Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Apple vs fbi case study
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Apple vs fbi case study
2 Reasons Why FBI and US Government Are Trying to Enslave Apple; Edward Snowden was right It is safe to say that the FBI and the US Government are not seeing eye to eye with Apple at the moment. After the FBI ordered Apple to hack into one of their iPhones, Tim Cook expressed his opinions. He stated how this was chilling, and would completely undermine the freedoms that the government is trying to protect. The reason why the FBI and US Government are doing this is because of San Bernardino mass shooting. I also think that Edward Snowden may have said it best years ago. FIRST REASON: FBI TAKING APPLE TO COURT There was a mass shooting at San Bernardino where fourteen innocent people were murdered in cold blood. Well, the FBI and US Government
Can you imagine being convicted of first degree murder at only 17 years of age? Adnan Syed couldn't believe it either. In fact he was mortified when they charged him of brutally suffocating, his ex-girlfriend Hea Min Lee, to death. Adnan Syed was a pawn that the Baltimore detectives played with, a mere dupe to cast off as the true killer. Syed is like many Americans, he was never granted a fair trial. There is some actors that make Syed guilty, but perhaps it was just pure coincidence that got Adan wrapped up in this whole mess. One simply can't overlook the major factors that make him innocent enough to grant him a second trial. Adan has spent half of his life in prison, due to a wrongful conviction that happened many
In doing so, they used 3 different logical structures in their arguments: precedent, degree, and analogies. Tim Cook debated with a constructive argument, “to guarantee such a powerful tool isn’t abused and don’t fall into the wrong hands is to never create it” (The Guardian, 2016). This is an example of degree argument, as the audience will automatically agree with any arguments with less of bad things because it is good. Apple knows there are no other cases like this one, so there’s nothing to compare to. Letting the government into the iPhone only this one time can set a dangerous precedent that can potentially force Apple to force open every iPhone in the future at government request. This became a heated legal battle, granting the access in their products for law enforcement was compared to “a political question” by Apple with an analogy (Yadron,
“There are about 3 billion phone calls made within the USA every day” (Romano). Now picture you’re calling your friend on the phone. Sometimes we can take small privilege like this for granted. Now imagine that the government is listening to every single phone conversation that we make. Why wouldn’t this scare you? I know it terrifies me. Wiretaps are a problem that concerns every single person in the country. But it isn’t just wiretaps; with a program called Prism the NSA has obtained direct access to the systems of Google, Facebook, Apple, and other US internet giants (Glenn). Everything we search for on Google, every message sent or received on Facebook, every item purchased on Apple is all seen by the NSA. The government is overusing their power to spy on its citizens and it needs to stop.
Should Apple be forced to unlock an iPhone or not? It becomes a controversial topic during these years. Most people are concerned with their privacy and security. Darrell Issa is a congressman and has served the government since 2001. Recently, he published “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent” in Wired Magazine, to persuade those governors worked in the Congress. It is easier to catch administrators’ attention because some of them want to force Apple to unlock the iPhone. Darrel Issa focuses on governors because he thinks they can support the law to make sure that everyone has privacy. He addresses the truth that even some of the governors force Apple to hack iPhones when they need people’s information. He considers maintaining people’s privacy as the primary purpose. He also insists that Apple should not be forced to use their information which could lead people’s safety. In “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent,” Darrell Issa uses statistics and historical evidence to effectively persuade his audience of governors that they need to consider whether or not Apple should be forced to hack or not because it could bring people to a dangerous situation and forget the purpose of keeping people’s privacy.
Jerry Sandusky, Penn State football coach that was under the legendary Joe Paterno, founder of the Second Mile, a model citizen of his community, convicted on forty-five counts of child sex abuse (Crandall, Parnell, & Spillan, 2013).
Over 10,000 people a year in the United States are convicted of things they did not do. Hae Min Lee was a 18 year old teenager at Woodlawn High School when she suddenly disappeared and then later found dead in Leakin Park. Serial is a podcast along with Undisclosed that goes in depth to look at the investigation through the case and to prove Adnan Syed innocent. Adnan Syed was a 17 year old muslim kid who went to Woodlawn High, he was also and track and lived life day by day pretty normal. Adnan's friend Jay claims he helped him bury the body of Hae and he becomes a main witness and every time he is interviewed his story changes up a bit. Adnan is wrongfully convicted there are so many signs that he is innocent.
According to John W. Whitehead, “The fact that the government can now, at any time, access entire phone conversations, e-mail exchanges, and other communications from months or years past should frighten every American.” (Whitehead). The NSA
In early June 2013, Edward Snowden, a 29-year-old former defense contractor who had access to NSA database while working for an intelligence consulting company, leaked classified documents reports that the National Security Agency (NSA) is recording phone calls of millions of Americans along with gathering private data and spying foreign Internet activity. The Washington Post later broke the news disclosed PRISM, a program can collect data on Internet users. The leaked documents publicly stated a vast objection. Many people were shocked by the scale of the programs, even elected representatives were unaware of the surveillance range. A nationwide debate over privacy rights have been sparked. Although supporters claim that the NSA only does its best to protect the United States from terrorists as well as respecting Americans' rights and privacy, many civil rights advocates feel that the government failed to be clear about the limit of the surveillance programs, threatening Americans' civil...
...d. The creation of the new operating system will also create a dangerous precedent for future companies that will affect everyone negatively. The risk that will arise from this conflict could possibly allow the FBI and hackers to all Apple customers privacy. Though making the backdoor system would help the FBI obtain all necessary information regarding the San Bernardino Terrorists, this create a domino effect that will ultimately affect all people. The FBI claims that they will only use the operating system once if they receive it but prior evident proves that it will not be true. Apple has the legal right to refuse creating a new IOS software to get suspected terrorists IPhone because it will invade all privacy of all Apple customers, it will set a precedent for future companies, and the FBI will mislead Apple into believing they will not use the IOS system again.
Edward Snowden. This is a name that will be in the history books for ages. He will be branded a traitor or a whistleblower depending on where you look. Many Americans feel that Edward Snowden is a traitor who sold the United States’ secrets aiming to harm the nation. Others believe that he was simply a citizen of the United States who exercised his right to expose the government for their unconstitutional actions. It is important to not only know the two sides to the argument of friend or foe, but to also know the facts as well. My goal in this paper is to present the facts without bias and to adequately portray the two sides of the argument.
We all heard of 9/11. I mean who hasn’t heard of 9/11, do you guys know who planned and attacked the Twin Towers, the Pentagon and try to hit the U.S Capitol. It is Osama Bin Laden the dead terrorist and the leader of Al Qaeda. Osama Bin Laden is a terrorist that bombed the U.S and the western philosophy by attacking U.S embassies, the Oklahoma city suicide attack and a lot more suicide attacks that are really dangerous. He was born in Riyadh, Saudi Arabia in 1957 or 1958.
Edward Snowden said this just last year in 2013. The unconstitutional atrocity that is the NSA (National Security Agency) has not been ended since then. America and likely the world is being monitored by an agency of the United States government that has the ultimate power, information. Leaders and workers of the NSA should be punished heavily for millions of violations of the Bill of Rights and misappropriation of tax payers money.
The American government used to be able to keep the people in happy ignorance to the fact that they watch every move they make. After certain revelations of people like Edward Snowden, the public knows the extent of the government spying. On June 5, 2013 Edward Snowden leaked documents of the NSA to the Guardian (The Guardian 2). The whistleblower Edward Snowden revealed to the world how the American government collects information like cell phone metadata, Internet history, emails, location from phones, and more. President Obama labeled the man a traitor because he showed the world the illegal acts the NSA performs on US citizens (Service of Snowden 1). The government breached the people’s security, and now the people are afraid because everyone is aware of how the US disapproves of people who do not agree with their programs. Obama said that these programs find information about terrorists living in the US, but he has lit...
Digital privacy concerns, which have been a major issue in our country since 2001, increasingly violate our basic human rights as global citizens. The growing amount of government surveillance has manifested in the enactment of acts such as SOPA and CISPA. Although their intent on stopping digital piracy and attacks were clear, both were immediately met with harsh criticism; they allowed big corporations to violate our privacy rights by sharing our personal information with both other companies and the government. Our President, although publicly expressing his acknowledgement of the issue, failed to discuss an array of other pressing dilemmas regulated by the recently exposed National Security Agency (NSA), especially those involving the mass data stockpiles and the rights of foreigners against immoderate and disproportionate surveillance by the US. Furthermore, the intentions of the NSA still remain unclear; why is the collection and the extended retention of this data useful? Those in power believe that the collection of this information allows them to preempt terrorist attacks; a very difficult claim to prove. Our lack of clear answers demonstrate the need for a larger audience who support government transparency. The NSA’s misconduct has dealt multiple blows to the rights of millions both at home and abroad, and the amount of secrecy involving this agency shrouds it in obscurity, inhibiting public debate about these crucial matters.
This paper will examine the sensational highlight of the famous whistleblower Edward Snowden who has sent a massive shockwave around the world after exposing National Security Agency (NSA) global surveillance program which is known as PRISM which is used by the US government and private agency to monitor and record user’s activity on the internet not only on US citizen but around the world. This essay will examine the case studies of Edward Snowden and a will apply a set of comprehensive ethical methodology by Liffick top-down approach in investigating ethical scenario as follows: list participants and their action, reduce list through simplifying assumptions, legal considerations, list possible options of the participants, list