In December 2015, the FBI attained the iPhone of one of the shooters in an ISIS-inspired...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
In December 2015, the FBI attained the iPhone of one of the shooters in an ISIS-inspired terrorist attack that killed 14 people in San Bernardino, California. As part of the investigation, the FBI attempted to gain access to the data stored on the phone but was unable to penetrate its encryption software. Lawyers for the Obama administration approached Apple for assistance with unlocking the device, but negotiations soon broke down. The Justice Department then obtained a court order compelling Apple to help the FBI unlock the phone. Apple CEO, Timothy Cook, publicly challenged the court in an open letter, sparking an intense debate over the balance between maintaining national security and protecting user privacy. Apple and its supporters, including top technology companies such as Google and Facebook, made the case on several fronts that the court order threatened the privacy of all individuals. First, according to Apple, the order effectively required the company to write code, violating its First Amendment right to free speech by forcing the company to "say" something it did not want to say. Previous court cases had already established computer code as legally protected speech. Second, such a backdoor, once created, could fall into the wrong hands and threaten the privacy of all iPhone owners. Finally, it would set a dangerous precedent; law enforcement could repeatedly require businesses such as Apple to assist in criminal investigations, effectively making technology companies an agent of government. Representatives from both sides of the political aisle offered several arguments in favor of the Justice Department's efforts and against Apple's stance. Their central claim was that the U.S. legal system establishes constraints on the government's access to private information which prevent abuse of search and surveillance powers. At the same time, the law still allows authorities to gain access to information that facilitates prevention and prosecution of criminal activities, from terrorism to drug trafficking to child pornography. Critics of Apple also rejected the slippery slope argument on the grounds that, if Apple cooperated, it could safeguard the code it created and keep it out of the hands of others, including bad actors such as terrorists or criminal groups. Moreover, Apple was accused of being too interested in protecting its brand, and even unpatriotic for refusing to comply with the court order. Ultimately, the FBI dropped the case because it was able to circumvent the encryption on the iPhone without Apple's help. Apple and the FBI have two separate incidences where the FBI has asked Apple to break into an iPhone in a terrorist investigation where that phone may contain information that could prevent another terrorist attack. I have attached a case study that details the incident in 2015 and I have included a link to a New York Times article that details the incident earlier this year. For purposes of this discussion, you are Tim Cook and you must decide how to respond to the FBI's latest request. Falling back on his business studies, Mr. Cook applies utilitarianism to analyze what his decision should be. Who are the stakeholders in this and how might they be affect by Apple's decision? What decision benefits the greatest number of these stakeholders? Do you agree with the decision that utilitarianism leads you to? Why or why not? Does apply the test in Rights and Duties or Fairness and Justice lead you to a different answer? In December 2015, the FBI attained the iPhone of one of the shooters in an ISIS-inspired terrorist attack that killed 14 people in San Bernardino, California. As part of the investigation, the FBI attempted to gain access to the data stored on the phone but was unable to penetrate its encryption software. Lawyers for the Obama administration approached Apple for assistance with unlocking the device, but negotiations soon broke down. The Justice Department then obtained a court order compelling Apple to help the FBI unlock the phone. Apple CEO, Timothy Cook, publicly challenged the court in an open letter, sparking an intense debate over the balance between maintaining national security and protecting user privacy. Apple and its supporters, including top technology companies such as Google and Facebook, made the case on several fronts that the court order threatened the privacy of all individuals. First, according to Apple, the order effectively required the company to write code, violating its First Amendment right to free speech by forcing the company to "say" something it did not want to say. Previous court cases had already established computer code as legally protected speech. Second, such a backdoor, once created, could fall into the wrong hands and threaten the privacy of all iPhone owners. Finally, it would set a dangerous precedent; law enforcement could repeatedly require businesses such as Apple to assist in criminal investigations, effectively making technology companies an agent of government. Representatives from both sides of the political aisle offered several arguments in favor of the Justice Department's efforts and against Apple's stance. Their central claim was that the U.S. legal system establishes constraints on the government's access to private information which prevent abuse of search and surveillance powers. At the same time, the law still allows authorities to gain access to information that facilitates prevention and prosecution of criminal activities, from terrorism to drug trafficking to child pornography. Critics of Apple also rejected the slippery slope argument on the grounds that, if Apple cooperated, it could safeguard the code it created and keep it out of the hands of others, including bad actors such as terrorists or criminal groups. Moreover, Apple was accused of being too interested in protecting its brand, and even unpatriotic for refusing to comply with the court order. Ultimately, the FBI dropped the case because it was able to circumvent the encryption on the iPhone without Apple's help. Apple and the FBI have two separate incidences where the FBI has asked Apple to break into an iPhone in a terrorist investigation where that phone may contain information that could prevent another terrorist attack. I have attached a case study that details the incident in 2015 and I have included a link to a New York Times article that details the incident earlier this year. For purposes of this discussion, you are Tim Cook and you must decide how to respond to the FBI's latest request. Falling back on his business studies, Mr. Cook applies utilitarianism to analyze what his decision should be. Who are the stakeholders in this and how might they be affect by Apple's decision? What decision benefits the greatest number of these stakeholders? Do you agree with the decision that utilitarianism leads you to? Why or why not? Does apply the test in Rights and Duties or Fairness and Justice lead you to a different answer?
Expert Answer:
Answer rating: 100% (QA)
Answer Stakeholders in this scenario include 1 Apple As a technology company Apple has a vested interest in maintaining the privacy and security of it... View the full answer
Related Book For
Principles of Information Systems
ISBN: 978-1305971776
13th edition
Authors: Ralph Stair, George Reynolds
Posted Date:
Students also viewed these general management questions
-
Googles ease of use and superior search results have propelled the search engine to its num- ber one status, ousting the early dominance of competitors such as WebCrawler and Infos- eek. Even later...
-
The Crazy Eddie fraud may appear smaller and gentler than the massive billion-dollar frauds exposed in recent times, such as Bernie Madoffs Ponzi scheme, frauds in the subprime mortgage market, the...
-
Consider a social network where people are represented as vertices and friendships as edges. If there are 1 0 people in the network and each person is friends with 3 others, calculate the total...
-
A piece of property with a commercial building is acquired by H & A Investments for $184 000. If the land is valued at $2000 less than one-third the value of the building, how much of the amount paid...
-
E-Commerce Web Site Reviews BizRate.com Biz Rate (www.bizrate.com) instantly provides information about hundreds of online stores. Supported product lines include books, music, electronics, clothes,...
-
Select two of the approach strategies and develop each one into a one-page dialogue between you and a customer.
-
The questions in this exercise give you an appreciation for the complexity of budgeting in a large multinational corporation. To answer the questions, you will need to download the Procter & Gamble...
-
Estimate the earnings growth rate given the following information: Return on Equity: 20% Dividend Payout Ratio: 30%
-
What is the gross margin for Enjoy, Inc., under the production method and the sales method of byproduct accounting? 2. What are the inventory costs reported in the balance sheet on September 30,...
-
What information is required to calculate depreciation allowances under straight line depreciation? I. Useful life. II. First cost. III. Salvage value. IV. Property class. I and II only. II and IV...
-
Describe the substantive procedures you would perform, both during the year and as at year end, in order to verify the completeness and existence of inventories.
-
What's the process of paying off a loan by making periodic payments?
-
What is the health tax rate for a BC charity with over $4,500,000 in payroll?
-
On October 1, Year 1 Shoe World received a $10,000, 120-day note from a customer. The note earns 10% interest per year. What is the amount recorded at December 31, Year 1, the company's year-end, and...
-
Dear Felix Vikhman, I appreciate the work you do as a psychotherapist although I have to disagree on your article titled the Wake and Bake that was first published on April 20, 2017. I personally...
-
Outline a general process applicable to most control situations. Using this, explain how you would develop a system to control home delivery staff at a local pizza shop.
-
Evaluate any three of the many free and open source project management software programs. Create a spreadsheet that displays the pros, cons, and special features of each of the three programs.
-
The department manager has just completed his discussion and is asking for comments and questions. What would you say?
-
Have each member of your team access six different Web sites and summarize their findings in terms of the existence of data privacy policy statements. Did each site have such a policy? Was it easy to...
-
Calculate the volatility and the current price of oil futures implied by the call 1600 August and the call 1700 August of Figure 19.8 by using the Black-Scholes formula with \(T=.25\). OIL CRUDE OIL...
-
A company issues a \(10 \%\) coupon bond that matures in 5 years. However, this company is in trouble, and it is estimated that each year there is a probability of .1 that it will default that year....
-
Consider a continuous-time environment, with \(e\) as a variable outside of the market. (a) Suppose the final payoff is \(V\left(x_{e}, T ight)=x_{e}(T)\). Find \(V\left(x_{e}, t ight)\). (b) Find a...
Study smarter with the SolutionInn App