Escolar Documentos
Profissional Documentos
Cultura Documentos
Grace Alvarez
CST300 Writing Lab
15 October 2017
Countering and preventing terrorism is a primary concern for the federal government as
well as state and local law enforcement agencies. Terrorists are considered people who support
or commit ideologically motivated violence to further political, social or religious views. Today,
terrorists can use the advancements in technology to globally establish radical groups, appoint
leadership, and provide training. It is the goal of the federal government to intercept such
Creating a backdoor in technological devices would allow government entities critical access to
private data, used to prevent terrorism and protect national security. However, it would also be
detrimental to the users of these devices, as backdoor access would leave them vulnerable to
Tech companies like Apple, Samsung, and Google, argue against decrypting customer
data. If Congress passed new legislation, forcing tech companies to create security vulnerabilities
in their systems, it would affect a tech firm’s ability to provide the best data security for its
consumers. The government would simply be asking U.S. companies to reverse years of
part of what has built the largest retail e-commerce market. Asking tech groups to lower their
According to CompTIA, the top five most valuable companies in the world are tech
companies and the projected IT industry growth is headed towards 4.1 percent in 2017. If this
Alvarez 2
occurs, it will put the global IT industry past the $3.5 trillion mark by the end of 2017 (IT
Industry, 2017). The United States makes up a third of this market value. Technology companies
have reputations for reliable and effective products that secure users’ information as well as
safeguard online marketplaces. Strong encryption sustains this industry and enables U.S.
On December 2nd, 2015, two armed terrorists walked into the Inland Regional Center,
located in San Bernardino, California, and opened fire on dozens of employees. In this attack, 14
people were killed, and 22 more were critically injured. This terrorist attack led the FBI to
conduct a massive investigation that included searches of the perpetrator's homes, review of the
collected evidence, and many interviews. Among the collected evidence, the FBI found an Apple
iPhone 5C, that was still intact, and multiple hard drives. A four-digit numeric passcode locked
the iPhone 5C, which could equate to ten thousand possible combinations to unlock it. Apple
iPhones only allow ten passcode attempts before erasing all data on the device; this is the result
As part of the investigation into the 2015 San Bernardino shootings, the FBI formally
requested that Apple create a backdoor to the iPhone’s operating system. This request sparked a
nationwide debate over the right to privacy and the FBI’s duty to national security. The FBI
asked the U.S. District Court in California to invoke the All Writs Act of 1789, which gives
federal judges the power to issue orders to compel people to do things within the limits of the
law (Timeline, 2016). In this case, the FBI asked Apple to make a new version of the iPhone
operating system, that would bypass several security features, and install it on the iPhone
recovered during the investigation. Apple opposed this order, arguing that not only did the
Alvarez 3
requested software not exist, but if it were to be created, it could leak, allowing anyone to unlock
The FBI and the federal government have a duty to protect the American people and
uphold the Constitution of the United States. Their priorities include protecting the United States
from terrorist attacks, attacks from foreign intelligence operations and espionage, cyber-based
attacks, and high-technology crimes, as well as public corruption (Mission, 2016). The
government and FBI’s core values are to respect the dignity of everyone they protect with
government declares certain actions to be just or unjust. In the case of San Bernardino, the FBI
believed the information on the locked iPhone would help its investigation and potentially lead
Cases like the San Bernardino attack show that there is a need to gain access to certain
personal devices. The FBI states “We are not asking to expand the government’s surveillance
authority, but rather we are asking to ensure that we can continue to obtain electronic
information and evidence pursuant to the legal authority that Congress has provided to us to keep
America safe” (Comey, 2016). In FBI testimony to support this statement, examples included
malicious actors covertly plotting violent crimes, organized criminal networks and nation-states
2016).
When changes in technology interfere with law enforcement’s ability to use investigative
tools and follow critical leads, the government may not be able to identify and stop terrorists who
use encrypted social media and messaging applications. If the evidence from a device cannot be
retrieved, it inhibits the government's ability to stop and prosecute offenders. Cyber legislation is
Alvarez 4
needed to protect the nation to allow information sharing between the government and the
private sector, while safeguarding civil liberties (Ferdinando, 2015). The U.S. legal system
establishes constraints on the government’s access to private information, which prevents abuse
of search and surveillance powers. At the same time, the law still allows authorities to gain
access to information that facilitates prevention and prosecution of criminal activities, from
terrorism to drug trafficking. The government would only be allowed to use backdoor decryption
From their nascency, tech companies put a lot of time and effort into developing their
company values. Tech teams believe in innovating, communicating, honesty, collaborating with
other tech groups, earning consumer trust, building positive teams, and never settling for
anything less than excellence. Tech entities must secure their customers’ private data. To achieve
this, they must continuously improve their encryption. They are forced to find the security
vulnerabilities themselves, or via ethical hackers, to stop holes in their systems. When a
company fails to secure its vulnerabilities, it leaves itself, and its customers, open to cyber-
attacks.
According to the ACLU, the All Writs Act does not give law enforcement new
investigative tools that Congress has not authorized. In the San Bernardino case, the act cannot
be used to give authority to FBI to force an innocent third party into government service against
its will. Apple, in this case, is not obstructing justice as they do not possess the information on
the iPhone that the government seeks (Abdo, 2016). The model, the government, seeks to
establish here sets a dangerous precedent that undermines everyone's digital privacy and security.
Tech companies have proven top-level encryption is their greatest defense against
cybercriminals.
Alvarez 5
access, or creating a backdoor, to user data threatens the privacy of all individuals. Encryption
security has continuously been elevated so as not to allow anyone, other than the end user, to
access the information contained on any one device. The government does not have the right to
gain access to all communication between devices. Access to all devices infringes on the right to
privacy and the First Amendment right to free speech. There is no guarantee that gaining access
to secure communications will solve the terrorist problem. Weakening security for the majority
to potentially gain access to a few illegal communications is not in the interest of the greater
good.
The primary reason for the FBI, or any other law enforcement agencies, to use brute force
decryption is to examine any information that could assist them in investigating acts of terrorism.
The FBI is the lead federal agency for investigating cyber-attacks and terrorists. Allowing the
federal government uninhibited access to communication devices would sharpen its focus on
intrusion into government and private computer networks to catch and prevent terrorist attacks. It
is in the interest of national security to allow a backdoor in user devices that will assist in
investigations of terrorism, and prosecution of terrorist attacks or other criminal activities. The
government should, under court order, have access to decrypted messages in the same way police
can gain access to phone and internet records. Access to encrypted messages is essential in
When acts of terrorism are committed, the FBI and other federal agencies conduct remote
access searches into computers, and now mobile devices, to determine what information may be
valuable to their investigation. Doing so, through Congress approved hacking programs, only
adds additional security holes. Not only are consumers at risk, but American tech companies are
Alvarez 6
also targeted for trade secrets and other sensitive corporate data. Adding backdoors to products
does not guarantee that the owner of that product did not use some third-party software or
In this debate, there are two prominent calls to action for all stakeholders involved. The
first call to action is that the government could exploit existing security flaws to ethically hack
into a suspect’s smartphone or computer with a court order. Lawful hacking would allow
authorities to use existing vulnerabilities to get evidence without creating backdoor decryption.
This call to action would require the government to get the information they need without
requiring tech companies to reduce their security. The government is operating under
deontological ethics in this call to action. The government is assuming that by opening a
backdoor for their investigations, they can successfully protect the United States, essentially
completing their obligations to the American people. The second call to action is the government
should develop new investigative tools to extract the necessary data, only when approved by
Congress, and so long as it doesn’t put secure data at risk. Under this call to action, all parties
Based on the government’s actions, by hacking into personal and professional devices,
they are acting within a deontological framework. Deontology ethics promotes doing your duty.
This ethical theory is associated with Immanuel Kant, a German philosopher from 1724-1804.
The main principles of this framework are: duties are obligations that must be fulfilled, goodwill
is the only absolute good, and acting on good intentions justifies a moral action, not the outcome
(Ethical, n.d.). It is the government's obligation, in this scenario, to protect the United States, if
they are doing so with good will and noble intentions. The government believes having access to
encrypted information will be an absolute good, and they should always act on their duties,
Alvarez 7
rather than the outcome. They must prevent terrorism even when it means accessing encrypted
Mega tech companies refusing to allow the government to force weaker systems is a
utilitarian act. The utilitarian principle, advocated by Jeremy Bentham from 1748-1832, states
that given a choice between alternative actions or social policies, one should do what results in
the best overall consequences for everyone concerned. This utilitarian theory means to take
action that results in the greatest amount of good, or the least amount of harm, for the greatest
number of people (Ethical, n.d.). American tech companies refuse to provide backdoors to their
products on the belief that this will cause more harm to the greatest number of people.
Companies like Apple that have sold over 1 billion iPhones understand the FBI’s backdoor
request could open vulnerabilities to all iPhones. In this case, the greatest moral action comes
In both calls to actions, the pros are the public’s private information stays secure,
companies can be assured their data is safeguarded, freedom of speech is still protected, and the
American people maintain their right to privacy. The cons of these actions are that terrorists can
continue to communicate and plot their next attacks freely. Even if phones and other locked
devices were recovered, the government would not be able to decrypt them and serve justice,
I believe building vulnerability in the design of tech products would expose all details of
our lives. The government is not aiming for surveillance with this backdoor encryption, but it
seems inevitable that it will lead there. As we have seen with Snowden’s release of information,
the government has been using investigative tools with a top-secret court order, the National
Security Agency (NSA) has collected telephone records from millions of Verizon customers.
Alvarez 8
The NSA has also accessed and collected data through back doors into U.S. internet companies
such as Google and Facebook with a program called Prism (Szoldra, 2016). Prism collects stored
internet communications that match court-approved search terms. It is in the public’s best
interest to secure user data to the best of its ability. Allowing government agencies to decrypt our
data will diminish our civil liberties and privacy, as well as the economic competitiveness of the
largest tech companies. There is no guarantee that weakening secure communications will solve
the terrorist problem. Weakening security for most users not only undermines our rights, but it
The government has a responsibility to protect its citizens, as well as maintain their rights
to privacy. Tech groups have a responsibility to protect their clients’ data, as well as defend
themselves against potential cyber-attacks. Allowing decryption of digital devices and services in
the interest of national security is not the best way to catch terrorists and criminals who use
smartphones and messaging services to conceal their plans and identities. To mandate that tech
companies, weaken the security of their products to ensure government access to encrypted data
creating a backdoor, the U.S. government and international governments could request this
backdoor as a term of tech companies doing business internationally. Law enforcement and
intelligence agencies face incredible challenges in protecting the public against crime and
terrorism. Tech companies will continue to give law enforcement access to data under a court
order so long as it does not compromise the security of personal information. While the FBI’s
intentions are good, it is wrong for the agency to force a backdoor on tech companies.
Ultimately, this demand undermines the freedoms and liberty our government is meant to protect
References
Abdo, A. (2016, August 11). Apple v. FBI: What just happened? ACLU. Retrieved from
https://www.aclu.org/blog/national-security/privacy-and-surveillance/apple-v-fbi-what-
just-happened
Breslow, J. (2016, February 19). Who’s right in Apple’s fight with the FBI? PBS. Retrieved from
http://www.pbs.org/wgbh/frontline/article/whos-right-in-apples-fight-with-the-fbi/
Comey, J. B. (2016, March 1). Encryption tightrope: Balancing Americans’ security and privacy.
https://www.fbi.gov/news/testimony/encryption-tightrope-balancing-americans-security-
and-privacy
http://webteach.mccs.uky.edu/profdent/ethical_theory2.htm
Ferdinando, L. (2015, January 21). Dempsey: Cyber vulnerabilities threaten national security.
https://www.defense.gov/News/Article/Article/603952/
https://www.comptia.org/resources/it-industry-trends-analysis-2017
Mission & priorities. (2016, May 3). Federal Bureau of Investigation. Retrieved from
https://www.fbi.gov/about/mission
Szoldra, P. (2016, September 16). This is everything Edward Snowden revealed in one year.
timeline-2016-9
Alvarez 10
Timeline: A history of encryption and government backdoors. (2016, March 22). CNET.
government-backdoors-pictures/