Preview

Apple Vs. The Government Of United States: What Is Happening?.

Good Essays
Open Document
Open Document
753 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Apple Vs. The Government Of United States: What Is Happening?.
Apple versus the Government of United States: What is Happening?

Summary
Apple’s move to release new encrypted iOS 8 for its iPhones, iPod, and iPads has received the maximum possible criticisms from both users and governments.
While users are thanking Apple for the initiative, the U.S. government is not too thrilled about the same. Most of the iOS 8 coverage focuses on the visible features that users can interact with.
But the one big change in new OS that has sparked happiness and rage in equal measures is the encryption technology. Apple has radically enhanced the way information on all Apple devices is encrypted.
Once the passcode is set by the users, Apple will no longer be able to unlock the device even if ordered by court to do
…show more content…
government and some renowned legal scholars. According to Orin Kerr, a law professor, Apple’s this new encryption policy is dangerous. It will not stop hackers, terrorists, or rogue agents from compromising data. Further, it will only hamper lawful investigations with court warrants making certain important situations very difficult for law enforcement.
Though Kerr slightly moderated his views since his initial post on The Washington Post, his concerns over the Apple’s latest encryption remains unchanged.
Giving importance to users interests is essential for any business but placing them above the law is equal to working against the interest of public. It protects user privacy but places them in danger, Kerr added.
Some notable scholars have supported Kerr’s views and opined that Apple’s recent move is surprising, since it is only placing the public at risk. Further, the tech titans fight with the American government is absolutely pointless.
Apple’s True Motive
But the fact is Kerr and his supported are wrong. Apple is not designing systems that would prevent law enforcement agencies from executing legitimate warrants. That has never been the firm’s
…show more content…
This can either be a full passcode or a four-digit PIN. On Touch ID sensor devices, you are allowed to use your fingerprint as a convenient alternative.
A passcode security is not as flimsy as it seems. The moment it is set, Apple’s OS immediately begins encrypting your device’s important information. That includes e-mail, text messages, videos, photos, and call records. It is the form of encryption used by the government of United States to guard classified military secrets. The encryption is a mathematically derived combination of your passcode and a unique set of secret numbers baked into your device.
As a user, you may not be unaware this is happening but it has a huge impact on data raiders. Even if someone breaks the encryption and attempts to read the information directly from the memory chips, all the person will see is useless, scrambled junk. Unless the person is able to recover the secret numbers stored in your device’s processor, guessing your passcode would not be of great help either. And Apple’s latest generation of iOS makes that very difficult. At the maximum, data thieves could get exhausted from trying all possible passcode

You May Also Find These Documents Helpful

  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Better Essays

    new looks and new capabilities as well. Apple will budget accordingly for the amount of labor…

    • 1804 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Users of the iPhone range from business users to media fanatics, all using the phone in many different ways. Apple targets certain groups and…

    • 1823 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Encrypting Data at Rest – encrypt all sensitive data when it is at rest on the device and on removable media used by the device. Employ storage encryption…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    How comfortable would you be with a government having access to your personal information and data on your phone? A recent incident involving a terrorist attack in San Bernardino, sparked a controversy between Apple and the Federal Bureau of investigation. Following the attack by two individuals committed an act of terror, killing 14 people, the iPhone belonging to one of the terrorists was found. As you may know, your organization is requesting the court for Apple's forced assistance in weakening the encryption on an IPhone related to the San Bernardino terrorist attacks and supposedly has vital information on it. These terrorist attacks were performed by ISIS's lone wolves, named Syed Rizwan Farook, who owns the phone and Tashfeen Malik, his wife. In my opinion, the phone shouldn't be cracked for three reasons. First of all because it undermines America's founding principles and it…

    • 642 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The argument being presented in the given piece is the FBI asking permission from Apple to have the ability to access people’s private messages in their apple products. This argument came into conversation after the terrorist attack in San Bernardino, California. The author’s claim towards the argument is that the FBI should not be able to have the ability to tap into people’s individual cell phones. Although the FBI’s idea of decoding Apple’s encryption code in order to gain access to tapping into all iPhones under service, it seems that the cons outweigh the pros of this certain situation. However, there has to be a completely different way the FBI can develop a better way to combat terrorism without interfering with all of Apple’s customers.…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The encryption system translates the biometric data file into a code using a mathematical tool called a hash function. This is an algorithm that generates a small but unique set of numbers from a larger data file. Although encryption may be confusing for most people, it is a very effective way to protect someone’s biometric data. Encryption adds an additional measure of security to the system so that certain viruses and malware cannot penetrate it. It also makes one’s personal data twice as hard for cyber criminals to hack into. Without encryption, biometric data would be more likely to be accessed and compromised. Using encryption makes biometric data more difficult to penetrate, ensuring that the information therefore, is safe, protected and the user’s privacy is still intact.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Apple is good at innovation for they are always coming up with new technology, the iPhone is one of these things.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The thoughts of those looking into the affairs of the NSA think the government took a great idea, and honestly the only idea with today’s technological warfare, and got greedy with how much information they have collected and need to be watched very carefully. The most important information for any human being is the information we choose to keep private, it can be the most devastating information in the wrong hands and the United States Government is holding that exact information in bulk, with your name on a yellow folder.…

    • 833 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Some people believe, when the NSA spies on their own citizens illegally it creates an atmosphere of distrust between the government and its’ citizens; the NSA might believe by doing so, they are saving and preventing certain situations from taking place. Edward Snowden revealed the level of infiltration in his statement about NSA spying. Woodburn stated that "Seven months after the initial Snowden leaks, sixty-three percent of Americans stated that they were dissatisfied with the government's Surveillance of U.S. citizens" (28). U.S citizens disagree at times with their government's choices, and the National Security Agency infiltrating cell phone and computers makes this situation worse. Americans resent the government taking away their right to privacy in order to find terrorists. But, terrorists have found United States citizens, born in the USA, to help them commit terrorist acts and the NSA is wasting time and effort searching into American people while they are allowing real threats happen.…

    • 456 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The government should worry citizens, by hiring people to hack into their lives. The National Security Agency, NSA, is “inside” everything from phones to major websites like Google and Yahoo. The NSA is responsible for code breaking and getting information from phones and the internet. The NSA has headquarters in the United Kingdom as well. They try to focus overseas instead of domestically to prevent any serious crime and to defend the UK’s economic interest. Because the NSA doesn’t trust its own U.S. citizens, violates the fourth amendment, and made programs to “hack” us, the NSA invades the privacy of citizens and should be stopped.…

    • 1637 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The first reason is the Revolutionary War, this was a disagreement between Great Britain and the American colonies. The king himself had created a swamp of new buildings and offices. Hitler swamped and took them out. This is showing the colonies were in need of general searches. The British officers were just trying to received taxed goods. The next reason is Carroll v United States 1925. The United States supreme court was doing warrantless searches through automobiles. This is taking it too far, the US supreme court should not be able to go through somebody's vehicle without a warrant. There is no reasonable suspicion, this is just too far. Allowing Farook's Iphone to be unlocked allowed him to set up a terror attack. He was able to send drivers to locations and set up an attack. Apple took it too far and a chance of unlocking his Iphone to do…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The 4th Amendment is extremely important to our country. This amendment in the United States Constitution provides the right for people to be secure in their own person, paper, and home, protects against unreasonable search and seizures, and states that no warrant will be issued without probable cause. 4th Amendment laws are more strict than any other amendment, and leaves absolutely no wiggle room to allow changes. Despite these strict laws being in place the government is at war with Apple because Apple encrypts everything to make a very good security, and they say allowing the government into people's phones would be against the 4th Amendment. 4th Amendment laws are very important, and should be followed closely. The 4th Amendment helps…

    • 151 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    America's Privacy

    • 1205 Words
    • 5 Pages

    In the wake of the 9/11 terrorist attacks, a U.S. law called the Patriot Act was passed under the Bush administration. The goal of passing this law was to strengthen domestic security and broaden the powers of law-enforcement agencies with regards to identifying and stopping terrorists (Grabianowski). The privacy of the American public was first questioned in 2006 when USA Today reported that the NSA had “been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth” and was “using the data to analyze calling patterns in an effort to detect terrorist activity” (Greenwald). This article referred to a secret…

    • 1205 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Homeland Security Threats

    • 849 Words
    • 4 Pages

    We can’t see what they’re saying.” Following the terror attacks in Paris that killed close to 130 people, the concerns of encrypted communications has been placed under the spotlight for national defense agencies (Bennett, 2015). With the latest debates on whether Apple should release their encryption information, most people familiar with this controversy are aware that while encryption makes it difficult for investigators to perform their duties, there is also the concern of whether or not threats would still be posed in the event that these individuals would simply go somewhere else to get the latest and greatest encryption…

    • 849 Words
    • 4 Pages
    Better Essays