protect the nations Critical Information Infrastructure HGo17 2003 The amount

Protect the nations critical information

This preview shows page 4 - 9 out of 12 pages.

protect the nation’s Critical Information Infrastructure [HGo17] 2003 The amount of data created in this year surpasses the amount of data created for all other years of human history combined [The15]
Image of page 4
BMAL 560 2007 Apple creates the iPhone, which puts access to the Internet in the form of mobile device [The15] 2014 Security researches note that it is possible to hack automobiles due to the way some of their electronics communicate [The15] 2016 Microsoft search warrant case given by the United States Court of Appeals for the Second Circuit favored Microsoft, which ensures individual’s digital privacy rights are protected by their own countries laws [Smi16] PLACES: Hackers can come from anywhere worldwide Internet servers and cloud storage can be physically located anywhere worldwide [Vas13] PHRASES: Hacker: “a person who illegally gains access to and sometimes tampers with information in a computer system” [Mer171] Information Technology (IT): “the technology involving the development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data” [Mer17] Server: “an instance of a computer program that accepts and responds to requests made by another program, known as a client” [Com17] Help the government put warheads on foreheads: An expression to fortify the need to assist the government so they kind find and thwart terrorist activity
Image of page 5
BMAL 560 PICTURES: [Unk07] [nCi12]
Image of page 6
BMAL 560 [Bri16] PROSPECTS: Last month, Apple reached out to the FBI to try to provide assistance in unlocking the Sutherland Springs shooter’s phone; a welcome development to assist the government with public safety while potentially avoiding setting legal precedent that may have unwanted impacts [Sta17] The FBI hired their own “hacker” to get access to a terrorist’s phone [Nak16] PROBLEMS: Applying current search and seizure legal practices of computers may make it impossible to obtain information from any encrypted data unless authorities are able to guess the password or hack the computer [Wel11]
Image of page 7
BMAL 560 Twitter blocked government access to data that was being done in an effort to find potential terrorist threats [McC17]. This may become a regular event as we struggle to find balance between protecting an individual’s rights to privacy while also striving to keep the public safe from terrorist threats. Modern terrorists are increasingly using the Internet to communicate, pass along propaganda, conduct fundraising, conduct cyber-attacks, purchase fake documents, and recruit [Pag16], restrictions on the government’s ability to access this information may put the public at a greater level of danger. PERFORMANCE: Consumer protection is winning over government’s responsibility to protect the public The government’s willingness and ability to hack into a terrorist’s phone and/or computer may be a work around that will allow for an individual’s rights to privacy while still
Image of page 8
Image of page 9

You've reached the end of your free preview.

Want to read all 12 pages?

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes