Case study - forced decryption ruled unconstitutional

Assignment Help Computer Network Security
Reference no: EM13978696

Case Study: Forced Decryption Ruled Unconstitutional

Read the article titled, "U.S. Courts Rule For-and Against-P rotecting a Suspect''s Hard Drives" located at the following IEEE Spectrum link:

https://spectrum.ieee.org/riskfactor/computing/it/us-courts-rule-for-and-against-protecting-a-suspects-hard-drives

Write a three to four (3-4) page paper in which you:

Analyze the decision by the 11th U.S. Circuit of Appeals to determine whether you believe the decision rendered was correct or incorrect based on the evidence suspected by the government.

Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity. Justify your answer.

Take a position on whether or not you believe technology is moving too fast for the judicial system. Suggest at least two (2) improvements that the courts can make in order to catch up and / or keep up with the advancements in technology issues and crimes.

Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Outline system forensics issues, laws, and skills.

Compare and contrast the various types of computer forensic tools.

Use technology and information resources to research advanced issues in computer forensics.

Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

Verified Expert

The case involves the FBI's attempts to decrypt the contents of more than ten storage devices and hard drives found in the apartment of Jeffrey Feldman in the course of a child pornography investigation. After spending months trying to decrypt the drives, the government applied for a court order forcing Feldman to provide the government with the decrypted contents of the drives.

Reference no: EM13978696

Questions Cloud

Write paper on anxiety disorder and discuss its history : For this paper, choose one anxiety disorder to focus on and write about in detail. Discuss its history, diagnostic criteria, etiology, demographics, treatments, and how it compares to other anxiety disorders
The paying of a cash dividend causes the firms : The paying of a cash dividend causes the firms
Find the highest affordable house price : Suppose you have $50,000 annual disposable income and would like to spend 30% of the income on the mortgage payment. Find the highest affordable house price if a 30-year mortgage rate is 6.0%. Due to low interest policy, as of January 10 of 2015, the..
How people give feedback on your website : My favorite point is about measuring and improving. In the world of technology, things can change in a matter of minutes. Therefore, you need to make sure that you are evaluating the site to keep up with your competitors and technology.
Case study - forced decryption ruled unconstitutional : Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity.
What is the expected return of stock porfolio : Currently the risk free return is 3 percent and the expected market rate of return is 10 percent. What is the expected return of the following three stock porfolio?
An individual owns neither stock nor mutual funds : A survey of 200 college graduates who have been working for at least 3 years found that 90 owned only mutual funds, 20 owned only stocks, and 70 owned both. What is the probability that an individual owns stock? A mutual fund? What is the probability..
Investment portfolio currently contains three stocks : Susan's investment portfolio currently contains three stocks that have a total value equal to $100,000. The beta of this portfolio is 1.5. Susan is considering investing an additional $50,000 in stock that has beta equal to 3. After she adds this sto..
What does beta measure and reflect : What does Beta (β) measure and reflect? Consider the following: A firm’s operations are 45% GREATER than an average firm in the market. Relevant government securities trade @ 3.7%; and the current average return on the market as a whole is 9.1%. What..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain about cnss model

The CNSS model, examine each of the cells and write a brief statement on how you would address the three components occupying that cell.

  What security vulnerabilities and threats can you see

What security vulnerabilities and threats can you see? What measures would you put in place to remove or minimize the vulnerabilities - Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the a..

  The discussion board is part of the core of online

the discussion board is part of the core of online learning. classroom discussion in an online environment requires

  Discuss the risks of having a single root user

Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems. Include a sample generic policy for a limited user from which a configuration could be written. (500 words..

  Develop a security policy document

Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense

  What factors might an organization consider

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable

  Determine public values transmitted for message

Alice and Bob select the numbers 6 and 10 privately. What will be public values they transmit and what would be final secret computed?

  Case study incident-response policy-gem infosys

Case Study Incident-Response Policy; Gem Infosys, Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days

  Describing the some of the issues you might face

Assignment: Write a 3-to 4-page paper describing the some of the issues you might face when maintaining security in a company that has offices in multiple countries

  What is the discrepancy rate of closure

If you collected these metrics, would they provide you with answers to the questions? Why or why not? What other information, if any, would you need?

  Describe the technical characteristics of the dark web

Describe the technical characteristics of the Dark Web ensuring you explain how it works and its underlying technologies - Discuss the impact of the Dark Web on society. In addressing this point, ensure you discuss its purpose and the forces behind i..

  Explain how you would integrate security requirements

Explain how you would integrate security requirements such as confidentiality, integrity, or availability into an experiment-based evaluation of a web-based conferencing system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd