your Phone Testify Against You” in the New York Times UPFRONT written by Patricia Smith she states that “Chief Justice Roberts acknowledged that the ruling will make things harder for police. Cell phones can provide valuable incriminating information about dangerous criminals he wrote but, he emphasized, privacy comes with a cost.” An example of how this can be useful is when a person wants to rob a bank or bomb a place. They might have some information that can help law enforcement stop them from committing the crime or can help catch them if they do commit the crime. Important information like where to meet up, where they are going to buy supplies, what day it’s going to happen and why they are doing it is all the information that they say should not be considered private and can be used to stop future crimes.…

    • 1476 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    New technologies are putting more pressure on the boundaries of privacy. New ways are emerging that aid in tracking private information on individuals. No matter what new technology emerges, individual privacy rights should be respected at all levels. Americans are concerned of how to maintain an equilibrium between their personal privacy rights and the need for government to track potential terrorist threats since Edward Snowden leaked National Security Agency's (NSA) documents which included collections of information regarding data from cellphone and internet of millions of Americans. Freedom, privacy and safety are the rights of Americans and should not be compromised to confirm safety from terrorism.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The appellant, Chester Comerford, was a licensed attorney and previous law professor who operated a website for a group whom he founded, called the guardians. The guardians questioned President Obama’s citizenship; in 2011 Comerford was convicted of aiding and abetting threats on the President, however the Supreme Court of the United States reversed his conviction the following year. After his conviction was reversed, Comerford went to a local merchant to purchase a smart-phone. Knowing that a phone could be tracked through GPS technology, Comerford disabled the GPS tracking capability, with help from online instructions.…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    We might detest how technology can track our daily lives in ways that might be deemed as unethical to many of us. Yet, when it comes to the greater good technology does definitely aid. Looking back into history, the development of a variety of technological devices have improved our security. CCTV footage helps immensely with surveillance; it helps identify individuals, deter robbery and produce a safe environment for society. In addition, digital footprints while collected without our consent inevitably helps locate and single out individuals that have malicious intentions.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays