With increased usage of smartphones and other mobile devices, concerns over unauthorized access to private and confidential data stored in the devices have soared. In recent times, Apple Inc., one of the largest manufacturers of smartphones in the U.S. and worldwide, resorted to robust cryptographic techniques in an attempt to protect data customers store on...
With increased usage of smartphones and other mobile devices, concerns over unauthorized access to private and confidential data stored in the devices have soared. In recent times, Apple Inc., one of the largest manufacturers of smartphones in the U.S. and worldwide, resorted to robust cryptographic techniques in an attempt to protect data customers store on its devices. The move has led to a fierce battle between Apple and the federal government, with the latter citing national security concerns. The government's concerns over national security have gained further momentum following the discovery that one of the masterminds of the December 2015 San Bernardino terrorist attack owned an iPhone 5C (Stavridis). Unable to unlock the device due to Apple's strong encryption software, the Federal Bureau of Investigations (FBI) sought the intervention of the courts to compel Apple, under the premise of All Writs of 1789, to assist in gaining access to the device. Apple strongly defied the order, reiterating its commitment to protecting customer data. This paper looks at both sides of the debate, i.e. Apple's concerns over privacy versus the government's concerns over national security.
For Apple, privacy is integral. Indeed, the right to privacy is a right expressly protected by the constitution in the First Amendment. Amidst increased hacking concerns, the company created arguably the strongest encryption software to prevent access to data held in its devices through backdoor mechanisms -- the data can only be accessed using the user's master password. With its encryption techniques, it is impossible or extremely difficult for hackers and other cyber criminals to access private information held in Apple devices. This guarantees Apple customers absolute safety of their private information. Indeed, unlike most other mobile devices, the iPhone is now an impossible nut to crack for hackers.
For the government, however, Apple's encryption techniques pose a threat to national security (Stavridis). Criminals can safely use Apple devices to plan and execute attacks. With Apple's strong encryption techniques, it would be extremely difficult for investigative authorities to gather evidence for prosecuting suspects. The case of the San Bernardino attack is an ideal example. The FBI and the National Security Agency (NSA) admitted their inability to hack the device owned by one of the terrorists. Devices obtained from suspects in such instances can provide important leads as far as getting to the bottom of the issue is concerned. They can provide records of communication (call records, emails, and so on) between the suspect and other entities that might have collaborated with the suspect to plan and execute the attack, leading to more convincing evidence, more arrests, and the discovery of other attacks the terrorists might have been planning. In this case, for instance, it emerged that the terrorists' neighbor was involved in planning the attack. With Apple's cryptographic measures, however, accessing such data is impossible or extremely difficult.
In fact, with Apple declining to provide assistance in hacking the device recovered from one of the terrorists, FBI resorted to professional hackers who successfully gained access to the device without erasing the data stored in it (Nakashima). The hackers banked on unknown flaws in Apple's encryption software, a phenomenon that has sparked debate over whether or not the FBI should share the flaws with Apple. Those opposed to the disclosure argue that by sharing the flaws with Apple, the firm would without a doubt fix the vulnerabilities. As a result, the government may sacrifice an important opportunity to gather key intelligence that could be used to prevent terrorist attacks and the theft of the country's intellectual assets, or even find out about more hazardous flaws exploited by hackers and enemies to plan and execute attacks (Zapotosky).
On its part, Apple has consistently argued that assisting the government in gaining access to customers' devices would likely set a precedent where the government can readily gain access to private information about citizens (Stavridis). There is some truth in this assertion. If Apple had complied with the court's order to assist the FBI in hacking the device owned by one of the San Bernardino terrorists, what would stop the same government from compelling the firm to write software that secretly tapes conversations or switches on location services, for instance? With the government's appetite for surveillance in the wake of increased security threats, some of these possibilities cannot be ignored. This would lead to grave violations of constitutionally protected rights.
Overall, both Apple's privacy concerns and the government's security concerns are important -- none of the concerns can be understated. As an organization, Apple has the responsibility to protect its customers' private data from hacking, identity theft, malicious foreign entities, and unjustifiable government surveillance. This is a critical concern in an increasingly risky cyber security environment. Equally, the government has a duty to protect its citizens, particularly in the wake of increased terrorism threats. Without a doubt, there are no straightforward answers to this dilemma, even with constitutional provisions that expressly protect privacy. Even so, a balance can be found between privacy and security. It is important for American citizens to understand that technology can significantly hinder the government's ability to guarantee national security. There are times when privacy has to be bypassed for national security to be guaranteed. In essence, it is imperative for citizens to surrender a little more privacy if they indeed need absolute security. On its part, the government must always act ethically. It must assure the public that any private data required will only be used to the extent of achieving national security objectives.
Works Cited
Nakashima, Ellen. FBI paid professional hackers one-time fee to crack San Bernardino iPhone. The Washington Post, 12 April 2016. Web. 16 February 2017.
Stavridis, Jim. Apple vs. FBI is not about privacy vs. security -- it is about how to achieve both. Huffington Post, 8 March 2016. Web. 16 February 2017.
Zapotosky, Matt. FBI has accessed San Bernardino shooter's phone without Apple's help. The Washington Post, 28 March 2016. Web. 16 February 2017.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.