close
test_template

Legal Conflict Between FBI and Apple Based on Cryptography

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 1457 |

Pages: 3|

8 min read

Updated: 16 November, 2024

Words: 1457|Pages: 3|8 min read

Updated: 16 November, 2024

Table of contents

  1. Introduction to Cryptography
  2. Cryptonomicon: A Tale of Two Worlds
  3. Apple versus the US Government
  4. Personal Stance
  5. Characters in “Cryptonomicon”
  6. References

Introduction to Cryptography

Cryptography is the art of writing or solving codes. These codes are used to convey messages to allow for secrecy and security. It has been used for centuries mainly for militaristic purposes. Kings would send spies into enemy territory who would use discreet code words to speak safely with their allies. Washington and the founding fathers had their own spy network who used crypts written by Ben Franklin (mostly) to communicate safely while under the British’s eye. Today, our militaries use cyphers and encryptions to exchange delicate information safely over the internet and in person. Cryptography was an important aspect during WWII that ultimately helped decide the war. Messages were sent through telegraph wires using complex codes and keys by both sides, and it was a constant battle of “who knows what?”

Today, the same battle goes on, but nowadays it’s mainly done through the internet. Rather than using Morse code and large coding machines that could decrypt messages, we now use the internet and complicated programs and algorithms to protect our vital information. Any regular person could be hacked almost anywhere in the world, and sometimes finding a hacker or preventing a security breach is easier said than done. Similarly, it is not always easy hacking into someone’s network. Sometimes, countries and government agencies attempt to spy on dangerous criminal organizations or even on each other by attempting to break their target’s encryptions.

Cryptonomicon: A Tale of Two Worlds

The two “worlds” shown in Neal Stephenson’s "Cryptonomicon" are of WWII and today. Wartime was far different back then, with less prepared and disciplined soldiers often fresh out of school or even just off the streets to enlist. The officers often abused opium and slept with hookers when they were off. This is embodied by the character Frick, with whom Shaftoe had a conflict while aboard his ship. Actions such as those would most likely be reciprocated with a Court Martial or some other form of military discipline today.

Additionally, the soldiers of that time often used racist language when referring to Chinese people. They had regularly referred to the shoe shiners, bag boys, Chinese soldiers, or even regular Chinese men as “Coolies,” and their fighting style as “Chop-Suey.” Nowadays, soldiers would be a bit more careful with their terms because of codes of conduct and discipline expected of them, as well as the fact that if they were to be recorded saying racial slurs, the world would probably know by the next day due to the internet.

Apple versus the US Government

A major legal conflict being monitored by the media recently has been the conflict between Apple and the FBI. A terrorist who organized and conducted a mass shooting used an Apple iPhone to plan and make calls in the months prior to the attack but had stopped backing up his info to the cloud. Due to this, the FBI needs to hack into the phone to see if there was any vital information on the phone pertaining to any terrorist organizations or upcoming attacks. The issue is that the FBI is currently unable to hack into the phone without risking the permanent loss of all information on the phone. Due to this, the FBI is requesting that Apple should make a “key” that would allow the FBI the ability to hack into the phone.

Apple, however, is refusing to do so because they feel that it would then be able to be used to hack into all Apple devices. Apple iPhones are encrypted with a 256-bit encryption that ultimately affords any user security that their device is safe from hackers. However, if this key were to be made, Apple feels it would pose a huge risk to this security system and put all of its users at risk. Craig Federighi said in a statement, "In just the past 18 months, hackers have repeatedly breached the defenses of retail chains, banks, and even the federal government, making off with the credit card information, Social Security numbers, and fingerprint records of millions of people" (Federighi, 2016). In addition to personal data, Federighi also brought up the possibility of terrorist organizations being able to hack personal devices. "Our nation's vital infrastructure — such as power grids and transportation hubs — becomes more vulnerable when individual devices get hacked; criminals and terrorists who want to infiltrate systems and disrupt sensitive networks may start their attacks through access to just one person's smartphone" (Federighi, 2016). Federighi said that the encryption represents "the best data security available to consumers," making it "so disappointing" that the FBI is pushing against its technology.”

Adversely, the FBI wants Apple to comply and doesn’t believe it would be as catastrophic to security as Apple states it would be. A federal judge had ruled that for the sake of national security, Apple should assist the FBI by giving them a “key” that could be used to hack into the San Bernardino shooter’s iPhone (United States v. Apple Inc., 2016). Apple says that this would be a major breach of security and a violation of privacy for millions; however, the FBI claims that this data key would be kept safe and that they only want to use it to get into this one phone. They claim that this wouldn’t put millions of iPhone users at risk of cyber attacks. The FBI says that rights won’t be compromised if Apple was to comply with the FBI’s request and gave a number of reasons as to why Apple should comply with their request and why Americans wouldn’t be at as much risk as Apple claims they would be.

Firstly, the main reason the FBI believes Apple should help them unlock the phone with this “key” is because the key itself would only identify with that single iPhone. This means that the key would be unable to unlock other iPhone models, only that one and possibly other iPhone 5s. Secondly, the FBI is fully content with the software being created exclusively within an Apple facility and that the phone would be unlocked there as well. The phone itself would never have to enter the government’s custody. Thirdly, even if the FBI were to obtain the software and want to use it, they would need a search warrant to do so. Lastly, the FBI has given Apple the option of using an alternative means to hack into the phone and has offered to pay whatever it takes to do it. In other words, it doesn’t care about the software, just getting at Farook’s texts, contacts, emails, and photos.

Personal Stance

Personally, I try to stay neutral in big media conflicts, but if I were asked whether I would support the FBI or Apple, I would say I’d lean more towards Apple. The reason I chose to be on Apple’s side is because while I do see the urgency in the FBI’s need to get into this phone, I feel that it would be a breach of security to create the “key” for the phone. Hackers have gotten into the private servers of government agencies before, and if this key were to be created, they would very possibly be able to get their hands on it. Also, while the key may hypothetically only be for the iPhone 5 or even just that singular phone, seeing how the key works and was coded may give hackers an idea of how to create one for themselves. I understand that it may be unlikely or even be considered “impossible,” but many times throughout history, hackers have managed to do things that have been considered impossible. I feel that if Apple and the FBI used an alternative means of hacking into the phone, I would support the FBI.

Characters in “Cryptonomicon”

As for the characters in “Cryptonomicon,” whether or not they would support the FBI over Apple or vice-versa is a hard observation for me to make. Obviously, if you’re a Libertarian who believes the government should stay out of everything or even believe in anarchy, you would side with Apple. Avi, for instance, I feel would side with Apple due to his wanting to create a safe data-haven for the world’s hacker population. Adversely, I feel that characters such as Lawrence Pritchard Waterhouse and Earl Comstock would be on the FBI’s side. I decided this because of the fact that they worked for the protection of America at all costs, so in a conflict between a corporation and a government agency working to protect national security, they would side with the government agency. While I feel Lawrence Waterhouse would side with the FBI, I think Randy Waterhouse as well as the other members of Epiphyte, especially Tom Howard and John Cantrell, would all side with Apple due to their (mostly) Libertarian views.

References

Federighi, C. (2016). Statement on encryption and security. Retrieved from Apple Inc.

United States v. Apple Inc., No. 16-10 (C.D. Cal. 2016).

Get a custom paper now from our expert writers.

Stephenson, N. (1999). Cryptonomicon. New York: Avon Books.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

Legal Conflict Between Fbi and Apple Based on Cryptography. (2019, January 03). GradesFixer. Retrieved November 19, 2024, from https://gradesfixer.com/free-essay-examples/legal-conflict-between-fbi-and-apple-based-on-cryptography/
“Legal Conflict Between Fbi and Apple Based on Cryptography.” GradesFixer, 03 Jan. 2019, gradesfixer.com/free-essay-examples/legal-conflict-between-fbi-and-apple-based-on-cryptography/
Legal Conflict Between Fbi and Apple Based on Cryptography. [online]. Available at: <https://gradesfixer.com/free-essay-examples/legal-conflict-between-fbi-and-apple-based-on-cryptography/> [Accessed 19 Nov. 2024].
Legal Conflict Between Fbi and Apple Based on Cryptography [Internet]. GradesFixer. 2019 Jan 03 [cited 2024 Nov 19]. Available from: https://gradesfixer.com/free-essay-examples/legal-conflict-between-fbi-and-apple-based-on-cryptography/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now