close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Legal Conflict Between FBI and Apple Based on Cryptography

downloadDownload printPrint

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

Why Crypto

Cryptography is the art of writing or solving codes. These codes are used to convey messages to allow for secrecy and security. It has been used for centuries mainly for militaristic purposes. Kings would send spies into enemy territory who would use discreet code words to speak safely with their allies. Washington and the founding fathers had their own spy network who used crypts written by Ben Franklin (mostly) to communicate safely while under the British’s eye. Today our militaries use cyphers and encryptions to exchange delicate information safely over the internet and in person. Cryptography was an important aspect during WWII that ultimately helped decide the war. Messages were sent through telegraph wires using complex codes and keys by both sides and it was a constant battle of “who knows what?” Today the same battle goes on but nowadays it’s mainly done through the internet. Nowadays, rather than using morse code and large coding machines that could decrypt messages we instead use the internet and complicated programs and algorithms in order to protect our vital information. Any regular person could be hacked almost anywhere in the world and sometimes find a hacker or preventing a security breach easier said than done. Similarly, it is not always easy hacking into someone’s network. Sometimes countries and government agencies attempt to spy on dangerous criminal organizations or even on each other attempting to break their target’s encryptions. The two “worlds” shown in “Cryptonomicon” are of WWII and today. Wartime was far different back then with less prepared and disciplined soldiers often fresh out of school or even just off the streets to enlist. The officers often abused opium and slept with hookers when they were off. This is embodied by the character Frick who Shaftoe had a conflict with while aboard his ship. Rather nowadays actions such as those would most likely be reciprocated with a Court Marshall or some other form of military discipline. Also the soldiers of that time often used racist language when regarding Chinese people. They had regularly referred to the shoe shiners, bag boys, Chinese soldiers or even regular Chinese man as “Coolies” and their fighting style “Chop-Suey”. Nowadays soldiers would be a bit more careful with their terms because of codes of conduct and discipline expected of you as well as the fact that if you were to be recorded saying racial slurs then probably the world would know by the next day due to the internet.

Apple versus the US Government

A major legal conflict being monitored by the media recently has been the conflict between Apple and the FBI. a terrorist that organized and conducted a mass shooting use an Apple iphone to plan and make calls in the months prior to the attack but had stopped backing up his info to the cloud. Due to this the FBI needs to hack into the phone in order to see if there was any vital information on the phone pertaining to any terrorist organizations or upcoming attacks. The issue is that the FBI is currently unable to hack into the phone without risking the permanent loss of all information on the phone. Due to this, the FBI is requesting that Apple should make a “key” that would be used to allow the FBI the ability to hack into the phone. Apple however is refusing to do so because they feel that it would then be able to be used to hack into all Apple devices. Apple iphones are encrypted with a 256 bit encryption that ultimately affords any user security that their device is safe from hackers however if this key were to be made, Apple feels it would pose a huge risk to this security system and put all of it’s users at risk. Craig Federighi said in a statement “In just the past 18 months,hackers have repeatedly breached the defenses of retail chains, banks and even the federal government, making off with the credit card information, Social Security numbers and fingerprint records of millions of people.” In addition to personal data, Federighi also brought up the possibility of terrorist organizations being able to hack personal devices. “Our nation’s vital infrastructure —?? such as power grids and transportation hubs —?? becomes more vulnerable when individual devices get hacked, criminals and terrorists who want to infiltrate systems and disrupt sensitive networks may start their attacks through access to just one person’s smartphone.” Federighi said that the encryption represents “the best data security available to consumers,” making it “so disappointing” that the FBI is pushing against its technology.”

Adversely, the FBI wants Apple to comply and doesn’t believe it would be as catastrophic to security as Apple states it would be. A federal judge had ruled that for the sake of national security, Apple should assist the FBI by giving them a “key” that could be used to hack into the San Bernadino shooter’s iPhone. Apple says that this would be a major breach to security a violation of privacy for millions however the FBI claims that this data key would be kept safe and that they only want to use it to get into this one phone. They claim that this wouldn’t put millions of iPhone users at risk to cyber attacks. The FBI says that rights won’t compromised if Apple was to comply to the FBI’s request and gave a number of reasons as to why Apple should comply to their request and why Americans wouldn’t be at as much risk as Apple claims they would be. Firstly, the main reason the FBI believes Apple should help them unlock the phone with this “key” is because the key itself would only identify with that single iPhone. This means that the key would be unable to unlock other iPhone models, only the one and possibly other iPhone 5s. Secondly, the FBI is fully content with the software being created exclusively within an Apple facility and that the phone would be unlocked their as well. The phone itself would never have to enter the government’s custody. Thirdly, even if the FBI was to obtain the software and want to use it, they would need a search warrant in order to do so. Lastly, The FBI has given Apple the option of using an alternative means to hack into the phone and has offered to pay whatever it takes to do it. In other words, it doesn’t care about the software, just getting at Farook’s texts, contacts, emails and photos.

Personally, I try to stay neutral in big media conflicts but if I was asked whether I would support the FBI or Apple, I would say I’d lean more towards Apple. The reason I chose to be on Apple’s side is because while I do see the urgency in the FBI’s need to get into this phone, I feel that it would be a breach of security to create the “key” for the phone. Hackers have gotten into the private servers of government agencies before and if this key was to be created, they would very possibly be able to get their hands on it. Also, while the key may hypothetically only be for the iPhone 5 or even just that singular phone, seeing how the key works and was coded may give hackers an idea of how to create one for themselves. I understand that it may be unlikely or even be considered “impossible” but many times throughout history, hackers have managed to do things that have been considered impossible. I feel that if Apple and the FBI used an alternative means of hacking into the phone, I would support the FBI.

As for the characters in “Cryptonomicon”, whether or not they would support the FBI over Apple or vice-versa is a hard observation for me to make. Obviously, if you’re a Libertarian who believes the government should stay out of everything or even believe in anarchy, you would side with Apple. Avi, for instance, I feel would side with Apple due to his wanting to create a safe data-haven for the world’s hacker population. Adversely, I feel that characters such as Lawerence Pritchard Waterhouse and Earl Comstock would be on the FBI’s side. I decided this because of the fact that they worked for the protection of America at all costs so in a conflict between a corporation versus a government agency working to protect national security, they would side with the government agency. While I feel Lawerence Waterhouse would side with the FBI, I think Randy Waterhouse as well as the other members of Epiphyte, especially Tom Howard and John Cantrell, would all side with Apple due to their (mostly) Libertarian views.

infoRemember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism-free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Legal Conflict Between Fbi and Apple Based on Cryptography. (2019, January 03). GradesFixer. Retrieved September 28, 2021, from https://gradesfixer.com/free-essay-examples/legal-conflict-between-fbi-and-apple-based-on-cryptography/
“Legal Conflict Between Fbi and Apple Based on Cryptography.” GradesFixer, 03 Jan. 2019, gradesfixer.com/free-essay-examples/legal-conflict-between-fbi-and-apple-based-on-cryptography/
Legal Conflict Between Fbi and Apple Based on Cryptography. [online]. Available at: <https://gradesfixer.com/free-essay-examples/legal-conflict-between-fbi-and-apple-based-on-cryptography/> [Accessed 28 Sept. 2021].
Legal Conflict Between Fbi and Apple Based on Cryptography [Internet]. GradesFixer. 2019 Jan 03 [cited 2021 Sept 28]. Available from: https://gradesfixer.com/free-essay-examples/legal-conflict-between-fbi-and-apple-based-on-cryptography/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! This essay is not unique. You can get a 100% Plagiarism-FREE one in 30 sec

    Receive a 100% plagiarism-free essay on your email just for $4.99
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer
    exit-popup-close

    Haven't found the right essay?

    Get an expert to write you the one you need!

    exit-popup-print

    Professional writers and researchers

    exit-popup-quotes

    Sources and citation are provided

    exit-popup-clock

    3 hour delivery

    exit-popup-persone