Rules are outdated ‐ A dramatic extension is sought by the Government so that the evolving technology can be covered. The judicial power is a limited endorsement which can be dangerous if it is tried to be extended.
It is just not hacking one‐ While the government is claiming that the request is only for a hack that has to be done one time; however there are also chances that law agencies may want a bigger authority based on facts which are a lot different from the investigation team has in hand.
It is a personal device to someone ‐ We all know that cell phones are not just used to send or receive messages or make calls. Today a lot of information is stored on our cell phones. Accessing somebody’s phone means accessing the private affairs and innermost thoughts.
Dangerous precedent ‐ While the government’s demand is not bound to any limit legally, it can still be a precedent which is dangerous. A side step could be established by the government which can be authorized by legal procedures.
Privacy is very important‐ We all know that privacy is one of the most important things for a person and in today’s internet age, this hold more value and importance considering that digital information is used on a scale that is unprecedented.
It is not just about the phones‐ While today the government’s target may just be the phone, however if you look at the larger picture, tomorrow it can also go to tablets, computers and laptops as well as also automobiles where information can be stored, in such a case then it can also go to such levels.
Congress can deal with it ‐ As per AT&T, Congress body is the right ones to deal with a regime that is so comprehensive. It is essential that a legal regime should be in place so that such technological changes can be responded in a fair manner. It will also help if there was a uniform procedure developed.
It is not only Apple ‐ As of right now it is not just about Apple as a company. The products and services of Intel as well as the security focus are vast. It is possible that today the way the demands are being put up in front of Apple, tomorrow it can result to other companies as well.
Expression conflict‐ If you look at the order very carefully you will see that it is in a way forcing Apple to say something that is not true or is against the belief of the company. It also tells the company to endorse in something that it does not want to.
Prevention of another attack ‐ If the information is recovered then there is also a possibility that we may just get information about any other shooter or even a terrorist cell that is unknown.
Cyber pathogen ‐ There are also chances that the iPhone which is seized may contain some kind of evidence if it found that can let us know if there was any weapon developed which could introduce the cyber pathogen that endangers the infrastructure of San Bernardino.