In their letter to Attorney General Lynch, famous writers and artists- Apple supporters- compel him to end the Federal Bureau of Investigation’s efforts to force Apple to create a software that could enable the U.S. government to unlock any iPhone in “End Efforts to Compel Apple to Crack iPhone”.
The signees begin their letter with an immediate call to action to the attorney general followed by a concession of their shared horror and outrage with the recent terror attacks in San Bernardino acknowledging the “need to ensure strong protections for national security” (PEN America). Contrasting the concession, the authors insert their first claim, “what the FBI is asking Apple to do would erode vital U.S. values… and could endanger writers and human rights advocates in [other] countries…” (PEN America). This suggests they have temerity in order to protect not only human rights but also future rights stay intact.
…show more content…
Specifically, they cite PEN America’s own surveys of writers around the world which show that “mass government surveillance… prompts writers to engage in self-censorship, avoiding writing or speaking about certain topics” in order to remind Lynch that artists will stop debating controversial topics, making those topics like abortion taboo and keeping civilians less informed (PEN America).
The signees concede with the government, FBI, and U.S. citizens regarding terrorism. They agree all of them “want to take aggressive steps to reduce the threat of terrorism” suggesting that the authors can see both sides of the argument so Lynch will listen to their request for an end to the FBI’s efforts to force Apple to create the software.
The writers moralize that the government’s duty is to “preserve and protect [the] constitution” and assume the government has forgotten their main duty: to protect the Constitution they feel, they must remind Lynch of his obligations to the United States (PEN
In the aftermath of the September 11, 2001 terrorist attacks US Congress passed legislation known as the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 commonly known as the USA Patriot Act. This paper will attempt to prove that not only is the USA Patriot Act unconstitutional but many of its provisions do nothing at all to protect Americans from the dangers of terrorism.
Look around you America. Your world is changing. Suddenly it’s no longer safe to fly in airplanes, attend sporting events, or just open your junk mail. Almost daily, news of threats and security breach’s litter the airwaves, leaving many asking the same question. “How can we make our country safe again?” Unfortunately, there isn’t a simple answer. America is united in the cause, but divided over the methods of preventing terrorism. At this time of uncertainty, many are urging Americans to “give up” some of their freedoms and privacy in exchange for safety. Regrettably, this wave of patriotism has spilled over, and is beginning to infringe on our fundamental liberties as outlined in the Bill of Rights. Since the September 11th terrorist
Now for the case that has kept the nation on the edge of their seats, we have Apple v. FBI. This has really split the nation as people are torn apart by wanting to side with the makers of their beloved iPhone or the government that has given many their freedom. This all started with a tragedy, unfortunately, the tragedy the San Bernardino shooting. After the terrorists were killed, the FBI obtained the iPhone from one of the shooters and believed that they could find more information in it. They turned to Apple in order to open up the phone, as iPhones are set to ‘self-destruct’ all data after 10 failed password attempts. Apple flat out refused. In a letter to the public sent out by Tim Cook, Apple’s CEO, said, “Once the... way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.” This essentially is saying that someone could come along after the phone had been
The backdoor it too dangerous to be created and could fall into the wrong hands.
In the year 2015, with new technology and social media citizens of Americans can see terrorist acts on a daily basis. They feel as if the Patriot Act doesn’t work and they think that it doesn 't need to be used anymore. They believe it is an invasion of privacy. However, we need this act for our protection. For example, the group ISIS in Iraq and Syria, is a terrorist group. They have plotted schemes to attack the US. This Patriot Act has caught many people trying to get to ISIS as well. The US has a population of about 319 million. 365 days a year the government is scanning phone calls, text messages and social media in order to catch possible terrorist attacks. Before the Patriot Act this would not be possible. In 2011 President Barack Obama signed to extend the Patriot Act. That year 42% of the politicians said that the act was a necessary tool ( PewResearchCenter Public Remains Divided Over the Patriot act (pewresearch) 15, February 2011 13,May 2015). Overall the Patriot Act is still necessary for the world we live in.
The United States of America is undoubtedly one of the world’s largest and most powerful nations. However, it has been facing the problem of terrorism for many decades, most notably after the tragic events of September 11th. The Patriot Act was passed shortly after these events in response to the acts of terrorism witnessed by the whole nation. At the time, it seemed rational and logical to allow this bill to pass, due to the extreme anger of American citizens, and the willingness to fight against terrorism. However, certain breaches of privacy came with the introduction of the Patriot Act. We as Americans want to feel protected from the threats of terrorism, however, we are not willing to give up certain privacies and liberties in order for that to happen, even when put to a vote.
The FBI, a institution that violates the privacy the public in thousands of ways is trying to have another way to do it, only this time, it is reasonable. They want Apple to create a software to disable the wipe-out function when the security code is entered incorrectly 10 times. This will help the FBI access information that could be very important about serious events such as terrorist attacks, murders, etcetera . It has been brought up recently because the San Bernardino shooters phone is in the possession of the FBI and it could have information about who else was involved, or have information on future attacks. Apple does not want to do this, they believe it is an invasion of privacy, but the creation of the software is essential in the case, and will help with many other cases in the future.
President Bush intended through legislation, to aid federal agencies in identifying potential terrorists and to ultimately protect this country from possible potential terrorist attacks in the future (Banks, 2010). Both individuals in power and ordinary citizens were greatly supportive of giving up certain liberties and privacy in order for the protection of the greater good. However, The Patriot Act was extremely controversial and advocates feared that power could be abused and that non-threatening citizens were being examined for crimes in which were not terrorist related (Sievert, 2007). Additionally, the most controversial aspect of The Patriot Act was the fear of privacy in relation to the first and fourth amendment (Xhelili and Crowne,
This paper will outline portions of the USA PATRIOT Act, how said portions are unconstitutional and how they have been largely ineffective. The paper will also discuss how the federal government needs to adopt a more transparent system for how federal agencies collect intelligence. Citizens of the United States should not be treated like terrorist suspects without probable cause. The federal government should only legally target those persons who are suspected of terrorism and not spy on every U.S. citizen who uses phones and email to communicate.
On December 2, 2015, Rizwan Farook and Tashfeen Malik walked into a federal building and killed 14 people and injured 22. The couple fled in an SUV and later got into a shootout with police officers and was killed in their vehicle. I don’t want to take away anything from the victims of this horrible tragedy, but this set the stage for the huge battle between a tech giant in Apple and the Federal Bureau of Investigation (FBI). During the FBI investigation, it was discovered that the male suspect Rizwan Farook had in his possession a locked IPhone-5C running the iOS 7 operating system. The FBI quickly discovered that this phone would be very difficult to unlock, so they decided to turn to Apple for help in solving this issue.
After the devastating attacks on the United States on September 11, 2001, this country scrambled to take action to provide future protection. New techniques had to be developed to protect the nation from the menace of terrorism. Along with the new techniques came the decision to enact laws that some believed crossed the threshold of violating civil liberties this county and those living in it were guaranteed by the Constitution of the United States. “On October 26, 2001, the Public Law 107-56, Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, also known as the USA Patriot Act, was signed into effect” (Stern, 2004, p. 1112). While speaking to Congress,
Digital privacy concerns, which have been a major issue in our country since 2001, increasingly violate our basic human rights as global citizens. The growing amount of government surveillance has manifested in the enactment of acts such as SOPA and CISPA. Although their intent on stopping digital piracy and attacks were clear, both were immediately met with harsh criticism; they allowed big corporations to violate our privacy rights by sharing our personal information with both other companies and the government. Our President, although publicly expressing his acknowledgement of the issue, failed to discuss an array of other pressing dilemmas regulated by the recently exposed National Security Agency (NSA), especially those involving
In today’s society, technology has become one of the most used and most sought after developments of the millennium. In a recent case the FBI petitioned for Apple to unlock the phone of Syed Farook, the man responsible for shooting and killing 14 people in San Bernardino, California. The FBI believed Apple should create a new software that would not erase the data from iPhones after ten failed attempts to unlock the phone. Apple replied that they had a responsibility and an obligation to protect the privacy of their customers. Supporters of Apple 's response have argued, creating a new software was not a wise decision. In the past, government agencies have been known for their abuse of power. Had Apple chosen to create a master key for this particular case, there would be no limit to government invasion of privacy. In the end Apple could have potentially lost costumers by changing the protection of their cellular products. The issue has already been raised that creating software to access one locked device could potentially open the door for hackers to invade millions of other people’s devices. I agree that Apple should not create a new software to unlock the phone because once a master lock is created there are no limitations to who or how the coding can be used.
Johnson, Jon Swartz, K., Cava, M. D., & Swartz, J. (2016, March 29). FBI hacks into terrorist's iPhone without Apple. Retrieved September 26, 2016, from http://www.usatoday.com/story/news/nation/2016/03/28/apple-justice-department-farook/82354040/
The recent case between the FBI and Apple brought a worldwide ethical dilemma into the public eye, and it could have detrimental effects to the entire tech industry. The FBI wanted Apple to create backdoor access to encrypted data on one of San Bernardino shooter’s iPhones, and Apple refused just as many other large tech companies such as Amazon and Microsoft are doing nowadays. This situation creates the ethical dilemma of whether the government should have complete access to all encrypted data, and how consumers will react knowing their private data is not actually private.