Politics plays a central role in shaping developments in the contemporary American and global society. Conversely, several other developments in the society help shape the political reforms and issues of the day. Consequently, this has made politics very dynamic, changing from time to time based on the pertinent issues facing the society at any particular time. As such, there are very many issues in the society that have shaped public opinion in recent years, affecting political developments. Among these issues include differences in opinions between the government and other interest groups including businesses including on how the laws ought to be implemented.
One of the issues that have characterized American Politics recently is the question of privacy and national security interest. This issue has pitted the government against some major information technology organizations in the country. For example, Apple has been embroiled in a tussle with the government over the order to unlock one of its devices, an iPhone, that was used by one of the suspected attackers in a crime that resulted in 14 deaths in San Bernardino, California in December. This has resulted in a continued legal drama involving the company and the Federal Bureau of Investigations (FBI). From the governments perspective, the iPhone belonging to the San Bernardino Gunman needs to be unlocked or decrypted in order to enable the FBI access vital information that can enable the government prosecute the case.
Several security precautions are necessary to make mobile technology efficient in healthcare. Mobile technology is very risky since a lot of data can be lost in the event that a phone is damaged or gets lost. Furthermore, the information may be accessed by unauthorised persons. In order to avoid these security hitches, it is important for appropriate measures to be put in place. For instance, using special software that can encrypt mobile health data and backing up crucial data on systems in the hospital (Gartee, 2011). Also creating a formal process for notifying relevant authorities when a phone gets lost can be a great security precaution.
In a techno-savvy age we live in today, this seems to be a more plausible idea that can quickly revolutionize police operations. Today, cellphones and other related communication technologies are highly advanced, enabling people to easily record live events and share with others over the internet.
Apple is one of the lost recognizable American brands, and an American success story when it comes to business and innovations. Apples products have been sold tom millions of people within the country and abroad making it one of the biggest and wealthiest organizations in the world. The company has made numerous steps to strengthen the security features of its products such as the iPhone, in order to protect the data stored on the device by its users. The company considers this move to be in the interest of the public and one that guarantees and safeguard the privacy of their customers as required by law. Therefore, from apples view, it would be against the law and against public interest to obtain private data from one of its devices owned by a customer. The company argues that allowing the government, through the FBI to access the data stored on the gunmans iPhone can only open up avenues for ore requests to decrypt other phones in the future. This will ultimately affect Apples image in terms of its commitment to protecting the security and privacy of the data belonging to its customers. This is why the company has remained stiff and unwilling to respond positively to the governments request.
Therefore, Apple argues that unlocking this phone would result in a slippery slope where the government would be able to access phones from other users who may not be related to the case (Hier & Greenberg, 21). Furthermore, Apple maintains that it is not bound by law to overstep its security protocols in order to facilitate the FBI in the case. In fact, Tim Cook, the current CEO of Apple argues that the company has done all it could within the available legal framework to assist in the case. Decrypting the phone would be against the legal position of the company and would make its customers question Apples commitment to their protection.
With this position taken by Apple, many analysts view it as a publicity stunt by the company. Some analysts are of the opinion that public interest supports the FBI and that most citizens would want the FBI to access the phone and uncover critical evidence that would help resolve the murder case that resulted in 14 deaths. Based on this, the company is not serving public interest, but rather engaged in a public relations exercise that will strengthen its image as a company fighting from protection of the masses, who use technology such as the iPhone.
Apple uses a wide range of technologies to encrypt the data of used on the iPhone. For instance the DLP in data security is an abbreviation for Data Loss Prevention. This refers to the various solutions aimed identifying and detecting any potential breach of data transmission or data ex-filtration and subsequently preventing such processes through monitoring and blocking sensitive data during end point actions (in-use), network traffic (in motion) and during rest (data storage). There are data loss prevention software applications that facilitate this process.
On the other hand, the FBI can be seen as willing to break the law in order to resolve another illegal matter. This is unconstitutional as the law demands that evidence must only be gathered through legal means. The law promotes issues such as the privacy of individual and the FBI must work along those parameters however crucial the case is. Also, it may be the case that the FBI would like to access many other iPhones and monitors the private communications of people. This is exactly what Apple is fighting against. By allowing Apple to aces the iPhone used by the attacker, it may open up avenues for accessing many other iPhones in the name of gathering data to resolve certain cases.
This problem raises a wide range of issues that have been part of public discourses on the matter in the recent months. There are issues of security, privacy, constitutionalism, and human rights that need to be addressed (Deflem, 23). There are concerns whether the governments desire to access the phone are part of its mass surveillance program that sees government agencies monitor citizens (Barbour and Wright, 42). This research will focus on discussing these critical issues in the case and how the case between Apple and the FBI is likely to shape political and business developments in the future.
Of particular interest is the 4th amendment to the constitution concerning the protection of citizens against unreasonable searches and seizures. This implies that it is illegal or unlawful to gain access of private belongings without his permission or court injunctions. The right to privacy is contained in the Bill of Rights in the various Amendments to the American constitution. There are various Supreme Court cases that show how the right to privacy is protected by law in the US. In Griswold v Connecticut (1965), the court overturned a state law prohibiting owning, selling and distributing contraceptives to married couples as this is considered a private matter and is protected by law. In Stanley v Georgia (1969), the court ruled unanimously that individuals right to own pornography material was protected in the right to privacy. In Lawrence v. Texas (2003), the court overturned an earlier ruling that prohibited sodomy among gay couples as this constituted their privacy.
Integration of new technology in business operations has had an enormous impact on how business organizations make their decisions. Emerging technology is set to replace some current aspects of business operations. However, several security precautions are necessary to make mobile phone technology efficient in business as well as in personal life. This technology is very risky since a lot of data can be lost in the event that a phone is damaged or gets lost. Furthermore, the information may be accessed by unauthorised persons. In order to avoid these security hitches, it is important for appropriate measures to be put in place. For instance, using special software that can encrypt mobile and online personal data and backing up crucial data on systems in the organization. Also creating a formal process for notifying relevant authorities when a phone gets lost can be a great security precaution.
The use of social media and mobile phones can raise ethical or moral questions. As such, careful consideration has to be made before making a final decision. A good decision can only be reached at by adhering to some of the prominent ethical decision making models such as utilitarianism. According to utilitarianism, a decision is only considered useful or morally right if it results in the greatest amount of happiness or good to the greatest amount of people. On the basis of utilitarianism, ethical dilemmas can be resolved by selecting an option that would benefit the greatest number of people.
While new technologies are inevitable, the novel seems to propagate the view that there is need to address the controversial issues embedded in these technologies in order to successfully introduce and implement new technologies. One other issue that the novel makes clear is the motivation behind new technologies. It seems new technologies are only aimed at harnessing more information about ourselves, the world, and other people. This quest for more information can be dangerous in itself if not approached carefully. For example, collecting more information about other people can lead to a breach of privacy. From these perspectives, the novel paints a future that will be based on transparency; where every person will be subject of scrutiny. This will introduce new challenges, especially for those not interested in giving up their privacy.
Barbour and Wright. The Essentials, Edition 7. Sage/CQ Press. 2015. Print.
Deflem, M.. Surveillance and governance: Crime control and beyond. Bingley, UK: Emerald/JAI. 2008. Print.
Hier, S. P., & Greenberg, J. The surveillance studies reader. Maidenhead: Open University Press. 2007. Print.
William Eric Davis .The Battle Born Silver State. Las Vegas, NV: The College of Southern Nevada. 2012. Print.
If you are the original author of this essay and no longer wish to have it published on the SuperbGrade website, please click below to request its removal:
- Marco Rubio
- Government Standards
- Private prisons in America
- Critical Evaluation of the Impact of Video Games in Education and Government Decisions on Tourism
- Paper Example on Contract Cost and Documentation for the Navy
- Research Paper on Creation and Evolution of United States Foreign Policies
- Essay on Suicide Terrorism as a Main Type of Terrorism for Counterterrorism Officials