Overview
Millions of people all around the world are using Smartphones, like iPhones, which turns out to be crucial part of our lives. We are using them not only for calling but we also store unbelievably huge amount of personal information. We have there all our contacts, calls and messages and all our pictures that we save and keep in the phones. A t here’s also a calendar on the phone, with all the information about where we have been and where we are planning to go. All this information is private and sensitive and this has to be protected carefully from criminals and hackers.
In this case study, I aim to present the recent issue about Cyber security, protecting client’s private data and information through the controversial Apple and
…show more content…
In Apple case we can use several theories to study if Apple and FBI are behaving ethically or unethically.
Kant theory is saying that everyone must do things for the right reasons. According to Deontological ethics theory, an action is considered favourable sometimes because of some good aspect of action in itself without considering its good result from the action. This theory is much based upon the one’s morals and values which expresses the “sake of duty” and virtue. Deontology tells us to be fair and not to take advantage of others while teleology tells about doing whatever we want and it gives us a result that is good to us. [17]
Cyber security is very important and big public safety concern. Everyone are worried if there is possibility that the most confidential and private info is exposed to hackers or governmental organisations. A Wall Street Journal/NBC News survey found that 47 percent said Apple should not collaborate with FBI. And when they were asked if FBI needs to keep an eye on terrorist then they were almost split equally.
…show more content…
[6]
As FBI confirmed that they managed to unlock the terrorist mobile, then this makes Apple worried that the hackers would not send this specific technique to other hackers. Apple needs to work very fast that FBI would not be able to use this specific hacking method for too long time. [9]
The implications of the government’s wants are frightening. They need new regulations that would make their work easier and faster. Problem at moment is that if the government can use the All Writs Act to make it easier to unlock your iPhone, then FBI can easily just arrest and block all your information you had in your mobile or follow your location, or even access your phone’s microphone or camera without you even knowing about it. [12]
In this case it’s I think important to understand that Apple would happily open this one phone and give the FBI the info they needed. But this isn’t what the government really wants. The government wants a backdoor key into the operating system itself. This means that government will have total right of entry into your iPhone. This has to be regulated to protect
Having a daily routine is a great way to keep track of obligations and engagements, but so is a cell phone. You can add events to your calendar, send alerts to yourself, take notes, and have the world at your fingertips. These days’ electronics serve
Should Apple be forced to unlock an iPhone or not? It becomes a controversial topic during these years. Most people are concerned with their privacy and security. Darrell Issa is a congressman and has served the government since 2001. Recently, he published “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent” in Wired Magazine, to persuade those governors worked in the Congress. It is easier to catch administrators’ attention because some of them want to force Apple to unlock the iPhone. Darrel Issa focuses on governors because he thinks they can support the law to make sure that everyone has privacy. He addresses the truth that even some of the governors force Apple to hack iPhones when they need people’s information. He considers maintaining people’s privacy as the primary purpose. He also insists that Apple should not be forced to use their information which could lead people’s safety. In “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent,” Darrell Issa uses statistics and historical evidence to effectively persuade his audience of governors that they need to consider whether or not Apple should be forced to hack or not because it could bring people to a dangerous situation and forget the purpose of keeping people’s privacy.
For most people, not having a cell phone is unimaginable and without one we feel disconnected from the world. The leading device that helps us survive and navigate through this current hi-tech world is the Apple iPhone. With features like 3G network capability and remote database access it offers full computer functionality in the palm of a hand. Besides voice calls and text messages, the iPhone allows for full web browsing, email, and allows the installation of applications to further enhance usability through its own AppStore. But what if one wanted to push the iPhone’s capabilities beyond the limit of what Apple is willing to provide? The answer can be found in our other world, the cyber-world.
The feud between Apple Company and the Federal Bureau of Investigation (FBI) started after the terrorist attack in San Bernardino, California on December 2015. The FBI named the man responsible for the Massacre as Syed Rizwan Farook along with his wife, Tashfeen Malik. The police killed the couple during the shootout and found an iPhone (Apple product) used by Farook which later the FBI learned was given to him by his employer from the government. In order to trace others involved in the killings, the FBI requested Apple to help them crack the phone because they don’t want to risk deleting the possible information they need. “Cracking the phone” is a process of making a backdoor or breaking into the secured computer system with certain software which enables illegal copying of data (techopedia). I thought it was absurd to know that during the House committee hearing on March 3, 2016, Apple dismissed the FBI request to crack the mobile phone used by Farook in the San Bernardino Massacre on December
Apple’s refusal to aid the FBI in obtaining information was wrong. When tragedy strikes America, it is the duty of the citizens to do everything they can do in order to protect America from premeditated terrorist attacks occurring. In order to help prevent terrorist attacks from taking place, large companies, such as Apple, should unite with the government in order to make the world safer, and possibly prevent future attacks from occurring. The article,”PRO/CON: Should Apple have resisted FBI pressure to hack an iPhone?” by Tribune News Service summarizes the pro’s and con’s of Apple’s refusal to collaborate with the FBI. The pro’s portion of the article makes it clear that the fourth amendment protects the information of citizens. The con’s portion states that influential companies should be aiding the US government in a way similar to during World War II. So, Apple should help the FBI in their search
We keep all our data on there, our pictures, contact list, and emails. It’s understandable that app companies and the government agencies would be tracking our smart phones and using it as a target to get our personal information. No doubt, a push of a button we are able to install an app, but we have to realize that not all of them are meant for entertainment purposes. Those apps are a good reason why identity theft is so high. Instead of being so quick to install the apps look for the privacy policy and get informed on the data it
Your security doesn't have to be breached from the NSA or any government organization. Taking precautions can be all the difference between you being secured or being watched. Using apps to protect transferred data from your cellphone and keeping all of your conversations online private with security programs can help prevent intrusions. As we all know, everything that is connected to the internet can be hacked, so using apps or is not solid protection against any hacker. The app is only going to make it harder and longer to hack the device, the time variable depends on the app. The only way to completely secure us from NSA is to make them stop spying on us. Along with this, you can also take a direct stand against the NSA by signing one of the petitions below to protest the current laws. We want them to change their strategy and give us our privacy that we
The FBI wants Apple to make a ( master key) to let them access every apple owners device so that they can research and monitor crime and terrorist attacks. The reason this problem arose was because of the terrorist attack in San Bernardino California. While Apple says they show the terrorist no mercy but they won't give the FBI access to the devices because that could potentially open a door to hackers and such. The FBI is trying their second option which is to force Apple to give them access to the devices by a law called the All Writs Act of 1789. The problem is Apple wants to try to persuade the FBI not to do this because Apple believes that this is the worst mistake that could be made
In today 's generation many adults and teenagers keep everything from contacts numbers to their social security numbers on their smartphones. When customers, including criminals and terrorists purchase their smartphones, they are buying it with the assurance that not some, but all of their information and privacy will be safeguarded. The issue occurring today deals with the suspected terrorist of the San Bernardino, California on December 2, 2015 shooting involving over 30 injured people. Syed Farook, the suspected terrorist Apple IPhone is locked with a 4 code password and the government wants Apple to create a backdoor operating systems that allows them to computerize as many passcodes they can to unlocks the terrorists IPhone. Apple strongly believes that creating this necessary backdoor system will create a negative chain of effects that will affect everyone from smartphone users to social media companies and their privacy. The FBI recently has taken Apple to court to create the necessary backdoor operating systems to get around the security features created on the Apple IPhones. Apple has the legal right to refuse creating a “backdoor” software to get into suspected terrorists iphone because it invades the privacy of Apple 's customers, it will set a precedent for other companies, and the FBI will mislead Apple.
Have you ever tried to call your friend from a long distance location? Or, sent a personal email to your loved one? Now, imagine a government agency, reading your private emails and listening to every word spoken into your phone. Would you be concerned about your rights of privacy?
Apple created a security system that keeps out cyber criminals and hackers. It is so important that Apple states “ We have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.” So the need of encryption is so urgent that Apple can't even get the information from their own phones! Apple does their best to keep us safe and letting the government make a backdoor would ruin that leaving our privacy be able to be
With technology advancing, some may use information as a way to penetrate security to violate privacy and personal information to hurt others. Information can be found to pinpoint criminal activity and save lives. However, this may violate our right to privacy and censorship for innocent civilians. The First Amendment in the United States Constitution prohibits any law that effects freedom to excise religion, the freedom of speech, freedom of press, interfering the right to peaceful assembly, and prohibiting the petitioning for a governmental redress of grievances. Including the Fourth Amendment, that alludes the right to privacy. There have been a few situations with Apple protecting privacy and security of civilians, including criminals.
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
Cyber crime has become an important concern for not only the business firms, government, law enforcement agencies but also for the common people because these kinds of issues are related to the consumer’s day-to-day activity (Polivanyuk, 2005). Due to these types of crimes, consumer’s money, children, business organization’s integrity, consumer and company’s privacy, etc. are in danger.