Individual privacy vs. law enforcement

Assignment Help Basic Computer Science
Reference no: EM133058747

Individual privacy vs. law enforcement.

Every law enforcement officer including AG Barr, James Clapper, former DNI, and other law enforcement and intelligence service leaders have decried the ability of citizens to encrypt their data in a manner that prevents law enforcement from reading their emails or cracking the password.

The current standard in encryption is PKI. With PKI it is impossible to crack the password and decrypt a message even though the code that encrypts the message is open source and publicly available. Having the source code of the PKI algorithm does not help in cracking and decrypting the message. The only option for law enforcement when they have a phone such as the iPhone from the San Bernardino terrorist is to try to guess the password. However, Apple and Android have both made it impossible to guess a password enough times to open the phone. iPhone and Android phones both have a feature that will "brick" the phone after a certain number of unsuccessful guesses at the password. When trying to crack the password for the phone acquired from the San Bernardino terrorist, the FBI realized they couldn't do it and tried to use the court system to force Apple to install a back door into their phones and provide a master key to the FBI. This effort failed.

Congress has tried many times over the years to assist law enforcement by passing a law that would require all companies building communications hardware, developing communications apps or encryption software to include a backdoor in their systems. Privacy advocates, usually composed of private citizens, have managed to defeat such legislation thus far. Privacy advocates have managed to make legislators understand that providing a master key to law enforcement guarantees that hackers will discover the backdoors and either steal the master key or develop their own.

Develop a hypothesis as to whether it would be better to have a back door into every system with a master key held by law enforcement or is it better to enable private citizens to keep their communications private.

Reference no: EM133058747

Questions Cloud

Analyzing business documents as method : Summarize the problems with the reliability and usefulness of analyzing business documents as a method for gathering information requirements.
Functions performed by retail link : Which supplier metrics does Retail Link gather and report? How is this valuable to Wal-Mart and suppliers?
Examples of business processes : Give three examples of business processes or operations that would benefit significantly from having detailed real time or near real time data.
Dissertation is methodology chosen : An important component of your dissertation is the methodology chosen. Discuss the topic that you are selecting for your dissertation.
Individual privacy vs. law enforcement : Every law enforcement officer including AG Barr, James Clapper, former DNI, and other law enforcement and intelligence service leaders have decried
What is leadership paradox : What is the leadership paradox? how to implement each of these strategies
Prepare risk assessment analysis for website : You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website.
Social media platforms such as facebook : Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential.
Required assistance such as no contact on door delivery : we hope to provide 24/7 virtual video sessions along with required assistance such as no contact on door delivery.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Article related to the cloud mechanisms

Find 1 article related to  the cloud mechanisms, and to turn in the following: (1) TheURL of the article, (2) A brief summary of the article

  Access options from the home to an isp

Your manager has tasked you with creating a Remote Employee Connection guide for IT. This guide will assist IT in setting up remote (work-from-home) employees to access the company's Intranet. These employees will use a VPN connection from their P..

  Major components of any information system

What are the major components of any information system? Give a brief explanation for each.

  What is the round-trip time to send a packet

On average, what is the round-trip time to send a packet from your computer to www.lacnic.net and back again (this is the "time=" parameter on each ping output)?

  The company does not have a formal policy

Your role is to support the Human Resource Department. The Head of Talent Acquisition wants you to search the Internet including social media sites, to determine if job applicants are demonstrating any online behavior that would jeopardize the com..

  Communication-principles for a lifetime

Of the leadership styles discussed in Table 10.3 of Communication: Principles for a Lifetime, which fits your style best?

  Differences between a network monitor and protocol analyzer

What are the similarities and differences between a network monitor and a protocol analyzer? Please, also, is there overlap in functionality?

  Calculate the convexity

A $1000 bond that pays annual coupons at 6% redeems at par in exactly 4 years from now. Calculate the Convexity, if the yield to maturity is currently 6%.

  Transmitting information on communications networks

Summarize and compare the three techniques for transmitting information on communications networks.

  Analysis of various tools useful in policy making

Comparative analysis of various tools useful in policy making. local train schedules to minimize energy use and passenger wait times in a SmartCity environment.

  Inadequate access controls or access management

How can inadequate access controls or access management leave critical information vulnerable?

  Display the ?total? number of coins

Calculates and display the ?total? number of coins to be given back, ie 6 coins for above

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd