Case study - forced decryption ruled unconstitutional

Assignment Help Computer Network Security
Reference no: EM13978696

Case Study: Forced Decryption Ruled Unconstitutional

Read the article titled, "U.S. Courts Rule For-and Against-P rotecting a Suspect''s Hard Drives" located at the following IEEE Spectrum link:

https://spectrum.ieee.org/riskfactor/computing/it/us-courts-rule-for-and-against-protecting-a-suspects-hard-drives

Write a three to four (3-4) page paper in which you:

Analyze the decision by the 11th U.S. Circuit of Appeals to determine whether you believe the decision rendered was correct or incorrect based on the evidence suspected by the government.

Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity. Justify your answer.

Take a position on whether or not you believe technology is moving too fast for the judicial system. Suggest at least two (2) improvements that the courts can make in order to catch up and / or keep up with the advancements in technology issues and crimes.

Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Outline system forensics issues, laws, and skills.

Compare and contrast the various types of computer forensic tools.

Use technology and information resources to research advanced issues in computer forensics.

Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

Verified Expert

The case involves the FBI's attempts to decrypt the contents of more than ten storage devices and hard drives found in the apartment of Jeffrey Feldman in the course of a child pornography investigation. After spending months trying to decrypt the drives, the government applied for a court order forcing Feldman to provide the government with the decrypted contents of the drives.

Reference no: EM13978696

Questions Cloud

Write paper on anxiety disorder and discuss its history : For this paper, choose one anxiety disorder to focus on and write about in detail. Discuss its history, diagnostic criteria, etiology, demographics, treatments, and how it compares to other anxiety disorders
The paying of a cash dividend causes the firms : The paying of a cash dividend causes the firms
Find the highest affordable house price : Suppose you have $50,000 annual disposable income and would like to spend 30% of the income on the mortgage payment. Find the highest affordable house price if a 30-year mortgage rate is 6.0%. Due to low interest policy, as of January 10 of 2015, the..
How people give feedback on your website : My favorite point is about measuring and improving. In the world of technology, things can change in a matter of minutes. Therefore, you need to make sure that you are evaluating the site to keep up with your competitors and technology.
Case study - forced decryption ruled unconstitutional : Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity.
What is the expected return of stock porfolio : Currently the risk free return is 3 percent and the expected market rate of return is 10 percent. What is the expected return of the following three stock porfolio?
An individual owns neither stock nor mutual funds : A survey of 200 college graduates who have been working for at least 3 years found that 90 owned only mutual funds, 20 owned only stocks, and 70 owned both. What is the probability that an individual owns stock? A mutual fund? What is the probability..
Investment portfolio currently contains three stocks : Susan's investment portfolio currently contains three stocks that have a total value equal to $100,000. The beta of this portfolio is 1.5. Susan is considering investing an additional $50,000 in stock that has beta equal to 3. After she adds this sto..
What does beta measure and reflect : What does Beta (β) measure and reflect? Consider the following: A firm’s operations are 45% GREATER than an average firm in the market. Relevant government securities trade @ 3.7%; and the current average return on the market as a whole is 9.1%. What..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd