Should Apple be able have the ability to access user’s phone?
By
Wales Merilien
Mr Wilson
English 4
3/14/17
(1) Apple shouldn’t have the ability to access user’s phones because of the invasion of privacy, the limitations & precautions that would be created for the user, and the sense of embarrassment to have complete strangers being able to view all your personal information. Apples terms and agreements are unfair to users because you don’t have no ultimatum especially when it comes too updating your phone they have access to your apps , pictures and other private things that you really can’t deny. Other invaders can’t access but apple People’s distress over the privacy of their communications has never been smaller. Whether the
…show more content…
Up until recently, agents of the government could generally file requests for court orders that, if approved, compel the companies to provide the requested information. Congress in the 1990s passed the Communications Assistance for Law Enforcement Act, to facilitate private-sector cooperation with law enforcement. This act required telecommunications companies to configure their systems in a way that would enable them to effectively respond to court orders. Five Simple Things Companies Should Do to Protect Their Computer Systems Apples’ Weakest Online Security Link: Their Encryption Code How to Get People to Take their policy Security More Seriously Encryption Uncoded: A Consumers’ Guide
Quiz On Data Privicy But apples predated email, cloud storage and social-media platforms. Officials now have to cope with situations and technologies that the law did not anticipate. Moreover, recent congressional proposals, such as the Secure Data Act, threaten to prohibit the government from requiring that companies design or modify communications systems or products to facilitate government requests for data.
Driven by increased concerns about government surveillance and consumer privacy, the technology industry has accelerated the deployment of advanced encryption technology for consumers and businesses. Apple Chief Executive Tim Cook has said that his company won’t even be able to comply with court subpoenas involving its iMessage
Apple introduced the Macintosh computer because it was symbolic item that would change the course of human history. No more boundaries, no more rules, and no more breaking the bond of privacy. When Steve Jobs started Apple, he not only introduced first-class technology, but he wanted everyone to feel a sense of their own privacy. He didn’t want people to give permission for Apple to monitor everything being done on Macintosh computers, or he didn’t want anyone to give access to other people through remote desktop that would allow people to work on each other’s computers (Cook). Privacy was a number one concern for Steve Jobs and it still is for Apple’s current chief executive officer, Tim Cook.
Federal supervision of electronics has been prevalent since the 60's, and has become increasingly intrusive with laws such as the ECPA and USA PATRIOT Acts. These laws authorized the legal surveillance of foreigners, and Americans abroad. However, with the Communications Assistance for Law Enforcement Act requiring communication companies to provide backdoors for government use, agencies such as the National Security Agency have abused their powers in secrecy. More recently, Edward J. Snowden released NSA files that revealed the agency to illicitly engage in unwarranted surveillance of Americans both abroad and at home. (Introduction to Domestic Surveillance: Current Controversies)
Now for the case that has kept the nation on the edge of their seats, we have Apple v. FBI. This has really split the nation as people are torn apart by wanting to side with the makers of their beloved iPhone or the government that has given many their freedom. This all started with a tragedy, unfortunately, the tragedy the San Bernardino shooting. After the terrorists were killed, the FBI obtained the iPhone from one of the shooters and believed that they could find more information in it. They turned to Apple in order to open up the phone, as iPhones are set to ‘self-destruct’ all data after 10 failed password attempts. Apple flat out refused. In a letter to the public sent out by Tim Cook, Apple’s CEO, said, “Once the... way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.” This essentially is saying that someone could come along after the phone had been
In December of 2015, 14 people were killed and more than 20 people were injured in one of California’s most deadly shootings in recent history. A couple, Syed Rizwan Farook and Tashfeen Malik, opened fire in a conference center in San Bernardino. The two were later killed in a shootout with the police. Their case didn’t end there. The FBI searched their house, in which they found much evidence to back that this was a terrorist plot. But a crucial piece of evidence which they found was Syed Farook’s iPhone 5C. In today’s society, phones contain more information about ourselves than even we can remember. Emails, messages, notes, bank details and much more can be found on our phone. So when the FBI was able to get hold of Farook’s phone, they were more than content. But there was one more hurdle in front of them: encryption. Since we have so much information on our devices today, we have to have some form of protection against people who want to steal our personal information, scammers hackers and many. Apple has done this by encrypting almost every piece of user’s private information on their devices. The FBI wants a way around this encryption so that they can retrieve important information on Farook’s iPhone. They want Apple to create a shortcut that would allow them to bypass all of the security on Farook’s phone, but Apple is refusing saying that they want to protect their user’s privacy. Is the FBI forcing Apple to create a
One of the bestselling portable device brands is Apple. Every Apple product made after the year 2000, other than the iPod Shuffle, has the ability to connect to the internet. With the ability to connect to the internet comes the liability of being monitored by the
Millions of American citizens rely on Apple to protect their data. This data includes private conversations via emails and text messages, bank account information and location data. It is protected under a security system called encryption; encryption prevents criminals from accessing this important information. In the letter “A Message to Our Customers”,
Nobody likes anyone going through their belongings; however, the FBI (The Federal Bureau of Investigation) was trying to force Apple to go through somebody’s phone. A phone is very important to a person, it is like somebody going through your bag, house, or anything you own. The FBI should have sued the Apple corporation, because the Apple corporation has it’s right to decline the obtainability to enter into citizens private information, it is violating human rights.
Apple should be forced to unlock an iPhone or not. It becomes a controversial topic during these years. Most of them are concerned with their privacy and security. Darrell Issa is a congressman and has served the government since 2001. Recently, he published “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent” in Wired Magazine, to persuade those governors worked in the Congress. It is easier to catch administrators’ attention because some of them want to force Apple to unlock the iPhone. Darrel Issa focuses on governors because he thinks they can support the law to make sure that everyone has privacy. He addresses the truth that even some of the governors force Apple to hack iPhones when they need people’s information. He considers maintaining people’s privacy as the primary purpose. He also insists that Apple should not be forced to use their information which could lead people’s safety. In “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent,” Darrell Issa uses statistics and historical evidence to effectively persuade his audience of governors that they need to consider Apple should force to hack or not because it could bring people to a dangerous situation and forget the purpose of keeping people’s privacy.
Meanwhile law officials are saying that the quality of their equipment to get into gadgets are low.But then Apple says that opening the phone leads to other problems like violation of the customer’s rights and privacy. Apple has protested that it is not right for the F.B.I. to go behind their back and have a third party join and decrypt the password.Apple also said that the government had forced them to try to open it for them and or to create a new way to unlock Mr.Farook’s phone and considered it to be forced speech and viewpoint of discrimination which violates the first amendment.The Apple had also said that the government had violated Apples Fifth Amendment right which says they allowed to dothings without the governments comments.They
According to Appleinsider.com, the privacy advocates at Apple argue that if the government is granted the right to access the information on that phone, it could be in violation of a couple privacy laws. For instance The Privacy Act of 1974. “The Privacy Act of 1974 provides safeguards against invasion of personal privacy through the misuse of records by Federal Agencies” (U.S. State Department, 2016). When this law was written, the definition of “records” obviously didn’t account for text messaging records. However, as the law is written, the government is not allowed to invade your privacy
In their letter to Attorney General Lynch, famous writers and artists- Apple supporters- compel him to end the Federal Bureau of Investigation’s efforts to force Apple to create a software that could enable the U.S. government to unlock any iPhone in “End Efforts to Compel Apple to Crack iPhone”.
The case of Apple Vs FBI is basically the FBI trying to have Apple change their operating system (OS) in their phones so they can be encrypted if they need to be. Currently, Apple phones are set up to protect against hacking. The FBI wants to gain this access so they can stop a terrorist from being able to use mobile technology as means of harm and to gain knowledge of what the attack could be.
And with 3 billion phone calls made and 150 billion emails sent to and from the United States every day, the collection of this personal data without specifying the limits to their searches is unclear and unjust. Google, Microsoft, Facebook, and Yahoo among many others have recently, under protection from the Obama administration, revealed details as to the statistics of government collection. Even our nation's biggest telecom companies, AT&T and Verizon, were obliged to work with the NSA, lately disclosing information on the filtering equipment they were necessitated to use. The storage of this data for prolonged periods of time also makes these companies and their users vulnerable to security breaches such as theft and attack by hackers; for example, the cyber-security firm Trustwave discovered a server on November 24, 2013 which contained the information of over 318,000 accounts on Facebook. This breach was evidently made possible by companies storing data for an unnecessary amount of time as well as a weakened encryption standard. Both were implemented and enforced by the NSA, and the forced retention this data for over five years not only renders this metadata vulnerable to theft or misuse, but has also not been proven to be notably valuable in thwarting terrorist attacks.
Many companies in United States and around the world have started to worry about the iPhone usage and how much they are becoming dependent by organizations in order to conduct their business. Landman (2010) stated, “The threat from accidental or malicious misuse by employees is a significant threat to business” (p. 14). For this reason, using an iPhone in the workplace is putting companies on alert because the owner of the iPhone can store volatile information about their place where they work. Any information about the company such as e-mails, photos, and other digital evidence used in the work place could be sent to their competitors and used against the company itself and these are real life dangers in the corporate world.
Apple is an extremely reputable company with many great technologies that many people throughout the world enjoy. They have advanced quite a bit since their beginning Macintosh computers a long time ago, and now sell smartphones and tablets, along with their own programs and software. Apple offers purchases on their devices through their programs such as iTunes and the App Store, however they always required a password in order to buy the product. One of their slightly new programs, iCloud, offers more freedom when trying to access stored data and passwords. With iCloud, everything a user inputs on their Apple device gets stored into the cloud, something that has become very popular even outside of Apple. With all of this personal data floating around, privacy and security questions begin to rise, and especially when certain incidents happen that stirs and worries everybody up. Apple’s iCloud software, while conveniently storing and sharing data, has been proven to be accessible by unwanted third parties.