The FBI wants to investigate if Tashfeen Malik had any links to the Islamic state and can only do so by unlocking the phone. National security is a priority for the nation; however, there are certain limitations which government agencies cannot bypass. The FBI has ordered Apple to create a software that can let them bypass restrictions. James B. Comey, the FBI Dirctor indicates that “We simply want the chance, with a search warrant, to try to guess the terrorist’s passcode without the phone essentially self-destructing and without it taking a decade to guess correctly.” The FBI’s proposal violates the Constitution. Our founding fathers believed in the inalienable rights. Tim Cook argues that “to write computer code, which courts have ruled is a type of speech, runs counter to the 1st Amendment’s ban on compelled speech, the lawyers wrote. The 5th Amendment, they added, protects companies from being forced into the government’s service”. Apple can use the 5th Amendment to their advantage and argue that it deprives the company of liberty without due process of law. The 4th amendment also protects companies from unreason...
... middle of paper ...
...Snowden’s leak. The United States government continues to be unsuccessful in their fight against terrorism and other domestic attacks. How can we trust a government, who is constantly, spying on its citizens? The Homeland Security Act was created to protect the people, but instead it has reduced privacy and increased government power.
Apple should preserve our constitutional values of life, liberty and the pursuit of happiness. Apple should remain in a position where they will protect privacy rights of Americans. As citizens of the United States, we need to protect our constitutional, privacy and human rights. The government should have limited control, and that is what this country is founded on. As a nation with an established Democracy, we should make sure our courts rule and abide by the Constitution.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- With technology advancing, some may use information as a way to penetrate security to violate privacy and personal information to hurt others. Information can be found to pinpoint criminal activity and save lives. However, this may violate our right to privacy and censorship for innocent civilians. The First Amendment in the United States Constitution prohibits any law that effects freedom to excise religion, the freedom of speech, freedom of press, interfering the right to peaceful assembly, and prohibiting the petitioning for a governmental redress of grievances.... [tags: First Amendment to the United States Constitution]
1405 words (4 pages)
- 2) It is getting ever easier to record anything, or everything, that you see. This opens fascinating possibilities-and alarming ones.” The Economist, Nov. 16, 2013 Discuss this statement in the light of the medias recent preoccupation with surveillance and privacy issues. Include government surveillance and social media. For example the young woman who accused Florida state quarterback jameis Winston of rape was identified by football fans on social media and had ugly anonymous things posted about her.... [tags: social media, government, privacy, policies]
1006 words (2.9 pages)
- ¡§War driving to Disney World¡¨ Summer of 2004 War driving involves roaming around a neighborhood looking for the increasingly numerous ¡§hot spots¡¨ where high-speed Internet¡¦s access is free. What I found interesting was that the hacks were pretty basic and that most of the information on how to break into default systems, how to look for Wired Equivalent Privacy (WEP) being enabled and other wireless steps could be found in a Google search. My brother Carlos a ¡§full time computer geek¡¨ and I had decided at the beginning of the summer that we were taking the family to Disney but I wasn¡¦t going to take any downtime or a vacation per se.... [tags: essays research papers]
655 words (1.9 pages)
- Privacy is the ability to maintain what or who can access and see your personal content and information. With that, the idea of privacy is different amongst different cultures and countries, while they all differ, they share common characteristics. The act of sharing ones own personal information is decision one must make on their own. Privacy is a right that all people should have and the government has the responsibility of maintaining that right. Data such as personal emails, bank details, medical records, and passwords need to remain safe and secure to ensure privacy is not invaded.... [tags: Privacy, Privacy law]
714 words (2 pages)
- Executive Summary Problem Statement: In this white paper we will address how privacy and security can be improved on Facebook. Important Points: · Background of Facebook · Privacy Problems with Facebook · Possible Security and Privacy Solutions · Summary · Works Cited Background of Facebook Facebook allows people to connect with friends across the seas with different cultures. Originally, Facebook was started in 2003 by a man named Mark Zuckerburg in his college dorm room at Harvard University.... [tags: Social Networking, Online Privacy]
2055 words (5.9 pages)
- In 1984, George Orwell describes a society that shares eerily similar qualities with the modern world. Oppressed by Big Brother and the Party, citizens of Oceania live their lives without knowing freedom or privacy and being controlled completely by the Party. The Party’s control over the people is similar to the invasive procedure of modern DNA collection. In America, DNA can be taken unwarranted, without permission from crime scenes, where it is used to identify a person by “ethnicity or sex” and “predict hair and eye color, height, age” along with other personal conditions (Murphy).... [tags: genetic privacy, george orwell, dna, oceania]
1936 words (5.5 pages)
- ... For example, an animated advertisement on a static web page may increase fixation since the motion will grab the user’s attention throughout the search process. Fixation location involves the part of the visual range that the studied person fixates on. Commonly, the areas that eyes fixate on are the most important due to experience, curiosity, shock, and significance. It has been more than a century that psychologist use eye tracking for psychoanalysis. Complex psychological profiles can be created from people by using eye movement analyzing.... [tags: wearable computer, privacy, secrecy]
1733 words (5 pages)
- Did you ever think about data security. When you surfing the internet, people look at the thing that you are watching without your permission. People get your personal secret information through the operating system in your device. People getting know your communication with others. And all these things happen, you even you don’t know it. Can you stand it. What do you feel if those happen to you. Here is an article talking about should Apple comply with the court’s order or not, Apple should not be above the law, by Richard Burr.... [tags: Apple Inc., IPhone, SIM lock]
923 words (2.6 pages)
- In recent years, the privacy issues on social media have aroused controversial debates. It was argued by Albarran that people are losing control over their personal privacy, given the rapid boom of social sharing (146). No matter what viewpoint one holds towards secrecy, it is undeniable that the intrusion of social media privacy has become so intense that should no one ignore the possible consequences: Users’ information is constantly exploited for commercial use, while privacy loopholes on social networking sites might also intrigue many safety issues, internet fraud, for instance.... [tags: debates on social media privacy issues]
1155 words (3.3 pages)
- Apple Inc. is located in Cupertino, California and was established in 1976. Apple Inc. designs, manufactures and markets mobile and media devices, personal computers and portable digital music players. They also sell a variety of related software, services, and networking solutions. As of this writing, Apple Inc. is the first United States Company to reach a market valuation of over seven hundred billion dollars (Higgins 2015). When it comes to doing business internationally the decision making is more complex.... [tags: Globalization, International trade, Apple Inc.]
1916 words (5.5 pages)
- Fire Arms Vs. Arms
- The Mu Prep Program At The University Of Delaware 's Townsend Hall Food Microbiology Laboratory
- Raising The Minimum Wage Is Good Economic, Good Policy And Good For Workers
- Locke And Hume 's Theory Of Knowledge
- The Great Gatsby By F. Scott Fitzgerald
- Evaluation Of A Kindergarten Teacher At Ps.142 Piaget 's Context, The First Thing That Ms. Martini