Preview

Apple's Main Policy Of Hacking Case

Good Essays
Open Document
Open Document
249 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Apple's Main Policy Of Hacking Case
Not only would Apple’s main policy of privacy be violated if they let the FBI hack into Farook’s phone, but it would have damaged the company and our rights all together. “Basic American rights were at stake, and the purpose of the law is to protect people’s rights” (“PRO/CON: Should Apple have resisted FBI pressure to hack an iPhone?” Newsela). Technically, Apple has a right to refuse the orders of the FBI that reflects their company in a negative way. If Apple would have accepted the order of the FBI, our rights as Americans would have been at risk. Moreover, not only would our rights as Americans be at risk, the entire company could have been damaged because of what the law was asking for. “The FBI did not ask Apple to turn over information

You May Also Find These Documents Helpful

  • Powerful Essays

    citizens, and the government would have too much capability to go behind our backs, unnecessarily, and spy on us. The Federal Bureau of Investigation has freely admitted that it has not launched or found any extensive cases through the Patriot Act’s privileges. (Ybarra, n.d.) The question is, though, if they can not find any cases of terrorism, smuggling, or organized crimes what are they doing? The Government is spying on us through every piece of technology that we own. They can find us within the blink of an eye through our cell phones, computers, and bluetooth devices. They can hack into any of our Facebook accounts, emails, internet search browsers. They can view a person through their phone or computer's camera without them even knowing. The government can also turn on your microphones through the same devices and listen to you and what you are doing at any moment. The National Security Agency has put its codes into Android's operating systems, hacking into three quarters of the world's smartphones. (Tyler Durden, July 9th,…

    • 3008 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The first reason is the Revolutionary War, this was a disagreement between Great Britain and the American colonies. The king himself had created a swamp of new buildings and offices. Hitler swamped and took them out. This is showing the colonies were in need of general searches. The British officers were just trying to received taxed goods. The next reason is Carroll v United States 1925. The United States supreme court was doing warrantless searches through automobiles. This is taking it too far, the US supreme court should not be able to go through somebody's vehicle without a warrant. There is no reasonable suspicion, this is just too far. Allowing Farook's Iphone to be unlocked allowed him to set up a terror attack. He was able to send drivers to locations and set up an attack. Apple took it too far and a chance of unlocking his Iphone to do…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The argument being presented in the given piece is the FBI asking permission from Apple to have the ability to access people’s private messages in their apple products. This argument came into conversation after the terrorist attack in San Bernardino, California. The author’s claim towards the argument is that the FBI should not be able to have the ability to tap into people’s individual cell phones. Although the FBI’s idea of decoding Apple’s encryption code in order to gain access to tapping into all iPhones under service, it seems that the cons outweigh the pros of this certain situation. However, there has to be a completely different way the FBI can develop a better way to combat terrorism without interfering with all of Apple’s customers.…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Syed Farook and his wife were shot after an attack in San Bernardino, California, during which 14 people were killed. A phone was recovered which the FBI says contains information which is critical to the case and has therefore requested that Apple give them access to the encrypted data contained in the…

    • 53 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    How comfortable would you be with a government having access to your personal information and data on your phone? A recent incident involving a terrorist attack in San Bernardino, sparked a controversy between Apple and the Federal Bureau of investigation. Following the attack by two individuals committed an act of terror, killing 14 people, the iPhone belonging to one of the terrorists was found. As you may know, your organization is requesting the court for Apple's forced assistance in weakening the encryption on an IPhone related to the San Bernardino terrorist attacks and supposedly has vital information on it. These terrorist attacks were performed by ISIS's lone wolves, named Syed Rizwan Farook, who owns the phone and Tashfeen Malik, his wife. In my opinion, the phone shouldn't be cracked for three reasons. First of all because it undermines America's founding principles and it…

    • 642 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fbl Vs Apple Company

    • 110 Words
    • 1 Page

    Security and privacy are the two rights that are always closely related but also with contradiction as they are both correct. They now are obviously shown in a big conflict and successfully cause a strong controversy upon the Apple Company and FBL. Apple refused a court order to help FBL unlock an iphone of Syed Farook, one of two shooters in the ISIS-inspired San Bernardino attack last year. Apple protests the FBL's request violate the privacy of its costumers while FBL says the purpose of doing this is for the public safety of every citizen. Whether Apple accept the order to allow the FBL to hack the iphone or…

    • 110 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    In 2010, it became legal for the National Security Agency (NSA) to access private email logs, social media accounts and other internet databases (Risen & Poitras, "N.S.A. Gathers Data on Social Connections of U.S. Citizens). Risen and Poitras (2013) explain that the intention of this change was to help protect the United States (U.S.) from future terrorist attacks and was for the general purpose of national safety. It is unclear how many terrorist attacks all of this new intelligence has actually prevented, however, it is very clear that the NSA’s actions are violating the privacy of not only American citizens, but everyone who lives on American soil. With the internet as a resource, this means that they can not only listen in to conversations, but access virtually any data that is entered via the internet. This includes credit card numbers, GPS coordinates, flight destinations, contact information for family members, personal pictures and much more. The NSA not only violates the constitutional rights of American citizens, it puts everyone in the country at great personal risk for crimes such as fraud and discrimination.…

    • 1348 Words
    • 4 Pages
    Better Essays
  • Good Essays

    The NSA infiltrating the United States citizen's technology such as cell phones and computers is unjustified because there are no filters for the NSA or knowledge of their investigation taking place. For example "In his interview with RT, Binney emphasized that the FBI does not filter email messages but obtains and stores all of a person's e-mails, and when he or she becomes a target, their entire records are extracted and analyzed for the desired information" (NSA Whistleblower). Coming up with filtering processes would allow them to save time and filter out the non-terrorist threats. Many people make mistakes under pressure, knowing the National Security Agency is hunting you down is tons of pressure ask Osama bin…

    • 456 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The information was gathered about this “hack” though Edward Snowden (Savage, et al 4). Snowden is a former NSA contractor, who has leaked over 200,000 documents to the press. Recently, Snowden is involved in the huge news story about the NSA hacking into Google and Yahoo and collecting data about millions of account users of these networks. He leaked stories to The Guardian and The Washington Post during his NSA career, because he knew something was happening that needed told to the public. They are supposed to protect our country by bringing in information to help take down potential or current terrorist threats, and, instead, the government is wasting money to have them spy on innocent citizens. So far there’s not even a good reason to it, because not every single person who owns a phone or computer is a threat. Some use these things to do homework and talk to people, without the worry of someone tracking their information and keeping it in data centers “just in case.” It’s all very…

    • 1637 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Edward Snowden’s leaked information includes the fact that the NSA is invading people’s privacy by intercepting their internet communications and taking in their cell phone data. The ninth amendment is that “the enumeration in the Constitution, of certain rights, shall not be construed to deny or disparge others retained by the people.” This means that rights owned by the people can not be denied by the Constitution. Privacy is a right owned by the people since it is protected and is forbid to be violated by the government, like other rights like the freedoms of speech, religion, and the press (Cole). Snowden revealed that the NSA captures billions of internet communications every day around America and the world along with cell phone data. Cell phones may store personal information, like someone’s email address (and the password) and birthday. If the NSA gets one’s email, they can find information in the emails about someone and what they are doing, which is usually private. This means that the NSA is violating the privacy of people. In addition, the NSA can also seize information from calls between people. Phone calls are usually something that are usually meant to be private between the people who are in the call. If the NSA took the information in the call, they are technically invading the privacy of people even if the information in the call is not private since the NSA would know what the two or more people are doing. Since privacy is a right of the people, the ninth amendment is being violated. Without Snowden, the world would not know that people’s calls and cell phone data are being collected by the NSA, and that our ninth amendment is being violated since we are being deprived of our privacy. Snowden’s leaked information shows he NSA is searching through internet communications and cell phone records of innocent and ordinary American citizens…

    • 1676 Words
    • 7 Pages
    Better Essays
  • Good Essays

    When Edward Snowden leaked internal National Security Agency documents to the American public, the result was outrage. This outrage was caused by the discovery that Americans were not free to have privacy on the internet and on mobile devices. Although the monitoring of communications undeniably created a higher level of safety, it was still widely opposed on the basis that the freedom of privacy was being violated. Society was presented with an unprecedented level of security that would make them safer, but it was thoroughly rejected because of the freedoms that were subsequently denied. In a clear chance to create a safer society, Americans viewed their individual liberties as being more important.…

    • 790 Words
    • 4 Pages
    Good Essays
  • Good Essays

    "Earlier this month, The New York Times reported that since shortly after the 9/11 terror attacks in 2001 the National Security Agency, whose mission is to monitor the communications of foreigners outside our borders, has been focusing its futuristic spy technology on Americans." The spying that should shock everyone all over the US. Now people cannot even talk on the phone or talk online without some government official spying all over the place. The first amendment is only a tool; if no people use it then the government does not have to follow it. The government wants to protect people by listening to everyone trying to catch terrorists, but it should not be at the cost of freedom. "The electronic eavesdropping was conducted under orders from the president…" The president is a major source to this dilemma. He is taking away the rights of people who are not there to stop him. "The president himself even summoned Times officials to the White House to persuade them not to go ahead with the…

    • 1386 Words
    • 6 Pages
    Good Essays
  • Good Essays

    After having an extended and acrimonious sparring with Apple, the FBI has paid an astonishing amount of more than $1 million to hack into the gunman’s iPhone used in the San Bernadino shooting. This ends a legal battle between the FBI and Apple but leaves the question of law enforcement access to information unresolved.…

    • 421 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NSA Pros And Cons

    • 514 Words
    • 3 Pages

    September 11, 2001 was the deadliest day for New York. Thousands died because of the terrorist attacks on the World Trade Center in New York City. Two planes crashed into the twin towers while a third crashed into the pentagon and a fourth into a field in Pennsylvania. Something this big could not have been decided that morning, it needed to be planned. All the people involved need to know what they were going to do. This meant they had to have some form of communication along the way, whether it was through calls or texts. Imagine if all of this could have been prevented. All those lives that were lost could have been saved. If only the NSA would have known. Even though it violates the privacy act of the constitution, it is better to be safe than sorry, potential terrorist attacks could be stopped, and it will not matter if you are not doing anything wrong.…

    • 514 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Take a trip down memory lane with these top cyber films. Designed for computer buffs, these movies range from spy thrillers to cyber crime movies. They were selected based on their excellent plot lines and portrayals of technology. Unlike typical movies, these films use computers the way they are actually used in real life with a few exceptions.…

    • 598 Words
    • 3 Pages
    Good Essays