Identify And Explain How To Write An Essay On Encryption

Improved Essays
Encryption has become larger and larger with the abundance of technology. It is becoming easier for your identity to be stolen, which makes for a hassle when trying to deal with. Although, technological encryption seems to be a beneficial thing, the government disagrees. When solving murders and other crimes, in some cases, technology is essential to finding who committed the crime. With these big companies like Google and Apple, they are now encrypting phones and other devices, so that no one can get into them unless they know the passcode. The overall purpose of the letter is to address the large companies that by encrypting technology, it hinders the government and the police’s ability to solve crimes effectively and prevent terrorism which could be hidden because of encryption. …show more content…
They identify the purpose of the letter by describing that if for encryption this situation would have been solved. The authors also talk about how there were two phones at the scene of the murder, “Both devices were passcode protected”. As the contacted Google and Android about what the passcodes could be, but they had no answers because the couldn’t retrieve that information because it was encrypted. Later in the letter, the describe that the homicide now remains unsolved and the killer is still at large because they couldn’t unlock the phones to get the information that the needed. This demonstrates how the author portrays pathos, because there are six children who now are without a father. The six children want to know who killed their father, but they may never know because of these big companies who are unable to unlock these phones because of

Related Documents

  • Improved Essays

    Ism 491a Capstone Project

    • 695 Words
    • 3 Pages

    This document provides the progress of my ISM 491a capstone project. This project was to research an encryption method that would strengthen the company’s environment and protect them if there was ever a data breach. As presented in my project proposal, I identified two principal objectives for this project to be successful. The first was to perform an assessment of the environment currently in place, and the second was to come up with an encryption solution that can be implemented in the company‘s environment without disrupting any applications or processes. This update will provide the research that is completed to this point, the area that I am falling behind in, and the strategy to bring the delinquent tasks up to date.…

    • 695 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In The United States of America the National Security Agency has been working for ages to assure that the country is safe, but recently it has become a rising concern that they have overstepped their boundaries of American citizen’s privacy by operating surveillance technology all around the country and storing data form every phone call of citizens. With the American Citizens’ privacy at stake, each branch of government took its stand against the matter. The Judicial Branch has to come up with a legal compromise; the Legislative Branch and Congress are working to make surveillance laws that would better please its citizens, and the Executive Branch and the president have agreed to come up with an alternative to Section 215 of The Patriot Act. The Supreme Court has to establish a legal compromise to the surveillance of the American citizens considering it was said that what the National Security Agency/Central Security was doing went against Section 215 of the Patriot Act.…

    • 702 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Essay On 1984 Technology

    • 501 Words
    • 3 Pages

    They can find who did it and also they can track them easier. Now all markets, houses and big companies have cameras everywhere because if you have cameras it is not easy for someone to break in. Technology is highly changed in many different ways which you read above, cameras is one of the best ways to catch someone doing things they are not supposed to. Also Cellphones which in the article known as trackers can track you down where ever you’re at with no problems. Police officers, technology helps them out a lot which they use in crime scene.…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    More and more, criminals are using technologically advance…

    • 1447 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Resolved: The United States federal government should substantially curtail its domestic surveillance. Plan: The government will curtail its surveillance by only viewing collected data by means of a warrant. Intro-After the NSA reported their first transparency avowal, the publisher Omicron Technology Limited stated, “The report said 19,212 "national security letters"—administrative subpoenas that allow the FBI to collect information without a warrant—were issued last year, containing 38,832 requests for information.” These unwarranted leaks are why this problem needs to be solved. That is why we stand resolved that “The United States federal government should substantially curtain its domestic surveillance.…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    The Department of Homeland Security and the US Patriot Act where created and passed as a direct result of the terrorist attacks orchestrated on September 11, 2001. As a package, both work to preserve life and liberty to citizens of the United States, whether in the homeland or abroad. Therefore, the Department of Homeland Security, while utilizing the US Patriot Act, has partnered with local law enforcement in order to be on the front lines of detecting and preventing homeland terrorism. The Department of Homeland Security, through the use of the US Patriot Act, has affected the local criminal justice process through the militarization of law enforcement and the deployment of cutting edge surveillance techniques and equipment.…

    • 1384 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Apple should not provide the encryption code to unlock the iPhone of Syed Farook- one of the San Bernardino Shooters. Though the U.S government is seeking this encryption code in the name of national security, this access to millions of American’s personal information can too easily lead to the compromise of people’s 4th amendment rights. Moreover, this access may increase the targeting of minority groups such as Muslim American and African Americans. Using examples from Rampage and The New Jim Crow, I will demonstrate that this breach of privacy should be avoided and prove that it is inessential to combating domestic terrorism.…

    • 1154 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Zodiac Killer Case Study The Zodiac Killer was a serial murderer from northern California who killed at least five and as many as 37 people spanning between december of 1968 and october of 69. Of the confirmed kills, the murders occurred in San Francisco, Benicia, Vallejo, and Lake Berryessa. The zodiac killer received the name because they were known for their cryptograms, in which they left clues, puzzles, and taunted the officers who were constantly on his trail. Of the four cryptograms that they left, only one was definitely solved.…

    • 1545 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    While many deem technology as oppressive and intrusive, it has completely reshaped our society in many positive ways. Singer presents the question on whether our technology will liberate us from our oppressive government. Although technology does possess negative advantages, it contains positive ones as well. For instance, in the article, The Terrorist in the Data, the French police were able to utilize the vital aspects of data and surveillance to locate the suspects in the terrorist attack that occurred in Paris in 2015. It is these events where the use of technology comes into vital play.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Introduction This article, Building A “Backdoor” To The iPhone: An Ethical Dilemma, discusses Tim Cook, CEO of Apple, ethical dilemma to safeguard its customer’s trust and digital privacy or assist the U.S. government and the Federal Bureau of Investigation (FBI) to gain access to an iPhone device used by a terrorist to commit a heinous crime against society in the city of San Bernardino, California. In addition, evaluate methods in which managers with power and responsibilities characterized by Badaracco, an ethics professor at Harvard University, as the “dirty-hands problem” and the “right-versus-right” difficulties where “the moral dilemmas of management are, at bottom, clashes among different, conflicting moralities, among very different…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Some were simply unaware that government surveillance occurs at all. The purpose of this project is to make people aware of surveillance and to show them the harmful effects that surveillance can have. In order to do that, I have to provide some background. First, I need to explain encryption.…

    • 1437 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Surveillance has presented numerous challenges to the right of privacy. There is a need to develop a high technology surveillance system that will come with great benefits without intrusion. With new advances in technology each day, it is becoming easier to communicate with each other. Yet with all these new forms of communication there have been unpleasant side effects, since this new advanced technology is not only for harmless interactions between one another it is also used to plot against governments and countries. Governments have found themselves under attack a countless number of times and have had no other choice but to resort to monitoring their citizen’s online and phone activities.…

    • 729 Words
    • 3 Pages
    Improved Essays