Lastname 1 Firstname Lastname Mr. Coito AP Language and Composition 8 April 2016 Word Count: 1154 “Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about the free speech because you have nothing to say.” – Edward Snowden Privacy and Apple’s Stand against the Government A few years ago, Edward Snowden brought privacy to the forefront of American political and moral debate, and since then it has remained an important issue in the minds of many Americans. More recently, the legal dispute between the FBI and Apple over unlocking an iPhone used by one of the shooters in the San Bernardino terrorist attacks has again brought the debate between privacy and security into the national limelight. Many criticized Apple’s unwavering refusal to comply with the FBI’s request to unlock the iPhone, claiming that in such a terrible case Apple should do everything they can to help the investigation. However, claims such as these have little technical basis, and ignore the dire long-term consequences of compliance by Apple. Apple was right to refuse this request and is right to continue to refuse others like it because of the dangerous legal precedent compliance could set and because of the fact that any compromise of the iPhone’s security would have an effect on every current and future iPhone user. The dispute between the FBI and Apple began when a federal court issued a warrant ordering Apple to unlock an iPhone used by a shooter in the San Bernardino terrorist shooting.

Lastname 2 In the court case, the FBI requested a device that would bypass the limits on password entries for the iPhone, allowing the FBI to try every possible password (“Apple to Fight Order”). Immediately, Apple’s CEO, Tim Cook wrote a detailed letter to all Apple customers, posted on Apple’s website, warning of the far-reaching implications of the case. In the letter, Cook argues that though in the past, “when the FBI has requested data in that’s in our possession, [Apple] has provided it” but that in this case, “the U.S. government has asked us for something [Apple] simply does not have, and something we consider too dangerous to create” (Cook). According to Nick Wingfield and Mike Isaac of the New York Times, support from other companies in the tech sector was at first minimal, even among those in a coalition to reform government surveillance, with some commentators noting that “Apple’s stance in this case seemed overly antagonistic to some companies in the coalition” since Apple and other companies “often comply with law enforcement request for customer data when under order from a court” (Wingfield and Isaac, “Apple Letter on iPhone Security”). However, Wingfield and Isaac later reported that 40 tech companies filed court briefs in support of Apple, suggesting that expert opinion had encouraged pro-privacy stances among the sector (Wingfield and Isaac, “Apple Gets Tech Industry Backing”). This support only served to increase American debate on the topic, with some attacking the FBI and others trying to discredit Tim Cook’s letter. Cook’s argument against compliance may seem constructed solely to defend Apple, but it is in fact based on a long history of government backdoors causing the failure of private security. As John Oliver, a well-known newsman and comedian, notes in his video about encryption, the government attempted in the 1990s to install a “clipper chip,” a chip that would allow secure government access to consumer devices, on all phones. As Oliver notes: Now that clipper chip was theoretically perfect; your information could be

Lastname 3 encrypted, but the government would have an access point when it needed it. . . . There was just one problem with that chip. A computer scientist and hacker named Matt Blaze figured out a way to disable the government access feature of the chip and the whole project was eventually abandoned. (Last Week Tonight) Furthermore, a technical report published by more than ten cybersecurity experts in an online database run by MIT remarks in its abstract, “the complexity of today’s Internet environment, with millions of apps and globally connected services, means that new law enforcement requirements are likely to introduce unanticipated, hard to detect security flaws” (Abelson et al.). It is clear that any attempt to make a backdoor in the security features of the iPhone could and would compromise security in general. An FBI backdoor would not remain an FBI backdoor; foreign intelligence agencies, malicious hackers, and criminals could potentially discover the backdoor, especially since they know of its existence (see Figure 1).

Figure 1: An artist’s opinion on the result of allowing the FBI backdoor access to iPhones (Sack).

Lastname 4 For companies, cybersecurity is already a constant race to stay ahead of attackers. Malicious access to consumer phones would be unavoidable if Apple began compromising its own security. However, some pundits and writers have decried Apple’s actions. For example, John Miller of the NYPD argued in a clip shown on John Oliver’s show Last Week Tonight that Apple could create a “one-time” backdoor and subsequently “toss it in the fireplace and throw it away” (Last Week Tonight). Such explanations of the situation not only ignore the basic principles of cryptography and security, they also don’t consider the potential for abuse. Any tool that Apple creates to hack their own product can and will be used again. As the earlier, multiauthored technical report argues, “. . . the prospect of globally deployed exceptional access systems raises difficult problems about how such an environment would be governed and how to ensure that such systems would respect human rights and the rule of law” (Abelson et al.). If Apple yielded in this case, they would be forced to yield in any future similar case, and soon enough, federal, state, and local governments would be free to order iPhones unlocked in far less tragic cases, opening an avenue for extreme government abuse. Even more alarming is the international precedent such a concession would set. If the U.S. government can order Apple to unlock an iPhone, why can’t the governments of China or Russia or Saudi Arabia order the same? This would lead to government backdoors legally falling into the hands of far more corrupt and insidious governments than that of the United States. Therefore, a “one-time” backdoor is impossible; the only way to protect security is to avoid backdoors altogether. This battle between Apple and the FBI has brought an important issue—the balance between privacy and security—into the spotlight. As citizens of the U.S. and of the world, we should certainly prevent and prosecute terrorist attacks such as the one in San Bernardino, but we should also be careful that in fighting one evil we do not enable another. The general public

Lastname 5 apathy toward increasing government surveillance is alarming; it means that the average American does not realize the exigent effects of violations of privacy. Oppressive regimes are often formed with the general consent of their citizens, and it is only after it is too late that people realize what happens when they cede rights. Therefore, though this legal battle may seem insignificant, it is important that we make a stand against the violation of privacy to ensure we continue to enjoy the rights which we take for granted.

Lastname 6 Works Cited Abelson, Harold, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffery I. Schiller, Bruce Schneier, Michael Specter, and Daniel J. Weitzner. "Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications." (n.d.): n. pag. DSPACE@MIT. Web. 8 Apr. 2016. "Apple to Fight Order to Help Hack San Bernardino Shooter's Phone." Fox News. Fox News Network, 17 Feb. 2016. Web. 8 Apr. 2016. Cook, Tim. "Customer Letter." Apple. Apple Inc., 16 Feb. 2016. Web. 08 Apr. 2016. Kleeman, Sophie. "In One Quote, Snowden Just Destroyed the Biggest Myth About Privacy." Mic. N.p., 29 May 2015. Web. 08 Apr. 2016. Last Week Tonight with John Oliver: Encryption. Perf. John Oliver. YouTube. YouTube, LLC, 13 Mar. 2016. Web. 8 Apr. 2016. . Sack, Steve. "Apple Lock." Cagle. N.p., n.d. Web. 8 Apr. 2016. Wingfield, Nick, and Mike Isaac. "Apple Gets Tech Industry Backing in IPhone Dispute, Despite Misgivings." The New York Times. The New York Times, 02 Mar. 2016. Web. 08 Apr. 2016. . Wingfield, Nick, and Mike Isaac. "Apple Letter on IPhone Security Draws Muted Tech Industry Response." The New York Times. The New York Times, 18 Feb. 2016. Web. 08 Apr. 2016. .

Lastname 1 Firstname Lastname Mr. Coito AP ...

Apr 8, 2016 - This battle between Apple and the FBI has brought an important issue—the balance ... Last Week Tonight with John Oliver: Encryption. Perf.

217KB Sizes 0 Downloads 94 Views

Recommend Documents

Carver Engineering and Science AP Chemistry – Mr. Wagenhoffer AP ...
There are three naturally occurring isotopes of oxygen: oxygen-16, oxygen-17, and oxygen-18. The atomic mass of oxygen is 16.00 amu. From these data, it may ...

Mr. Robinson AP US Government Syllabus Page 1 of 8 ...
Personally, I believe that a loose-leaf style notebook allows the greatest .... 1/9/2008 -. 1/12-2008. 2.3. Political Parties. Chapter 9. 5. 1/13/2008 -. 1/16/2008. 2.4.

Mark Keppel High School 1 AP Human Geography ... - Mr. Tran's Wiki
Aug 15, 2013 - Interpret maps and analyze geospatial data. Geography is concerned with the ways in which patterns on Earth's surface reflect and influence physical and human processes. As such, maps and geographic information systems (GIS) are fundam

Troubleshooting Your Quizzes Begin - Mr. Geoffrion Presents: AP ...
Troubleshooting Your Quizzes. One of the biggest adjustments for AP World History students is the delivery of content and the use of quizzes. In some cases ...

ESSENTIALITY CERTIFICATE I Certify that Mrs. / Mr. / Miss ... - DME, AP
I Certify that Mrs. / Mr. / Miss ……………………………… … Wife / Son /Daughter of. Mr/Mrs……………………………………………………… employed in the.

MR. WELLMAN'S AP LANGUAGE SUMMER READING ...
WELLMAN'S AP LANGUAGE SUMMER READING PROJECT. Hello,. This summer, you have the opportunity to read Dubner and Levitt's ​Freakonomics​(available for free on Mr. Wellman's website). Additionally, you will be completing an essay along with the read

Mark Keppel High School 1 AP Human Geography ... - Mr. Tran's Wiki
Aug 15, 2013 - Mr. Tran, M.A. (Ed.) Single Subject Social Studies Credential, with CLAD. Mr. Tran has been a history teacher in AUSD for the past 19 years. Aside from being a full-time teacher, Mr. Tran is also a professor for the University of Phoen

AP Human Geo Summer Reading - Mr. Ruff.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. AP Human Geo ...

AP US History Terms - Mr. Williams' Public Wiki
AP U.S. History. Terms. 1. General Court. 2. John Winthrop. 3. Restoration Colonies. 4. Leisler's Rebellion. 5. Quaker. 6. Navigation Acts. 7. Half-Way Covenant. 8. Dominion of New England. 9. Bacon's Rebellion. 10. Enlightenment ... Chesapeake-Leopa

mr. wonderful is_safe:1.pdf
mr. wonderful is_safe:1.pdf. mr. wonderful is_safe:1.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying mr. wonderful is_safe:1.pdf.

no. 1 mr. perfect.pdf
Connect more apps... Try one of the apps below to open or edit this item. no. 1 mr. perfect.pdf. no. 1 mr. perfect.pdf. Open. Extract. Open with. Sign In. Main menu.

mr. wonderful is_safe:1.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. mr. wonderful is_safe:1.pdf. mr. wonderful is_safe:1.pdf. Open.

mr. perfect no.1.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. mr. perfect no.1.pdf. mr. perfect no.1.pdf. Open. Extract. Open with.

Human Geography, AP Edition Chapter 6 Appendix 1: AP Human ...
According to the United Nations, there are an estimated 370 million indigenous people worldwide divided into about 5,000 ethnic groups.1 There are various ...

Human Geography, AP Edition Chapter 9 Appendix 1: AP Human ...
In the United States, certain toys are marketed, for example, to just boys or just girls. High schools often offer sports for women that they don't offer for men, and ...

Human Geography, AP Edition Chapter 9 Appendix 1: AP Human ...
Human Geography, AP Edition Chapter 9. Appendix 1: AP Human Geography Topic III.B.4. Cultural Differences in Attitudes. Towards Gender. Biological sex is not the same as gender. A person is born male or female (or intersex in a small percentage of th

Human Geography, AP Edition Chapter 6 Appendix 1: AP Human ...
among other things, the right to self-determination, cultural identity, and non-discrimination. The right to practice their own ... New Zealand. Many of these claims ...

Ap-tet-paper-1.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Ap-tet-paper-1.

AP Chemistry Semester 1
AP Chemistry 2013 Outline. 1. Structure of Matter (Chapters 1,2,3,7,8 electron configuration packet) o Atoms and elements. ▫ Combinations of atoms and ...

SM1 Pre AP Summer Module 1 (1).pdf
SM1 Pre AP Summer Module 1 (1).pdf. SM1 Pre AP Summer Module 1 (1).pdf. Open. Extract. Open with. Sign In. Main menu. Displaying SM1 Pre AP Summer ...

Language Pundit Page 1 - AP DSC
b) Shelter: Need, Different types of houses, Electrical Appliances – Their use, ... Galaxy, The Earth as a member of the Solar System, Origin of the Earth,.

AP Phys 1 Overview.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. AP Phys 1 Overview.pdf. AP Phys 1 Overview.pdf. Open. Extract.

AP Psychology O'Meara 1 Unit 1 Study Guide
They are derived from a sample and include mean, median, mode, range, variance and standard deviation. ... Double blind research design: a design that reduces bias in research and ensures that neither the participants nor ... Experiment: a type of re

AP Physics 1 Week 1 Practice Kinematics, Momentum ...
A. The centripetal acceleration of a satellite is given by. 2 ... B. Block 1, because the velocity after the collision is in the same direction as its velocity before the collision. C. Block 2, because it had a smaller speed before the collision. D.