Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
How can the myth of pandora’s box be used in today’s society
Don’t take our word for it - see why 10 million students trust us with their essay needs.
The modern phrase "Pandora's Box" derives from a Greek myth where the first woman, Pandora, is given a beautiful box by the Greek god Zeus with specific instructions for it to never be opened. Unable to follow the rules, Pandora ends up releasing all the evils of humanity. Today, much like Christianity’s idea of biting forbidden fruit, opening Pandora’s box refers to getting into a situation over which one has very little control over. As part of the San Bernardino shootings, a federal court ordered Apple to help the Federal Bureau of Investigation or F.B.I. unlock one of the assailant’s iPhone. Apple’s chief executive, Tim Cook, replied with an emphatic letter announcing the company will not comply with the FBI. The F.B.I’s court order to …show more content…
Attorney Vance Jr. argues in his article “No Smartphone Lies Beyond the Reach of a Judicial Search Warrant” that the “Decisions about who can access key evidence in criminal investigations should be made by courts and legislatures, not by Apple and Google.” Contrary to the attorney’s statement, it leaves out a question of what evidence or leads can the investigation get out of the iPhone. Intelligent criminals, upon hearing the news or after careful planning of a plot, would treat the iPhone as disposable (not for reuse). In his view, surveillance of a felon is more important than the privacy of an …show more content…
He includes the valued metaphor of the Pandora’s box and researched the reliability of the government securing the Internet. He showed data that “In 2013, following disclosures that the National Security Agency had violated it own data collection rules more than 2,500 times in the course of a year, agency officials admitted that some of these incidents were personal in nature. A dozen or more cases involved NSA workers spying on their lovers and spouses.” This proves that the “security” from the other side is only unwarranted government surveillance. In the final paragraphs, Ungerleider comments, “The type of access the F.B.I. wants, though, is a Pandora’s box. Once it’s developed, hackers, organized crime or foreign intelligence agencies stand to benefit as much as a U.S. intelligence agencies and law enforcement.” Hence, there will be more consequences than any gains for the F.B.I. Additionally, Admiral Jim Starvridis and Dave Weinstein also configures how little benefit the investigation would gain in further
In doing so, they used 3 different logical structures in their arguments: precedent, degree, and analogies. Tim Cook debated with a constructive argument, “to guarantee such a powerful tool isn’t abused and don’t fall into the wrong hands is to never create it” (The Guardian, 2016). This is an example of degree argument, as the audience will automatically agree with any arguments with less of bad things because it is good. Apple knows there are no other cases like this one, so there’s nothing to compare to. Letting the government into the iPhone only this one time can set a dangerous precedent that can potentially force Apple to force open every iPhone in the future at government request. This became a heated legal battle, granting the access in their products for law enforcement was compared to “a political question” by Apple with an analogy (Yadron,
California was heard by the Supreme Court, Riley stated that a smartphone and whatever it may contain does not provide a threat to police officers, therefore People v. Diaz does not apply. Jeffrey L. Fisher, a Stanford University law professor, served as Riley’s representation (Riley v. California, n.d.). He boiled his argument down to the searching of a cell phone is nothing more than an invasion of privacy, as most people now have their entire life on their personal devices (Liptak, 2014).
Is the American government trustworthy? Edward Joseph Snowden (2013) released to the United States press* selected information about the surveillance of ordinary citizens by the U.S.A.’s National Security Agency (N.S.A.), and its interconnection to phone and social media companies. The motion picture Citizenfour (2014), shows the original taping of those revelations. Snowden said that some people do nothing about this tracking because they have nothing to hide. He claims that this inverts the model of responsibility. He believes that everyone should encrypt Internet messages and abandon electronic media companies that track personal information and Internet behavior (op.cit, 2014). Snowden also stressed to Lawrence Lessig (2014) the importance of the press and the first amendment (Lessig – Snowden Interview Transcript, [16:28]). These dynamics illustrate Lessig’s (2006) constrain-enable pattern of powers that keep society in check (2006, Code: Version 2.0, p. 122). Consider Lessig’s (2006) question what is “the threat to liberty?” (2006, p. 120). Terrorism is a real threat (Weber, 2013). Surveillance by social media and websites, rather than the government, has the greater negative impact on its users.
Abstract: This paper provides an analysis of the privacy issues associated with governmental Internet surveillance, with a focus on the recently disclosed FBI tool known as Carnivore. It concludes that, while some system of surveillance is necessary, more mechanisms to prevent abuse of privacy must exist.
Taylor, James Stacey. "In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance." Public Affairs Quarterly July 2005: 227-246.
Should Apple be forced to unlock an iPhone or not? It becomes a controversial topic during these years. Most people are concerned with their privacy and security. Darrell Issa is a congressman and has served the government since 2001. Recently, he published “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent” in Wired Magazine, to persuade those governors worked in the Congress. It is easier to catch administrators’ attention because some of them want to force Apple to unlock the iPhone. Darrel Issa focuses on governors because he thinks they can support the law to make sure that everyone has privacy. He addresses the truth that even some of the governors force Apple to hack iPhones when they need people’s information. He considers maintaining people’s privacy as the primary purpose. He also insists that Apple should not be forced to use their information which could lead people’s safety. In “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent,” Darrell Issa uses statistics and historical evidence to effectively persuade his audience of governors that they need to consider whether or not Apple should be forced to hack or not because it could bring people to a dangerous situation and forget the purpose of keeping people’s privacy.
Edward Snowden is America’s most recent controversial figure. People can’t decide if he is their hero or traitor. Nevertheless, his leaks on the U.S. government surveillance program, PRISM, demand an explanation. Many American citizens have been enraged by the thought of the government tracing their telecommunication systems. According to factbrowser.com 54% of internet users would rather have more online privacy, even at the risk of security (Facts Tagged with Privacy). They say it is an infringement on their privacy rights of the constitution. However, some of them don’t mind; they believe it will help thwart the acts of terrorists. Both sides make a good point, but the inevitable future is one where the government is adapting as technology is changing. In order for us to continue living in the new digital decade, we must accept the government’s ability to surveil us.
According to John W. Whitehead, “The fact that the government can now, at any time, access entire phone conversations, e-mail exchanges, and other communications from months or years past should frighten every American.” (Whitehead). The NSA
In early June 2013, Edward Snowden, a 29-year-old former defense contractor who had access to NSA database while working for an intelligence consulting company, leaked classified documents reports that the National Security Agency (NSA) is recording phone calls of millions of Americans along with gathering private data and spying foreign Internet activity. The Washington Post later broke the news disclosed PRISM, a program can collect data on Internet users. The leaked documents publicly stated a vast objection. Many people were shocked by the scale of the programs, even elected representatives were unaware of the surveillance range. A nationwide debate over privacy rights have been sparked. Although supporters claim that the NSA only does its best to protect the United States from terrorists as well as respecting Americans' rights and privacy, many civil rights advocates feel that the government failed to be clear about the limit of the surveillance programs, threatening Americans' civil...
In today 's generation many adults and teenagers keep everything from contacts numbers to their social security numbers on their smartphones. When customers, including criminals and terrorists purchase their smartphones, they are buying it with the assurance that not some, but all of their information and privacy will be safeguarded. The issue occurring today deals with the suspected terrorist of the San Bernardino, California on December 2, 2015 shooting involving over 30 injured people. Syed Farook, the suspected terrorist Apple IPhone is locked with a 4 code password and the government wants Apple to create a backdoor operating systems that allows them to computerize as many passcodes they can to unlocks the terrorists IPhone. Apple strongly believes that creating this necessary backdoor system will create a negative chain of effects that will affect everyone from smartphone users to social media companies and their privacy. The FBI recently has taken Apple to court to create the necessary backdoor operating systems to get around the security features created on the Apple IPhones. Apple has the legal right to refuse creating a “backdoor” software to get into suspected terrorists iphone because it invades the privacy of Apple 's customers, it will set a precedent for other companies, and the FBI will mislead Apple.
“Smartphones and the 4th Amendment”. The New York Times. (27 Apr. 2014).Web. 28 Apr. 2014.
Swartz and Allen both offer valuable perspectives on expectation of privacy and legal limitation of cell phone data tracking use. As consumers of technology, Americans use cells phone not always by choice, sometimes by necessity. Both authors advise us to question our stand on the government’s unwarranted involvement in our lives. I would encourage us all to be aware of all technology around us. Albeit convenient, we must be willing to accept our part in its use.
Ever since day one, people have been developing and creating all sorts of new methods and machines to help better everyday life in one way or another. Who can forget the invention of the ever-wondrous telephone? And we can’t forget how innovative and life-changing computers have been. However, while all machines have their positive uses, there can also be many negatives depending on how one uses said machines, wiretapping in on phone conversations, using spyware to quietly survey every keystroke and click one makes, and many other methods of unwanted snooping have arisen. As a result, laws have been made to make sure these negative uses are not taken advantage of by anyone. But because of how often technology changes, how can it be known that the laws made so long ago can still uphold proper justice? With the laws that are in place now, it’s a constant struggle to balance security with privacy. Privacy laws should be revised completely in order to create a better happy medium between security and privacy. A common misconception of most is that a happy medium of privacy and security is impossible to achieve. However, as well-said by Daniel Solove, “Protecting privacy doesn’t need to mean scuttling a security measure. Most people concerned about the privacy implications of government surveillance aren’t arguing for no[sic] surveillance and absolute privacy. They’d be fine giving up some privacy as long as appropriate controls, limitations, oversight and accountability mechanisms were in place.”(“5 Myths about Privacy”)
The world erupted in outrage following revelations by Edward Snowden regarding the extent of surveillance perform by the National Security Agency. Privacy becomes one of the hottest topic of 2013 and was chosen by the world’s most popular online dictionary, Dictionary.com, as the Word of the Year. However, the government is not the only one that conduct data gathering and surveillance. Employers often monitor their employees, and businesses collect data on theirs customer. The morality of these practices is a topic that generates heated debate.
Gonchar, Michael. “What Is More Important: Our Privacy or National Security?” New York Times. New York Times, 17 Sept. 2013. Web. 22 Feb. 2014.