Verified Document

Looking Into FBI Vs Apple In Relation To The Patriot Act Essay

FBI vs. Apple in Relation to the Patriot Act America is divided over the tradeoff between personal privacy and security needs. The focus is, now, on the government surveillance, but there are concerns over how data is being used by businesses. The issue was raised after the federal court was requested to force Apple to assist the FBI to unlock one of the phones used by a suspect in the terrorist attack carried out in December 2015 in San Bernardino, Californian (Rainie and Maniam, 2016). Apple petitioned the order to safeguard the security of other iPhone users. This provoked a national conversation on how far the technological firms should go in as far as protecting their privacy and cooperating with law enforcement agencies is concerned.

The unfolding events have had an impact on how the public feels about the issue. Terrorism generates a lot of anxiety. A good example is the San Bernardino and Paris shootings, which occurred late in the year 2015. According to the Pew Research Center, the survey conducted in December discovered that the public felt that the anti-terror policies implanted by the government are not protecting the country while 28% of the respondents expressed concern that the policies were in essence restricting civil liberties for the average person. Two years earlier, there had been furor when Edward Snowden revealed the details of the National Security agency surveillance program. The majority were of the view that the antiterrorism programs had gone too far in restricting civil liberties (47%) while only 35% felt that they were actually protecting the country.

In 2005, President George W. Bush authorized NSA to eavesdrop on the U.S. citizens. Pew Research Center survey established that 50% of the respondents felt that America had not gone far in their quest to protect the country against Terrorism threats. 54% felt that it was right for the government to monitor all the phones and email communications of all Americans suspected to be engaging in terrorism activities without necessarily having to obtain court permission. 43% of them thought that it was generally wrong to eavesdrop. A similar number of people responded in the same way after President Obama took office in 2009 (Rainie and Maniam, 2016).

Immediately after Snowden revelations in 2013, the Pew Research Center poll found that 48% of Americans approved the government's effort to collect data to be used in the antiterrorism efforts. However, this approval had declined by 40% by January 2014 (Rainie and Maniam, 2016). Many Americans continue to express concern about the government's surveillance concerns, especially surveillance on electronic communication and data. 46% of the respondents said that they were not concerned with the surveillance.

Businesses continue to mine data about their clients while the American citizens are concerned with preserving privacy of their personal behavior and information. Following the big data breaches, the views have really intensified following the data breaches at various companies such as eBay, Target and Anthem, eBay and personal file (Rainie and Maniam, 2016).

Pew survey showed that people are anxious about their security and personal data. The majority of them feel that they have lost control of personal data. This has increased anxiety. They are not confident that companies that collect this information will manage to keep it safely.

FBI vs. Apple

On 2nd Dec 2015, 14 people were killed and 22 others were severely injured when terrorists attacked San Bernardino, USA The Attack was executed by Tashfeen Malik and her husband Rizwan Farook. The couple started plotting the attack before they got engaged. Farook's phone is believed to contain vital information which may help prevent terrorist attacks in the future. The FBI has ordered Apple to create software that will help unlock and retrieve information from iPhone without necessarily knowing what the password is. Apple refused to engage in such activities arguing that it would violet the consumers' privacy (Editorial Board, 2016). This has resulted in a controversy on whether FBI should create a master key or not.

The federal judge requested Apple to help FBI unlock Farook's phone. It asked Apple to avail technical assistance to the authorities, a process which would require an overhaul of the system that disables phones after 10 unsuccessful password attempts. When this happens, it makes all the data inaccessible. Apple did not help the FBI (Kharpal, 2016). In fact, Apple's CEO called the order chilling and said that this would require that it writes new software that would be capable of doing the master key task. Cook argued that if the FBI were allowed to access this iPhone, using the master key, nothing would actually stop them from doing...

The FBI insisted that this was just a one-off request hence the case ended up in courts.
This case is one of the few high profile clash cases over debate on data privacy and encryption. According to the law enforcement authorities, the encryptions used by phone manufacturers make it difficult for them to stop terrorist attacks or solve terrorist puzzles. On the other hand, technology firms responded by arguing that encryption is necessary since it helps protect data from the-would-be hackers (Kharpal, 2016). The privacy of data is a sensitive topic, especially after it was revealed that the former National Security Agency contractor Edward Snowden voiced the extent of government's surveillance activities.

In February, a ruling in favor of Apple was delivered by a judge. He argued that it was wrong for the firm to be compelled to break into its client's phone under All Writs Act. The U.S., Department of Justice (DoJ) promised to fight back till the ruling is overturned (Editorial Board, 2016).

The San Bernardino case thought that it would assure Apple's support under the All Writs Act. This is a law passed in 1789, which permits judges to direct observance with court orders and search warrants. The government relied on this Act to argue that it acquired search warrants related to iPhone and argued that they might compel Apple to ease access to its device. Apple opposed it and argued that it was not right to order the company to concede its security (Editorial Board, 2016; Kharpal, 2016).

Never the less, Apple has been able to provide data on its products in more than 70 cases. However, having improved on its newer software version, it has now lost its capability to remove information for the Authorities. However, the government may carry on depending on the "All Writs Act" and hope that one day the court will provide support to any one of its cases. Alternatively, it may wait for a solution from the congress through legislation. None of these options is appealing to the government.

The Patriot Act

The events of September 11, 2001 are the origin of the U.S. War on Terror popularized by the Bush administration. The previous American strategies were to combat terrorism targeting attacks on its interests abroad as well supporting the government to cub terrorism within its boundaries. The September 11 incidence revealed that the U.S. was vulnerable to the violence (McCarthy, 2002). The U.S. responded by reshaping its anti-terrorist strategies to help prevent future attacks.

To facilitate prosecution of terrorists, the U.S. Congress passed a resolution to unite and strengthen America by (USA PATRIOTACT) Providing Appropriate Tools Required to help Intercept and Obstruct Terrorism Act. The act was signed into law in October 26, 2001 and was enacted to help eliminate laws that obstructed intelligence gathering and surveillance.

The Patriot Act permits investigators to make use of the apparatus that had readily been available to carry out investigation into drug trafficking and organized crime. The tools that this act offers to help against terrorism have been utilized for many decades; they have been assessed as well as permitted by the courts. The act allows the law enforcement agencies to make use of surveillance against organized crime. Before enactment of the Patriotic Act, the courts permitted the law enforcement to carryout surveillance electronically in investigating the ordinary citizens on crimes not related to terrorism, including passport fraud, mail fraud as well as drug related crimes (Doyle, 2001).

Agents could also wiretap and investigate crimes committed by terrorism. This act allowed investigators to collect data on a wide range of terrorism associated crimes such as using of weapons of mass destruction (WMD), chemical weapons, killing of Americans overseas and financing terrorism.

Unfortunately, when lawbreakers are alerted prematurely, about an inquiry, they flee, kill witnesses, destroy evidence and cut off links with associates. Because of this, the federal courts allow the law enforcement to postpone before the subject is informed about the judicially permitted search authorization and its execution.

A notice is provided and law enforcements are given identification time to associates; eliminate threats and apprehending suspects before alerting them (McCarthy, 2002).

The Patriot Act updates the law to reflect the new threats and the new technology. The act makes it easier to fight the digital age battle using the modern technology. It permits computer hacking victims to be helped in observing trespassers (McCarthy, 2002). Nowadays, electronic hacking is treated seriously as physical trespassers and hacking victims…

Sources used in this document:
References

Appalachian State University, (2016). The U.S.A. Patriot Act. Retrieved from http://gjs.appstate.edu/media-coverage-crime-and-criminal-justice/usa-patriot-actCenter for Constitutional Rights (2002). The state of civil liberties: One year later. Erosion of civil liberties in the post 9/11 era. Retrieved from http://www.ccr-ny.org/v2/reports/docs/Civil_Liberities.pdf

Doyle, C. (2001). Terrorism: Section by Section Analysis of the U.S.A. Patriot Act. Washington, D. C.: Congressional Research Service.

Editorial Board, (February 19, 2016). The FBI vs. Apple: The White House should have avoided this legal and security showdown. The Wall Street JournalKharpal, A. (29 Mar 2016). Apple vs. FBI: All you need to know. CNBC. Retrieved from http://www.cnbc.com/2016/03/29/apple-vs.-fbi-all-you-need-to-know.htmlMcCarthy, M.T. (2002). Recent Developments: USA Patriot Act. Harvard Journal on Legislation. 39(Summer 2002): 435-6.

RAINIE, L. AND MANIAM, S. (FEBRUARY 19, 2016). Americans feel the tensions between privacy and security concerns. Pew Research Center. Retrieved from http://www.pewresearch.org/fact-tank/2016/02/19/americans-feel-the-tensions-between-privacy-and-security-concerns/
STONE, J. (2015). U.S. Surveillance Wasn't Designed to Stop Domestic Terrorism, Even The San Bernardino Shooters. International Business Times. Retrieved from http://www.ibtimes.com/us-surveillance-wasnt-designed-stop-domestic-terrorism-even-san-bernardino-shooters-2210453
The Chicago Tribune, (2015). Editorial: After San Bernardino: Terror and intel. Retrieved from http://www.chicagotribune.com/news/opinion/editorials/ct-san-bernardino-rubio-patriot-act-surveillance-edit-jm-20151209-story.html
Cite this Document:
Copy Bibliography Citation

Related Documents

FBI and Witness Protection the
Words: 4925 Length: 15 Document Type: Term Paper

Even thenm once in a while the heads of the more powerful families would meet to work out differences (Meltzer, 1990, pp. 40-41). Still, striking at the mob could not be effected easily by the use of normal investigative methods alone. Indeed, the failure of the FBI to use even those methods in a concerted manner is noted by Kessler (2002), who reports that Hoover usually claimed that the FBI

FBI Case Study the Primary
Words: 630 Length: 2 Document Type: Case Study

However, the Academy of Sciences definition of the term enterprise architecture also extends beyond mere IT architecture, although such architecture will certainly support the Academy's definition. This definition denotes "a detailed characterization of the bureau's goals, tasks, strategies, and key operational processes" (National Academy of Sciences, 2004). These objectives would then be facilitated by IT solutions it implement them. One of the most important lessons learned in this particular case

FBI Has No Hard Evidence
Words: 2147 Length: 6 Document Type: Research Paper

Regardless of these facts, the media failed to put arguments such as these on the front page of the paper because of the control the Administration had on the media channels at the time. It is rather difficult to say the extent to which the independent or small town media actually covered the stories, with its details and discoveries. The internet search can prove more useful, but for the aim

FBI Drugs and WMDs
Words: 3378 Length: 11 Document Type: Research Paper

Introduction The USS Cole Bombing in October 2000 was a prelude to the intense focus on the spread of weapons of mass destruction (WMDs) that the FBI took up in earnest one year later in the wake of and in response to 9/11. With the killing of several crewmen and the wounding of several more, the USS Cole Bombing was in reality just one more terrorist incident in an already growing

FBI Data and Sexual Homicide
Words: 730 Length: 2 Document Type: Research Paper

Criminal Justice Issues Since there is no official legal definition of sexual homicide, therefore sexual homicide cannot be truly characterized as criminal behavior. Reaction Although there is no specific legal definition for sexual homicide, homicides that are listed as "criminal" include the killing of humans by either murder or manslaughter, so a closer look at what "sexual homicide" really refers to is warranted. In the book Sexual Murder: Catathymic and Compulsive Homicides, Louis

Cyber Crimes and the FBI the Investigative
Words: 1435 Length: 4 Document Type: Essay

Cyber Crimes and the FBI The investigative techniques used by the FBI in the case of Vasiliy Gorshkov and Alexey Ivanov were completely legitimate and necessary; moreover, they demonstrated that law enforcement of the United States was prepared to use any means necessary to apprehend these flagrant security risks. "Court papers described the men as kingpins of Russian computer crime who hacked into the networks of at least 40 U.S. companies

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now