Individual privacy vs. law enforcement

Assignment Help Basic Computer Science
Reference no: EM133058747

Individual privacy vs. law enforcement.

Every law enforcement officer including AG Barr, James Clapper, former DNI, and other law enforcement and intelligence service leaders have decried the ability of citizens to encrypt their data in a manner that prevents law enforcement from reading their emails or cracking the password.

The current standard in encryption is PKI. With PKI it is impossible to crack the password and decrypt a message even though the code that encrypts the message is open source and publicly available. Having the source code of the PKI algorithm does not help in cracking and decrypting the message. The only option for law enforcement when they have a phone such as the iPhone from the San Bernardino terrorist is to try to guess the password. However, Apple and Android have both made it impossible to guess a password enough times to open the phone. iPhone and Android phones both have a feature that will "brick" the phone after a certain number of unsuccessful guesses at the password. When trying to crack the password for the phone acquired from the San Bernardino terrorist, the FBI realized they couldn't do it and tried to use the court system to force Apple to install a back door into their phones and provide a master key to the FBI. This effort failed.

Congress has tried many times over the years to assist law enforcement by passing a law that would require all companies building communications hardware, developing communications apps or encryption software to include a backdoor in their systems. Privacy advocates, usually composed of private citizens, have managed to defeat such legislation thus far. Privacy advocates have managed to make legislators understand that providing a master key to law enforcement guarantees that hackers will discover the backdoors and either steal the master key or develop their own.

Develop a hypothesis as to whether it would be better to have a back door into every system with a master key held by law enforcement or is it better to enable private citizens to keep their communications private.

Reference no: EM133058747

Questions Cloud

Analyzing business documents as method : Summarize the problems with the reliability and usefulness of analyzing business documents as a method for gathering information requirements.
Functions performed by retail link : Which supplier metrics does Retail Link gather and report? How is this valuable to Wal-Mart and suppliers?
Examples of business processes : Give three examples of business processes or operations that would benefit significantly from having detailed real time or near real time data.
Dissertation is methodology chosen : An important component of your dissertation is the methodology chosen. Discuss the topic that you are selecting for your dissertation.
Individual privacy vs. law enforcement : Every law enforcement officer including AG Barr, James Clapper, former DNI, and other law enforcement and intelligence service leaders have decried
What is leadership paradox : What is the leadership paradox? how to implement each of these strategies
Prepare risk assessment analysis for website : You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website.
Social media platforms such as facebook : Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential.
Required assistance such as no contact on door delivery : we hope to provide 24/7 virtual video sessions along with required assistance such as no contact on door delivery.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd