In December 2015, the FBI attained the iPhone of one of the shooters in an ISIS-inspired...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
In December 2015, the FBI attained the iPhone of one of the shooters in an ISIS-inspired terrorist attack that killed 14 people in San Bernardino, California. As part of the investigation, the FBI attempted to gain access to the data stored on the phone but was unable to penetrate its encryption software. Lawyers for the Obama administration approached Apple for assistance with unlocking the device, but negotiations soon broke down. The Justice Department then obtained a court order compelling Apple to help the FBI unlock the phone. Apple CEO, Timothy Cook, publicly challenged the court in an open letter, sparking an intense debate over the balance between maintaining national security and protecting user privacy. Apple and its supporters, including top technology companies such as Google and Facebook, made the case on several fronts that the court order threatened the privacy of all individuals. First, according to Apple, the order effectively required the company to write code, violating its First Amendment right to free speech by forcing the company to "say" something it did not want to say. Previous court cases had already established computer code as legally protected speech. Second, such a backdoor, once created, could fall into the wrong hands and threaten the privacy of all iPhone owners. Finally, it would set a dangerous precedent; law enforcement could repeatedly require businesses such as Apple to assist in criminal investigations, effectively making technology companies an agent of government. Representatives from both sides of the political aisle offered several arguments in favor of the Justice Department's efforts and against Apple's stance. Their central claim was that the U.S. legal system establishes constraints on the government's access to private information which prevent abuse of search and surveillance powers. At the same time, the law still allows authorities to gain access to information that facilitates prevention and prosecution of criminal activities, from terrorism to drug trafficking to child pornography. Critics of Apple also rejected the slippery slope argument on the grounds that, if Apple cooperated, it could safeguard the code it created and keep it out of the hands of others, including bad actors such as terrorists or criminal groups. Moreover, Apple was accused of being too interested in protecting its brand, and even unpatriotic for refusing to comply with the court order. Ultimately, the FBI dropped the case because it was able to circumvent the encryption on the iPhone without Apple's help. Apple and the FBI have two separate incidences where the FBI has asked Apple to break into an iPhone in a terrorist investigation where that phone may contain information that could prevent another terrorist attack. I have attached a case study that details the incident in 2015 and I have included a link to a New York Times article that details the incident earlier this year. For purposes of this discussion, you are Tim Cook and you must decide how to respond to the FBI's latest request. Falling back on his business studies, Mr. Cook applies utilitarianism to analyze what his decision should be. Who are the stakeholders in this and how might they be affect by Apple's decision? What decision benefits the greatest number of these stakeholders? Do you agree with the decision that utilitarianism leads you to? Why or why not? Does apply the test in Rights and Duties or Fairness and Justice lead you to a different answer? In December 2015, the FBI attained the iPhone of one of the shooters in an ISIS-inspired terrorist attack that killed 14 people in San Bernardino, California. As part of the investigation, the FBI attempted to gain access to the data stored on the phone but was unable to penetrate its encryption software. Lawyers for the Obama administration approached Apple for assistance with unlocking the device, but negotiations soon broke down. The Justice Department then obtained a court order compelling Apple to help the FBI unlock the phone. Apple CEO, Timothy Cook, publicly challenged the court in an open letter, sparking an intense debate over the balance between maintaining national security and protecting user privacy. Apple and its supporters, including top technology companies such as Google and Facebook, made the case on several fronts that the court order threatened the privacy of all individuals. First, according to Apple, the order effectively required the company to write code, violating its First Amendment right to free speech by forcing the company to "say" something it did not want to say. Previous court cases had already established computer code as legally protected speech. Second, such a backdoor, once created, could fall into the wrong hands and threaten the privacy of all iPhone owners. Finally, it would set a dangerous precedent; law enforcement could repeatedly require businesses such as Apple to assist in criminal investigations, effectively making technology companies an agent of government. Representatives from both sides of the political aisle offered several arguments in favor of the Justice Department's efforts and against Apple's stance. Their central claim was that the U.S. legal system establishes constraints on the government's access to private information which prevent abuse of search and surveillance powers. At the same time, the law still allows authorities to gain access to information that facilitates prevention and prosecution of criminal activities, from terrorism to drug trafficking to child pornography. Critics of Apple also rejected the slippery slope argument on the grounds that, if Apple cooperated, it could safeguard the code it created and keep it out of the hands of others, including bad actors such as terrorists or criminal groups. Moreover, Apple was accused of being too interested in protecting its brand, and even unpatriotic for refusing to comply with the court order. Ultimately, the FBI dropped the case because it was able to circumvent the encryption on the iPhone without Apple's help. Apple and the FBI have two separate incidences where the FBI has asked Apple to break into an iPhone in a terrorist investigation where that phone may contain information that could prevent another terrorist attack. I have attached a case study that details the incident in 2015 and I have included a link to a New York Times article that details the incident earlier this year. For purposes of this discussion, you are Tim Cook and you must decide how to respond to the FBI's latest request. Falling back on his business studies, Mr. Cook applies utilitarianism to analyze what his decision should be. Who are the stakeholders in this and how might they be affect by Apple's decision? What decision benefits the greatest number of these stakeholders? Do you agree with the decision that utilitarianism leads you to? Why or why not? Does apply the test in Rights and Duties or Fairness and Justice lead you to a different answer?
Expert Answer:
Answer rating: 100% (QA)
Answer Stakeholders in this scenario include 1 Apple As a technology company Apple has a vested interest in maintaining the privacy and security of it... View the full answer
Related Book For
Principles of Information Systems
ISBN: 978-1305971776
13th edition
Authors: Ralph Stair, George Reynolds
Posted Date:
Students also viewed these general management questions
-
a. 59) One day after the end of a one-year lease the landlord can remove the tenant by: Serving a 30-day notice filing an unlawful detainer action getting a judgment and evicting by the sheriff b....
-
Googles ease of use and superior search results have propelled the search engine to its num- ber one status, ousting the early dominance of competitors such as WebCrawler and Infos- eek. Even later...
-
The Crazy Eddie fraud may appear smaller and gentler than the massive billion-dollar frauds exposed in recent times, such as Bernie Madoffs Ponzi scheme, frauds in the subprime mortgage market, the...
-
Consider a social network where people are represented as vertices and friendships as edges. If there are 1 0 people in the network and each person is friends with 3 others, calculate the total...
-
Remi Swimming Pools has a promotional budget of $87500. The budget is to be allocated to direct selling, TV advertising, and newspaper advertising; according to a formula. The formula requires that...
-
Suppose that the profit from the production and sale of x units of a product is given by In addition, suppose that for a certain month the number of units produced on day t of the month is x = q(t) =...
-
Everything else held constant, which of the following types of loans will require you to pay the most total interest throughout the life of a loan? a. Pure discount loan b. Interest-only loan c....
-
Refer to Exhibit 1.5. Assume that Carmens Cookies is preparing a budget for the month ending September 30. Management prepares the budget by starting with the actual results for April that appear in...
-
K Find the critical value(s) and rejection region(s) for the indicated t-test, level of significance a, and sample size n Left-tailed test, a=0.01, n = 18 Click the icon to view the t-distribution...
-
Using the information presented in Problem 13.4B, prepare a partial statement of cash flows for the current year, showing the computation of net cash flows from operating activities using the...
-
The surface area of a lake is estimated by measuring the width in meters of the lake at intervals of 100 m. The measurements are shown in the figure. Use numerical integration to estimate the area of...
-
Charge q = 3.00 nC is at x1 HINT = 0 and charge q = 7.50 nC Istat x2 = 4.50 m. At what point between the two charges is the electric field equal to zero? (Enter the x coordinate in m.) m Need Help?...
-
Write a java program to display array elements in reverse order.
-
Write a java program to find out least or smallest element in a given array?
-
Write a java program to find out highest or largest element in a given array?
-
Alix Maher is the new admissions director at a small highly selective New England college. She has a bachelor's degree in education and a recent master's degree in educational administration. But she...
-
Practice Question 15 Your current portfolio has a value of $30,000, with an expected return of 15%, and a standard deviation of 20%. You decide you want to purchase $6,000 worth of stock XYZ, which...
-
Describe basic managerial approaches to implementing controls and how these are implemented.
-
Evaluate any three of the many free and open source project management software programs. Create a spreadsheet that displays the pros, cons, and special features of each of the three programs.
-
The department manager has just completed his discussion and is asking for comments and questions. What would you say?
-
Have each member of your team access six different Web sites and summarize their findings in terms of the existence of data privacy policy statements. Did each site have such a policy? Was it easy to...
-
What is the likely effect of international stock exchange listing status on the voluntary disclosures of MNEs? :
-
Discuss the kinds of information you would expect to see in the corporate review, the operations review, and the financial review sections of an MNEs directors report.
-
Discuss the relevance to financial analysts and investors of additional disclosures by MNEs with regard to corporate strategy and related issues.
Study smarter with the SolutionInn App