{"id":3035,"date":"2016-02-26T23:40:12","date_gmt":"2016-02-27T07:40:12","guid":{"rendered":"http:\/\/www.wou.edu\/westernjournal\/?p=3035"},"modified":"2016-02-26T23:40:12","modified_gmt":"2016-02-27T07:40:12","slug":"apple-fbi-in-heated-battle-over-your-privacy","status":"publish","type":"post","link":"https:\/\/wou.edu\/westernhowl\/apple-fbi-in-heated-battle-over-your-privacy\/","title":{"rendered":"Apple-FBI in heated battle over your privacy"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/wou.edu\/westernjournal\/files\/2016\/02\/AppleColor.jpg\" alt=\"AppleColor\" width=\"376\" height=\"564\" class=\"alignnone  wp-image-3087\" srcset=\"https:\/\/wou.edu\/westernhowl\/files\/2016\/02\/AppleColor.jpg 2848w, https:\/\/wou.edu\/westernhowl\/files\/2016\/02\/AppleColor-200x300.jpg 200w, https:\/\/wou.edu\/westernhowl\/files\/2016\/02\/AppleColor-768x1152.jpg 768w, https:\/\/wou.edu\/westernhowl\/files\/2016\/02\/AppleColor-683x1024.jpg 683w\" sizes=\"(max-width: 376px) 100vw, 376px\" \/><\/p>\n<pre>By: Alvin Wilson \r\nStaff Writer<\/pre>\n<p>Apple is refusing to give the FBI access to encrypted data on one of the San Bernardino shooter\u2019s iPhone.<\/p>\n<p>The FBI has requested that Apple build the technology necessary to decrypt the data that they currently can\u2019t access.<\/p>\n<p>Bob Broeg, professor of computer science at Western, described encrypted data as being a sentence with the letters jumbled up. To find the correct order, you have to have a key.<\/p>\n<p>\u201cWith most encryptions today, you have two keys,\u201d he said. \u201cOne is a public key that you can use to encrypt something, but you can\u2019t decrypt it without a private key. So, anybody can send an encrypted message, but only the person with the second key can decrypt it.\u201d<\/p>\n<p>Apple encrypts some of the data that is stored on their phones to protect the privacy of the user, but the government still has access to metadata, according to Dana Schowalter, assistant professor of communication studies.<\/p>\n<p>\u201cThe government can find metadata whether or not it\u2019s encrypted,\u201d she said. \u201cThey can find\u2014on our phone records and things like that, they can determine when we text somebody.<\/p>\n<p>\u201cBut if you iMessage somebody else, for example, that\u2019s encrypted. It doesn\u2019t show up on your bill, and therefore can\u2019t be subpoenaed from the phone company because they don\u2019t necessarily keep records of that.\u201d<\/p>\n<p>The FBI wants access to encrypted information on one of the San Bernardino shooters\u2019 phone, but Apple is afraid of future privacy violations that could occur if the government receives access to this technology.<\/p>\n<p>Tim Cook, CEO of Apple, sent an open letter to Apple customers.<\/p>\n<p>&#8220;While we believe the FBI&#8217;s intentions are good, it would be wrong for the government to force us to build a backdoor into our products,\u201d Cook said in the letter. \u201cAnd ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.&#8221;<\/p>\n<p>Schowalter agrees about the importance of our freedom of privacy.<\/p>\n<p>\u201cWhen that information is encrypted, I think people value that because it means the information is protected,\u201d she said. \u201cIn an era where almost nothing is protected, having at least some content that could be protected is very valuable.\u201d<\/p>\n<p>Facebook creator Mark Zuckerberg has publicly supported Apple\u2019s decision, but, according to a Pew Research poll, 51 percent of Americans think they should submit to the demands of the FBI.<\/p>\n<p>The FBI is arguing that Apple\u2019s encryption policy is interfering with their ability to protect the public.<\/p>\n<p>Schowalter is skeptical of this argument.<\/p>\n<p>\u201cIf you take a look at what they\u2019re asking Apple to do, I think there is some security case for being able to access that information,\u201d she said.<\/p>\n<p>\u201cBut at the same time,\u201d she added, \u201casking for this backdoor seems to be a huge overreach, and I don\u2019t think the government has shown that they can exercise restraint in what they\u2019re collecting and how they\u2019re using that information.\u201d<\/p>\n<p>Broeg thinks that Apple should help the FBI, but not by providing a backdoor to the government.<\/p>\n<p>\u201cI think if there was an error that the FBI needed to figure out, Apple could decrypt it for them,\u201d he said. \u201cBut it should probably stay somewhat encrypted.\u201d<\/p>\n<p>Schowalter said the long term effects might be similar to what we saw with the Patriot Act.<\/p>\n<p>\u201cI don\u2019t think people really notice when they\u2019re being spied on now, so I think it just adds a layer of distrust,\u201d she said. \u201cI think we, in the fearmongering that happened after 9\/11, consented to all sorts of breaches of our basic human rights to privacy. I think it sets a very dangerous precedent.\u201d<\/p>\n<p>Contact the author at awilson15@wou.edu or on Twitter @awilsonjournal<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple is refusing to give the FBI access to encrypted data on one of the San Bernardino shooter\u2019s iPhone.<\/p>\n","protected":false},"author":825,"featured_media":3087,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_lmt_disableupdate":"","_lmt_disable":"","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[3],"tags":[],"class_list":["post-3035","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/wou.edu\/westernhowl\/wp-json\/wp\/v2\/posts\/3035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wou.edu\/westernhowl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wou.edu\/westernhowl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wou.edu\/westernhowl\/wp-json\/wp\/v2\/users\/825"}],"replies":[{"embeddable":true,"href":"https:\/\/wou.edu\/westernhowl\/wp-json\/wp\/v2\/comments?post=3035"}],"version-history":[{"count":0,"href":"https:\/\/wou.edu\/westernhowl\/wp-json\/wp\/v2\/posts\/3035\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wou.edu\/westernhowl\/wp-json\/wp\/v2\/media\/3087"}],"wp:attachment":[{"href":"https:\/\/wou.edu\/westernhowl\/wp-json\/wp\/v2\/media?parent=3035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wou.edu\/westernhowl\/wp-json\/wp\/v2\/categories?post=3035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wou.edu\/westernhowl\/wp-json\/wp\/v2\/tags?post=3035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}