Apple Vs. FBI: Do You Need Privacy?

Decent Essays
FBI wanted Apple to help them unlock the iPhone. Currently, iPhone can be locked using four digits PIN, and Ten incorrect PIN will lock the phone and erase all the encrypted data permanently. Apple sells millions of iPhone every year, and their customers can be a good guy or maybe a bad one. That means a terrorist also can have an iPhone with strong encryption and proper system security implementation. When something bad happens or law enforcement authority wants to eavesdrop on a private conversation, or maybe want to collect data, strong encryption makes their job much more difficult. According to the “Apple vs. FBI: All You Need to Know” report in CNBC, "Law enforcement authorities say that encryption used by the likes of Apple makes it …show more content…
Apple helping FBI with one iPhone was just a slippery slope because Apple pointed out that NY alone has 175 iPhone that needs to be unlocked and the Government wants Apple 's help. In the court ruling process, earlier case ruling can be used as guidance for a future ruling. Once a court ruled one way, another court follows that as precedence. Apple does not want to set any dangerous precedents by creating a backdoor in iOS so that FBI can use that case as precedence to force other tech companies to cooperate with FBI in such a way which may not be in the company or their customers ' best …show more content…
Taking a chance on Government, giving them the backdoor to the systems, and allow massive surveillance, does that work? There are some people, when they are asked whether they care about rights to privacy or should they be concerned of Government surveillance, their typical answer is, they have nothing to hide therefore, they are not fearful of those so-called data collection, profiling, or surveillance. That argument is further enforced by this logic that the only people would be concerned of profiling or surveillance are the one who engages in illegal activities. The opponent of the right to Privacy always gives the argument that Government’s primary job is to provide protection to its citizens. However, for the sake of security and feeling do nothing to hide, does the invasion of privacy, weakening the security by creating a backdoor in the systems, or massive surveillance really works? No really. According to the “What the government should’ve learned about backdoors from the Clipper Chip” article in ArsTechnica, Whitfield Diffie, one of the creators of the Diffie-Hellman Protocol for secure key exchange, spoke to a congressional hearing against backdoors in the system and his main points

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    And my evidence is that only about 51% say that is should be unlocked and about 39% people say that they should not unlocked the phone. But the Apple company is like they should not give the software to the FBI but if they lose the case they will have to unlock the phone. But then the Apple company is have trouble with the FBI but the Apple company has some rules so that they will not unlock the phone. I wonder if the Apple company will still make a updated phone so that the FBI will not get in people phone any more. But I hope the FBI will leave the Apple compon alone and just find some hacker to open it.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Apple Vs Fbi Essay

    • 521 Words
    • 3 Pages

    The issue of “Apple V.S The FBI” is should Apple create a program that can break into a terrorist phone. This is an issue because this could solve many terrorist problems but could also compromise the personal info and safety of Apple customers. From the reading “Apple VS The FBI” that “People's phones are a record of their most intimate thoughts and personal information”(Smith 7). This means that people's phones can hold personal information including financial records, friends, addresses, location data, personal photos and more”(Smith 7).…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Some have tried to claim that it was dubious as to whether it was even possible for Apple to create a piece of software that performed what the FBI was demanding. This is a much more logically consistent counter argument because one cannot do the impossible, but the counter argument can be refuted via induction. Apple could automatically update iPhones without permission (Landau 1398). Apple has automatically updated iPhones without permission in the past (Landau 1398), and so Apple could do so again to install this back door. Also, based on the research lead by Dr. Choi (an expert in computer engineering), updates to the firmware of the smart phone could be utilized to create a back door program (39).…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Espionage dates back to ancient China, India, and Egypt. Greece and Rome also made use of spies and assassins. Espionage is associated with conflict and war, however, in modern times, nations have been spying on their own people. Not with people on foot with binoculars and other gadgets, they spy from miles away, through the internet and phone taps. The most controversial of the espionage programs has been the United State’s National Security Agency, or NSA for short.…

    • 1003 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Patriot Act Pros And Cons

    • 449 Words
    • 2 Pages

    The Patriot Act (which was supposedly intended to protect the innocent citizens of america from “harmful” terrorists) was enacted just one short month after a series of terrorist attacks took place, including the 9/11 attack and the anthrax mailing at the Senate building in Washington. Congress was scared into believing that the only possible solution to preventing this from happening again would be to vote for an act that seemed like the smart political move at the time (only when explained by the right people of course). I, however, think that the Patriot Act does not have american citizens’ best interest at mind because it allows the privacy of americans to be invaded by the FBI based on their biased and racist opinions, all while wasting countless resources and hours investigating innocent citizens.…

    • 449 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    4th Amendment

    • 1476 Words
    • 6 Pages

    Bill of rights Introduction In December 1791 the states agreed to the 10 amendments to the Constitution now known as the Bill of Rights. At the time these 10 amendments were only applied to white males. Slaves, free black men, and women were excluded from these 10 amendments. The purpose of this document was to defend the citizens because the anti-federalist wanted to make sure that the central government wasn’t too powerful.…

    • 1476 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    *The NSA shouldn’t be spying on citizens because it is a violation of the U.S citizens rights, causes a psychological affect, and they have an inefficient system that wrongfully accuses people *. The NSA and telecommunication companies are betraying people’s trust by violating their privacy. One major telecommunication company…

    • 816 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    The surveillance program is effective with preventing terrorist attacks, but this violates the Fourth Amendment right because they are collecting data from everywhere and everyone around the country. According to the News Team staff of cfr.org people are starting to revolt against these outraeous and unlawful actions. Judge Richard J. Leon said “ surely such a program infringes that degree of privacy, that our founding fathers enshrined in the Fourth Amendment” (www.cfr.org). After, the exposure of the NSA in the mid-2013 American citizens have started to protest against these unlawful actions and development movements to protect their right of…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Apple should not provide the encryption code to unlock the iPhone of Syed Farook- one of the San Bernardino Shooters. Though the U.S government is seeking this encryption code in the name of national security, this access to millions of American’s personal information can too easily lead to the compromise of people’s 4th amendment rights. Moreover, this access may increase the targeting of minority groups such as Muslim American and African Americans. Using examples from Rampage and The New Jim Crow, I will demonstrate that this breach of privacy should be avoided and prove that it is inessential to combating domestic terrorism.…

    • 1154 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Great Essays

    Americans have long valued their constitutional rights, which ensure them a certain degree of independence and protection from mistreatment by the government. The fourth amendment ensures that citizens are not searched without reason or in an unlawful way--this guarantees that one’s person or property is not searched without a warrant or probable cause. When it comes to technology, however, the line begins to blur. The exponential growth of technology within the 21st century alongside the growing threat of terrorism has led the government to conduct surveillance and searches through technology. Laws and acts such as the USA PATRIOT act have granted the government increasingly more freedom to gather information through technology.…

    • 1488 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    Maybe, they just concentrate on the gathering and utilization of personal data. He contends that the procedure of information stockpiling and investigation makes power unevenness between individuals and the government. They gather little, apparently harmless, bits of information about us, which they consolidate together to make suspicions about our lives. Since we don't know about the data that they have, and in light of the fact that this data has been taken outside the realm of relevance, we are not able to adjust any mistakes or misguided judgments that the government may have about our actions. Solove discloses how the nothing-to-hide argument concentrates just on maybe a couple moment sorts of privacy issues, while overlooking the others.…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays