Current Topic Critique
.docx
keyboard_arrow_up
School
Northern Arizona University *
*We aren’t endorsed by this school
Course
440
Subject
Computer Science
Date
Feb 20, 2024
Type
docx
Pages
5
Uploaded by jeannicoleang
Current Topic Critique
Northern Arizona University
Jeanette Martinez
INT 440
Professor Aubrey Rupinta
January 29, 2023
Current Topic Critique
2
Introduction
The article on “
How Spy Tech Firms Let Governments See Everything on a Smartphone
”, is interesting because it shows how Spy-Tech firms use their technology and how they market their
products to governments around the world. The biggest Spy-Firm company mentioned in this article is “
NSO Group
”, which is based in Israel. Israel is the second-largest exporter in the world
of cyber-security products, next to the United States (Perlroth, 2016). NSO has developed spying
software that can see all of the activity on a target’s iPhone, like a user’s location and personal contact. The spy-tech tools that are created can turn a phone into a secret recording device, without a user even noticing and impossible to detect. Spy-Tech Firm These Spy-Tech firms have come to light due to anonymous tips received by the New York Times from individuals who have dealt with the company. NSO Group motto is “Make the world
a safe place”. Spy-Tech firms argue that spying is important to prevent terrorist attacks. There is essentially no check on the invasion of privacy that can occur once this technology is sold to a purchaser (Perlroth, 2016). Surveillance tools are priced by the number of targets one is spying on, with a set-up fee of $500,000. The firm charges government agencies $650,000 fee to track 10 iPhone, and lower prices depending on the phone type. Companies like Facebook, Apple, and Google are making it harder for government to access their data since they are using stricter encryption, which is making NSO’s software more in demand in recent years. Fourth Amendment Electronic surveillance can implicate the Fourth Amendment right of people, to be secure against unreasonable searches and seizure. The Fourth Amendment protects any place where an
Current Topic Critique
3
individual maintains a reasonable expectation of privacy. Since electronic surveillance is a search under the Fourth Amendment, it is subject to the same warrant requirements as other searches. To obtain a warrant, the government must show probable cause to believe a search is justified, describe in particularity the conversation to be intercepted, and provide a specific time period for the surveillance, among other requirements (Carter, 2009). Technology Encryption
The digital technologies that have revolutionized our daily lives have also created minutely detailed records of those live. In an age of terror, our government has shown a keen willingness to acquire this data and use it for unknown reasons. Although we have laws that protect us against government surveillance, firms like NSO sell tools to government agencies that cannot be
challenged until they are discovered. When these tools do get discover, our law of surveillance provides only minimum protection. Encryption frequently blocks law enforcement, at both local and national levels, from accessing data that could be useful in their investigations or even prevent potential crimes from occurring. Encrypting smartphones and other devices helps protect
against malicious hacking, identity theft, and other crimes. I do believe that if law enforcement went through the proper channels to get a warrant for any encrypted information, an individual is
obligated to hand anything over that it named on the warrant.
Individuals Rights and Intelligence Law enforcement has a "solemn obligation to protect fully the legal rights of all Americans, including freedoms, civil liberties, and privacy rights guaranteed by federal law" (CIA, 2017). All of law enforcement's activity must be properly authorized. It is extremely important to understand that due to the constitution of the United States, there are a lot of
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Answer ASAP
arrow_forward
Task: Research Network Security Attacks
Each student will search using Internet resources including Cisco NetAcad for the following
information about the network security attacks as given in the table below.
You should add figures to support your explanation.
Answer each of the following questions for the type of security attack provided in the table
below:
1. What is that type of attack?
2. Discuss different types of that attack, if any.
3. How each type of that attack effects the network and users?
4. Give at least five security recommendations to control and prevent that attack.
(Malware (Virus, Worm, Trojans))
arrow_forward
Word limit: 1000 words
arrow_forward
INTERNET and COMPUTER CRIME
1. You are one of the top students in your university’s computer science program of 200 students. You are surprised when you are met after class by two representatives from a federal intelligence agency. Over dinner, they talk to you about the increasing threat of cyberterrorist attacks launched on the United States by foreign countries and the need to counter those attacks. They offer you a position on the agency’s supersecret cyber terrorism unit, at a starting salary 50 percent higher than you know other computer science graduates are being offered. Your role would be to both develop and defend against new zero-day exploits that could be used to plant malware in the software used by the government and military computers. Would such a role be of interest to you? What questions might you ask to determine if you would accept their offer of employment?
2. You are a member of the application development organization for a small but rapidly growing…
arrow_forward
Data Security is considered a senior Management concern and responsibility. It affects every company’s operation, reputation and ultimately impacts revenue, profits, and a competitive edge. Yet many companies do not implement defenses that could help to prevent and control data breaches. In June 2012 LinkedIn a business social network site was hacked, this data breach was discovered when IT security experts discovered millions of LinkedIn passwords on a Russian underground site. The reason this happened was that the company was using outdated encryption methods and within 2 days, most passwords were cracked. What steps can a business take to keep control of its data security? What security management processes and activities in each process should a business follow to ensure they have an Information Technology Risk management strategy in place?
arrow_forward
China is one of the most populous countries in the world. The Chinese government also takes many steps to control the Internet inside China to a great extent. These restrictions are often referred to as the Great Firewall of China and has been controversial for several years. Internet companies are required to abide by the government restrictions or be cut off from having access to and doing business with Chinese citizens. That doesn’t mean that information doesn’t get through, but it is a lot harder for citizens to access unapproved sites.
Open a search engine (Google, Bing, DuckDuckGo) and search for Great Firewall of China. Do some research on the issue (view more than one site for information), how it works, its history and future, and what it means for citizens. Open a Word document and answer the following questions in a paper 1-2 pages long.
Explain what The Great Firewall of China is, and how it works, and what types of contents are blocked,
What happens if someone searches…
arrow_forward
What are your thoughts on whether or not Facebook and other social media platforms should provide law enforcement access to user accounts in order to conduct investigations? Just what is the point of posing such a question, anyway? How do you feel about the debate over whether or not Facebook and other social media sites should provide law enforcement access to user accounts in order to facilitate investigations? We're left wondering why on earth someone would ask such a pointless inquiry.
arrow_forward
Discussion Forum - Unit 7
Activity 1
TASK A:
Discuss the following questions, identifying possible reasons and motives for the users at both sides of the spectrum:
Discuss why users try to break into other user's computers and information systems
Discuss why users create viruses.
Discuss who owns electronic mail systems, and why they do
TASK B:
Answer the question posed in the Panama Papers Vignette - Was it wrong to hack and leak the Panama Papers?
What technology issues led to the security breach in the Panama Papers case. What is the possible business impact of this security breach for the law firm and its customers? What should the law firm do in the future to avoid similar incidents?
TASK C:
What is the difference between a business continuity plan and a disaster recovery plan?
arrow_forward
please provide screenshots and step by step information
arrow_forward
True or false. Please answer this questions.
Phishing is a technique where a hacker poses as a legitimate
representative of an official organization to persuade you to
discuss highly confidential information
8
ROM memory is considered volatile because it requires constant
electrical supply to store data and instructions
9
digital revolution is the process of converting text, numbers,
sound, photos, and video into data that can be processed by
digital devices Supercomputer are the most fastest computers
arrow_forward
Module 4: Discussion At
How does social media impact Internet forensics investigations?
arrow_forward
Reflections
Classify the following types of attacks with respect to CIA (Confidentiality, Integrity, Availability) triad.
2013 – A Syrian group hacked into the Associated Press’ Twitter account and tweeted that President Obama had been injured in explosions at the White House – the single tweet caused a 147-point drop in the Dow
2014 – More than 73,000 internet-connected cameras in 256 countries were found to be streaming their footage on the web in November
2015 – Anonymous begin releasing financial reports exposing firms in the US and China
2016 – Both the World Anti-Doping Agency and Democratic National Committee are breached with hackers manipulating their data to embarrass the organisations
2017 – Dyn DDoS Attacks knock down half the Internet. The attack utilized a botnet made up of “internet of things” (IoT) devices (think: smart TVs, DVRs, and internet-connected cameras) to take down a major piece of internet infrastructure
arrow_forward
2
You have now seen some techniques for identifying and avoiding scams. How can the social media-using general
public be better educated to avoid online scams such as like farming and clickbait?
arrow_forward
5
DO NOT COPY FROM OTHER WEBSITES
Correct and detailed answer will be Upvoted else downvoted. Thank you!
arrow_forward
How does a virus infect a computer?
How do computer worms spread?
How do fraudster use social media to steal information?
What do fraudster who practice phisting usually steal?
When does copyright infringement occur?
arrow_forward
In 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used toinvestigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…
arrow_forward
Question K
please use your own works or if you use some source please write down the cited work: describe the emergence and history of Al-Qaeda
Full explain this question very fast solution sent me step by step
arrow_forward
LinkedIn does not collect information on its users' bank accounts, debit cards, or credit cards. This begs the question, why would financially motivated hackers target LinkedIn in the first place? Which pieces of data would be most valuable to hackers?
arrow_forward
LinkedIn does not store any financial information, including users' credit card numbers or bank account details. So, why would data thieves who are for financial gain target LinkedIn? Which kind of data do you think hackers would most want to steal?
arrow_forward
Case Study 3: Hacking
Create an introduction based on the given topic above.
The story will be seen in the given link below
https://cyber.harvard.edu/ilaw/Cybercrime/
arrow_forward
Part 4: Protecting Critical Infrastructure and the Homeland
The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland. What does that mean to private organizations such as yours? If most critical infrastructure in the United States is owned by the private sector, what responsibility does the DoD have in this regard? Some would argue US laws are outdated and thus the DoD has little authority to assist. Others would argue US laws were purposely established such that the private sector would defend itself and not need assistance from the military. Obviously, for the DoD to assist, it would need the private organizations' data. Said another way, the DoD would need your data as a private citizen/customer of that organization. Those that believe our laws need to be updated argue giving up privacy for protection is legitimate. Others will argue that we should not give private information of citizens to the government for any…
arrow_forward
Learn about Edward Snowden, a former CIA employee and US government contractor who hacked into the National Security Agency's computer system and released secret material without permission in 2013. Indicate whether or not you believe he is an American patriot or a traitor (in no more than 100-200 words). Why?
arrow_forward
doing out internet research The adventures of Mafiaboy When and how did he start hacking websites? The question is how they acquired him.
arrow_forward
Midterm paper on Ethical Hacking help me to write 2pages please.
arrow_forward
What are your opinions on whether social media sites like Facebook should provide law enforcement access to its users' accounts in order to conduct investigations?
What precisely is the point of asking such a question?
arrow_forward
Case Study : You are your Own Worst Enemy
Intel study - Most companies are very concerned about the online activities of the Gen Y group. Almost 30 percent of surveyed companies have changed their IT policies to allow access to e-mail from nonsanctioned mobile phones and to allow employees to use social networking sites.
In the Intel Study mentioned in the case study above, about 30 percent of companies surveyed have changed their IT policies to allow access to e-mail from nonsanctioned mobile phones and to allow employees to use Social networking sites. Give some reasons as to why these companies might have changed their policies?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Related Questions
- Answer ASAParrow_forwardTask: Research Network Security Attacks Each student will search using Internet resources including Cisco NetAcad for the following information about the network security attacks as given in the table below. You should add figures to support your explanation. Answer each of the following questions for the type of security attack provided in the table below: 1. What is that type of attack? 2. Discuss different types of that attack, if any. 3. How each type of that attack effects the network and users? 4. Give at least five security recommendations to control and prevent that attack. (Malware (Virus, Worm, Trojans))arrow_forwardWord limit: 1000 wordsarrow_forward
- INTERNET and COMPUTER CRIME 1. You are one of the top students in your university’s computer science program of 200 students. You are surprised when you are met after class by two representatives from a federal intelligence agency. Over dinner, they talk to you about the increasing threat of cyberterrorist attacks launched on the United States by foreign countries and the need to counter those attacks. They offer you a position on the agency’s supersecret cyber terrorism unit, at a starting salary 50 percent higher than you know other computer science graduates are being offered. Your role would be to both develop and defend against new zero-day exploits that could be used to plant malware in the software used by the government and military computers. Would such a role be of interest to you? What questions might you ask to determine if you would accept their offer of employment? 2. You are a member of the application development organization for a small but rapidly growing…arrow_forwardData Security is considered a senior Management concern and responsibility. It affects every company’s operation, reputation and ultimately impacts revenue, profits, and a competitive edge. Yet many companies do not implement defenses that could help to prevent and control data breaches. In June 2012 LinkedIn a business social network site was hacked, this data breach was discovered when IT security experts discovered millions of LinkedIn passwords on a Russian underground site. The reason this happened was that the company was using outdated encryption methods and within 2 days, most passwords were cracked. What steps can a business take to keep control of its data security? What security management processes and activities in each process should a business follow to ensure they have an Information Technology Risk management strategy in place?arrow_forwardChina is one of the most populous countries in the world. The Chinese government also takes many steps to control the Internet inside China to a great extent. These restrictions are often referred to as the Great Firewall of China and has been controversial for several years. Internet companies are required to abide by the government restrictions or be cut off from having access to and doing business with Chinese citizens. That doesn’t mean that information doesn’t get through, but it is a lot harder for citizens to access unapproved sites. Open a search engine (Google, Bing, DuckDuckGo) and search for Great Firewall of China. Do some research on the issue (view more than one site for information), how it works, its history and future, and what it means for citizens. Open a Word document and answer the following questions in a paper 1-2 pages long. Explain what The Great Firewall of China is, and how it works, and what types of contents are blocked, What happens if someone searches…arrow_forward
- What are your thoughts on whether or not Facebook and other social media platforms should provide law enforcement access to user accounts in order to conduct investigations? Just what is the point of posing such a question, anyway? How do you feel about the debate over whether or not Facebook and other social media sites should provide law enforcement access to user accounts in order to facilitate investigations? We're left wondering why on earth someone would ask such a pointless inquiry.arrow_forwardDiscussion Forum - Unit 7 Activity 1 TASK A: Discuss the following questions, identifying possible reasons and motives for the users at both sides of the spectrum: Discuss why users try to break into other user's computers and information systems Discuss why users create viruses. Discuss who owns electronic mail systems, and why they do TASK B: Answer the question posed in the Panama Papers Vignette - Was it wrong to hack and leak the Panama Papers? What technology issues led to the security breach in the Panama Papers case. What is the possible business impact of this security breach for the law firm and its customers? What should the law firm do in the future to avoid similar incidents? TASK C: What is the difference between a business continuity plan and a disaster recovery plan?arrow_forwardplease provide screenshots and step by step informationarrow_forward
- True or false. Please answer this questions. Phishing is a technique where a hacker poses as a legitimate representative of an official organization to persuade you to discuss highly confidential information 8 ROM memory is considered volatile because it requires constant electrical supply to store data and instructions 9 digital revolution is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices Supercomputer are the most fastest computersarrow_forwardModule 4: Discussion At How does social media impact Internet forensics investigations?arrow_forwardReflections Classify the following types of attacks with respect to CIA (Confidentiality, Integrity, Availability) triad. 2013 – A Syrian group hacked into the Associated Press’ Twitter account and tweeted that President Obama had been injured in explosions at the White House – the single tweet caused a 147-point drop in the Dow 2014 – More than 73,000 internet-connected cameras in 256 countries were found to be streaming their footage on the web in November 2015 – Anonymous begin releasing financial reports exposing firms in the US and China 2016 – Both the World Anti-Doping Agency and Democratic National Committee are breached with hackers manipulating their data to embarrass the organisations 2017 – Dyn DDoS Attacks knock down half the Internet. The attack utilized a botnet made up of “internet of things” (IoT) devices (think: smart TVs, DVRs, and internet-connected cameras) to take down a major piece of internet infrastructurearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you