In this age of rampant digital communication, cellphones play an ever increasing role in the lives of people around the world. This can lead to major controversies surrounding them and their use. One of the big stories on the news at the beginning of the year was the issue of the ongoing case between the FBI and Apple. Many people sided with the FBI, but many people also sided with Apple. What the case came down to, in the end, was this: how much privacy must be sacrificed for the sake of security? In the words of Benjamin Franklin “those who surrender freedom for security will not have, nor do they deserve, either one.” One of the first things one must understand is the case itself. On the 2nd of December 2015, Syed Rizwan Farook and Tashfeen …show more content…
With text messaging, email, and social media, all of which are already fairly popular, becoming more popular by the day, digital privacy is becoming a vital issue. This is why the problem between Apple and the FBI is an important issue, and one that calls for attention. In the words of Middleton “The first thing many users do in the morning is check their BlackBerry, and the device remains with them throughout the day, until they go to bed.” The thing is, this is not a behavior limited to BlackBerry users. Many people who have cellphones, smartphones in particular, are practically attached to them at the hip. As a result of this level of dependence, many people have a veritable boatload of information on their cellphones. Credit card numbers, important emails, all of their contacts, to name but a few. Some people have their entire lives stored on their phones. If it is a phone used regularly for business, it may have most to all of the business’ pertinent information stored on one device. This is why cell phone security, and being able to trust that the information on your phone is being kept safe, is so important …show more content…
It allows people to communicate with others across the world in a matter of seconds. This is why it is crucial for so many people and business to have safe, secure, and unfettered access to their phones. Simply put, digital communication is one of the most important extensions in this day and age. Thus, the desire of the FBI to have a program that allows them unrestricted access to iPhones is not only wrong, but dangerous. At the risk of sounding paranoid, there are many who believe that this could open iPhone users up to hacking. Not to mention the risk associated with enemy nations getting access to a program such as the one the FBI wanted, which some feel is a potential
Should Apple be forced to unlock an iPhone or not? It becomes a controversial topic during these years. Most people are concerned with their privacy and security. Darrell Issa is a congressman and has served the government since 2001. Recently, he published “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent” in Wired Magazine, to persuade those governors worked in the Congress. It is easier to catch administrators’ attention because some of them want to force Apple to unlock the iPhone. Darrel Issa focuses on governors because he thinks they can support the law to make sure that everyone has privacy. He addresses the truth that even some of the governors force Apple to hack iPhones when they need people’s information. He considers maintaining people’s privacy as the primary purpose. He also insists that Apple should not be forced to use their information which could lead people’s safety. In “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent,” Darrell Issa uses statistics and historical evidence to effectively persuade his audience of governors that they need to consider whether or not Apple should be forced to hack or not because it could bring people to a dangerous situation and forget the purpose of keeping people’s privacy.
The people’s apprehensiveness does not come from the government’s ability to monitor their phone calls. It is the idea that they are listening to their individual conversations. The government needs to communicate to its citizens on the capabilities of the program. Most of the information on the limits of PRISM has come from the data leaks of Edward Snowden. The common consensus is that the government is able to access information by merely advising a meeting with a judge that is not withheld to the public. However, contrary to the popular belief that they are listening to phone calls, they are merely collecting the date and length of each phone call (Stray).
Works Cited for: Caplan, Hayley. How to Avoid Cell Phone Identity Theft? What Is Privacy? N.p., 31 July 2012. Web.
The first reason why Apple should not create a backdoor is because Apple IPhones were created with their customers privacy in mind. Apple, a well known billion dollar company have been so successful at keeping their customers privacy protected. The privacy of personal information is very sensitive to Apple and the FBI should not be allowed to be able to obtain access to anyone’s personal info...
The San Bernardino vs Government case has been in the news for the last months since the terrorist attack last December. It has reminded the world the importance of encryption which is essential for our lives and privacy in this new era of technology. After the attack, the FBI asked Apple for help to access an iphone that belonged to Syed Rizwan Farook one of the perpetrators of the attack, Because the FBI could not access it due to the modern encryption and security features new iphones have. Apple was not completely oppose to help the FBI. The company helped with everything could without violating the privacy of its customers. Apple gave access to the backup data stored in iCloud from Farook’s iphone, but the data obtained was six weeks prior to attack. The FBI still needed more private information from the iphone such as, texts, phone calls and GPS locations after the attack. Apple is now being forced by the federal court to create a software to bypass the security features of the iphone to completely access its data. Apple is refusing to create this software because the company says this would put in danger the privacy of every Apple customer. The company says that once they create this backdoor to the iphone, they cannot guarantee to keep it safe. Because once created it can be modified to open infinite amount of iphones and access their data. Many people are concern about this issue and most experts agree that if the program is created more security issues will arise, not only within individuals, but national and possibly international security issues since technology is now all over the word.
Some believe that privacy and safety can go hand in hand, while others believe you can 't have one without giving up another. In our ever growing and ever changing world, these two sides continue to drift further and further apart when we are forced to ask the question, “What is too much”? When it comes to personal liberties and privacy, how much should we allow into the government 's hands under the promise of national safety and security? The NSA’s recent scandal has put this in the forefront of every American’s mind. Before we as a nation make a decision, we should consider every side of the problem.
In this case it’s I think important to understand that Apple would happily open this one phone and give the FBI the info they needed. But this isn’t what the government really wants. The government wants a backdoor key into the operating system itself. This means that government will have total right of entry into your iPhone. This has to be regulated to protect
Swartz and Allen both offer valuable perspectives on expectation of privacy and legal limitation of cell phone data tracking use. As consumers of technology, Americans use cells phone not always by choice, sometimes by necessity. Both authors advise us to question our stand on the government’s unwarranted involvement in our lives. I would encourage us all to be aware of all technology around us. Albeit convenient, we must be willing to accept our part in its use.
Ever since day one, people have been developing and creating all sorts of new methods and machines to help better everyday life in one way or another. Who can forget the invention of the ever-wondrous telephone? And we can’t forget how innovative and life-changing computers have been. However, while all machines have their positive uses, there can also be many negatives depending on how one uses said machines, wiretapping in on phone conversations, using spyware to quietly survey every keystroke and click one makes, and many other methods of unwanted snooping have arisen. As a result, laws have been made to make sure these negative uses are not taken advantage of by anyone. But because of how often technology changes, how can it be known that the laws made so long ago can still uphold proper justice? With the laws that are in place now, it’s a constant struggle to balance security with privacy. Privacy laws should be revised completely in order to create a better happy medium between security and privacy. A common misconception of most is that a happy medium of privacy and security is impossible to achieve. However, as well-said by Daniel Solove, “Protecting privacy doesn’t need to mean scuttling a security measure. Most people concerned about the privacy implications of government surveillance aren’t arguing for no[sic] surveillance and absolute privacy. They’d be fine giving up some privacy as long as appropriate controls, limitations, oversight and accountability mechanisms were in place.”(“5 Myths about Privacy”)
Over the past few years, technology has grown to be the driving force in human productivity and efficiency. Technology has been incorporated into our everyday lives to help us perform daily activities and bridge long distance communication. Although technology has brought us many advantages, it has also created quite few ethical issues along the way. Some of the biggest ethical issues technology has created revolve around cell phones. These issues include cell phone tracking and using the cell phone to cheat. Cell phone privacy can be compromised in many situations regarding phone call tracking and messaging. Cell phone use is also starting to be abused by students and other test takers to cheat on tests. Even if the person has good moral standards, sometimes the right decision to make is not always clear.
Cyber security is like trying to box while being blindfolded.. Cyber instability may cause massive panic in citizens of the United States. Government surveillance is one of the platforms of cyber security and it started to erupt after the 9/11 incident. The main ways the government watches people today is with cell phone, social media, and email surveillance. Should they be able to invade our privacy? Maybe. Many crimes are committed on computers everyday whether it be credit card hacks, stolen identities, or even social media accounts taken. Cyber attacks may lead people to distrust the cyber community and the people behind cyber protection.
Every year, cybercrime costs businesses $400 billion and by 2019, cybercrime will have cost the global economy 2.1 trillion dollars (Morgan 1). But, economic loss isn’t the only problem caused by weak cybersecurity; weak cybersecurity measures could allow hackers to collect data on citizens, cause widespread death, and destroy entire nations. Despite the massive threat the problem poses, no one has yet to institute an effective solution. Although government regulation and website blocking attempt to eliminate cybercrime and cyberwarfare, an ideal solution exists in government guidance and collaboration with the private sector.
Terrorism in the US is a very critical problem and is very serious and Apple will need to solve the way to unlock the iPhone without giving up privacy and security to the FBI. Apple will need to find a way to make the iPhone unlock without the FBI knowing how to and other foreign governments also. If Apple does not succeed to unlock the iPhone, or gives up both privacy and security, then having an iPhone really looks like there is no specialty or difference between Android phones. If Apple decides to unlock the iPhone just for the FBI, this could help the US protect themselves from other
Over the last ten years people in the United State and around the world have heavily relied more on their debit or credit cards to process transactions of their purchases. In the old days it used to be when you would get your paycheck on Friday and rush to the bank during your break or lunch in order to cash withdraw your funds or deposit them into your account. It used to be where you carry cash to buy groceries, pay bills, and go shopping. Now some people don’t even set foot inside their bank branch because they are paid using direct deposit or the funds are loaded into a debit card provided by their employer. Many employers from around the globe don’t even issue paper check anymore. Bills are often times paid online, babysitters are accepting electronic payment such as PayPal and even food trucks now take electronic payments. According to a Washington Post column by Michelle Singletary society and businesses embrace using cashless ways to pay for things than the old time traditional “cold hard cash”. In my opinion there should still be cash circulating out in the world. My first ...
Albert Einstein once said, “It has become appallingly obvious that our technology has exceeded our humanity.” This quote is fully representative of society today. It has distracted us from..... One second my best friend just texted me… Ok what was I saying?.. Oh right; It has distracted us from our studies, our loved ones, and even our driving. Technology is making us less intelligent, oblivious to our surroundings, and antisocial.