Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
is technology a threat to our privacy
importance of privacy
importance of privacy
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: is technology a threat to our privacy
The Master Key to Iphones is Unethical
The San Bernardino vs Government case has been in the news for the last months since the terrorist attack last December. It has reminded the world the importance of encryption which is essential for our lives and privacy in this new era of technology. After the attack, the FBI asked Apple for help to access an iphone that belonged to Syed Rizwan Farook one of the perpetrators of the attack, Because the FBI could not access it due to the modern encryption and security features new iphones have. Apple was not completely oppose to help the FBI. The company helped with everything could without violating the privacy of its customers. Apple gave access to the backup data stored in iCloud from Farook’s iphone, but the data obtained was six weeks prior to attack. The FBI still needed more private information from the iphone such as, texts, phone calls and GPS locations after the attack. Apple is now being forced by the federal court to create a software to bypass the security features of the iphone to completely access its data. Apple is refusing to create this software because the company says this would put in danger the privacy of every Apple customer. The company says that once they create this backdoor to the iphone, they cannot guarantee to keep it safe. Because once created it can be modified to open infinite amount of iphones and access their data. Many people are concern about this issue and most experts agree that if the program is created more security issues will arise, not only within individuals, but national and possibly international security issues since technology is now all over the word.
Encryption, the language of computers and smartphones is essential. Most people take for gr...
... middle of paper ...
...h this device that can be disabled because it contain its own key to be encrypted. After great opposing and more complex encryption methods the government lost interest in the chip.
If apple loses the battle in court and is forced to create the backdoor to that one iphone, the U. S government can possibly then access private information from anyone that owns an iphone. Because no one is guaranteeing this will not happen. Another main problem then would be protect the key from hackers which apple said already they cannot do. In this era, if one person really wants to send encrypted data to another person there are applications that can do this easily. So they government have to then go after those companies creating those applications, some of those companies are not even in American soil, not to mentioned terrorist can use this application to plan another attack.
A common theme is taking place where as people feel that cell phones are starting to take over others daily lives. Many people go through their day to day lives not even relizing how often they are on their cell phones. In the article, “Our Cell Phones, Ourselves” the author Christine Rosen talks about how cell phones are starting to become a necessity in every way towards peoples lives. Rosen talks about both the good and bad effects of cell phones and how they have changed the way in which we work our daily life. Although I think cell phones can be necissary, the constant need for use could be the beginning of how cell phones will take over our every day lives.
Should Apple be forced to unlock an iPhone or not? It becomes a controversial topic during these years. Most people are concerned with their privacy and security. Darrell Issa is a congressman and has served the government since 2001. Recently, he published “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent” in Wired Magazine, to persuade those governors worked in the Congress. It is easier to catch administrators’ attention because some of them want to force Apple to unlock the iPhone. Darrel Issa focuses on governors because he thinks they can support the law to make sure that everyone has privacy. He addresses the truth that even some of the governors force Apple to hack iPhones when they need people’s information. He considers maintaining people’s privacy as the primary purpose. He also insists that Apple should not be forced to use their information which could lead people’s safety. In “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent,” Darrell Issa uses statistics and historical evidence to effectively persuade his audience of governors that they need to consider whether or not Apple should be forced to hack or not because it could bring people to a dangerous situation and forget the purpose of keeping people’s privacy.
Nicholas Carr wrote ‘How Smartphones Hijack Our Minds’ published in the Wall Street Journal in 2017. Carr believes that as the brain becomes reliant on smartphones the intellect diminishes.
According to John W. Whitehead, “The fact that the government can now, at any time, access entire phone conversations, e-mail exchanges, and other communications from months or years past should frighten every American.” (Whitehead). The NSA
In this micro-study, I will use tools and information available to the public via internet in attempt to hack the iPhone. Currently the iPhone is only sold to subscribers of the AT&T telecommunication service provider and all applications and updates are installed using Apple’s iTunes software. Using various resources I will focus the two main issues which have put Apple and the iPhone user community into the limelight. First, the “unlocking” of the iPhone, which bypasses the iTunes activations process and allows the device to be used on any SIM (Subscriber Information Module) card cellular phone service provider other than AT&T, in this micro-study I will be using a T-Mobile SIM card. Second, I will attempt to “jailbreak” the device, which will allow me to install third-party applications through underground sources and not directly from Apple. As I attempt to hack the iPhone, I will compare drawbacks and benefits of hacking methods, ease of use, and verify Apple’s claims on affecting functionality and possible damag...
Shortly after the apple iphone 6 Plus was released on September 19, records of the tool bending when placed in a pocket started to surface. One individual, for instance, stated small bending after the apple iphone was in a pocket for about 18 hours, and after that, several various other reports dripped in.
In this case it’s I think important to understand that Apple would happily open this one phone and give the FBI the info they needed. But this isn’t what the government really wants. The government wants a backdoor key into the operating system itself. This means that government will have total right of entry into your iPhone. This has to be regulated to protect
In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to computer throughout the world, the need for encryption has never been greater. However, the effects of encryption on our lifestyle and the government's role in encryption has been (and will continue to be) debated for years to come.
The events of 9/11 rattled America and demonstrated the need for a revision in the workings of the United States Intelligence Community. Many Americans, particularly those with left-wing political beliefs, view the new laws and resolutions in national security to be a fitting response considering 2,605 citizens died and 6,294 were hospitalized for related injuries. To prevent a tragedy so deadly from repeating, the NSA needs to advance its approach to the twenty-first century accordingly. Since terrorists communicate largely via cell-phones and the internet, the NSA having access to our phone records is only logical. By law, the NSA can only examine the numbers dialed and the length of the call, needing a warrant from a judge to eavesdrop on
America has made amazing technology. People believe that technology they own should be private and disclosed only to those they want to. However, Officials should be able to use the information they obtained from private devices or social networking sites in order to protect the community.
In today's society with the increased use of computers, internet, and wireless communications, the need for safety and security has risen dramatically. The internet has become the number one communication medium and is more accessible than ever. Through the internet, vast amount of information is being transmitted between computers. At times, some of the information transmitted can be intercepted illegally, such as personal information and private messages. The percentage of information that is illegally intercepted has been dramatically reduced due to the use of encryption software technology, which was once used by the United States military and government. This technology has given businesses and private users the sense of security in transmitting information through the internet as well as to maintain national security. The use of encryption has been a topic of discussion for the past 20 years. The U.S government has attempted several times to regulate encryption because they felt that it was a matter of national security that they should have control of the technology and protect us from vulnerability if software is shared or sold to other countries. The effort of encryption regulation by the U.S. was unsuccessful and today there are least restrictions on the use and export of encryption technology. The introduction of encryption regulation in the United States has made a global impact. Other countries, such as China, Russia, and others around the world, have implemented encryption regulations to due to the influence of the U.S. but have restrictions that are far more stringent and harsh. The strong regulations by these countries are creating conflict among private users and foreign companies that export encryption software to these countries. This argument and debate continues between the government, businesses, and encryption companies. The question is should the government have the right to monitor and regulate encryption and what ethical questions does it raise?
The FBI and Apple had a difference in opinions when it came to the privacy of criminals.The FBI wanted the device that can decrypt the cell phone and let them check the information they need to check. The federal court even sent a court order for Apple to help the FBI. The FBI wants to examine the iPhone to see if it was involved in the planning of the mass shooting. To see if they could get some physical proof. The user was Syed Farook, who was another suspect involved in the shooting. Apple is
The first reason why Apple should not create a backdoor is because Apple IPhones were created with their customers privacy in mind. Apple, a well known billion dollar company have been so successful at keeping their customers privacy protected. The privacy of personal information is very sensitive to Apple and the FBI should not be allowed to be able to obtain access to anyone’s personal info...
Can Technology Affect Ethics and Culture? In today's work environment, workers are expected to know more than ever before. With the growth of technology comes more knowledge that end-users must know, so it is important for workers not to be distracted by unethical practices. However, with technology also comes a more defined sense of communication, which can be good or bad.
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...