Summary: Hit Spyware Makers Hard

Improved Essays
Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed …show more content…
The matter of installing spyware onto a devices that unknowingly hacks into individuals phones and intercept phone calls is completely illegal. Hammmad Akbar, was charged for legal matters dealing with wiretapping laws. Akbar’s StealthGenie app intercepted call in real-time, which ultimately violated federal laws,“prohibiting the manufacture, advertising and distribution of any system designed to surreptitiously intercept oral or electronic communications in real time” (Zetter 3). Adding to intercepting calls in real-time, StealthGenine also had the additional capability to transmit message data in close-to-real time, meaning almost immediately. An important point writer Kim Zetter makes note of, is the possibility of Akbar not only being brought up on fraudulent wiretapping charges. The authorities also have to opportunity to charge Hammad Akabr and other commercial spyware makers alike, with “file conspiracy charges under the Computer Fraud and Abuse Act or use the Stored Communications Act, in situations where stolen data isn’t intercepted in real time. However Zetter also explains how criminal liability and consequences for the sellers of spyware depend on the overall extent and usage of the produced spyware program along with how the program makers market the

Related Documents

  • Great Essays

    Bsc300 Unit 1 Assignment 2

    • 2191 Words
    • 9 Pages

    ASSIGNMENT 2 AUTHOR: ALI AKBAR MIT111558 SUBMITTED TO: MS NAVNEET KAUR Contents Mobile Apps 2 Introduction 2 Vulnerabilities 2 Android main risk: 3 Security vulnerabilities: 4 Bad data storage: 4 Malware: 4 Unauthorized access: 5 Lack of encryption: 5 Data leaks from syncing: 6 Preventive methods for vulnerability: 6 Experience trust product. 6 Work with software reputation service. 7 Layer security.…

    • 2191 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Today, individuals may take the iPhone for granted, without realizing that if Apple was like the Walt Disney Company by keeping its most precious and valuable secrets away from others, then all present smartphones would most likely be a few generations behind. In this alternate reality of Apple hiding its secrets like Disney, somebody would eventually invent a device that would be similar, but inferior, to current smartphones. Therefore, individuals today should be grateful for the benefits that came from Apple’s noble task to make the world culturally larger. Apple could have easily hid their secrets away to make a “usemonopoly” on the iPod, which would enable apple to sue any individual from using the “intellectual property” of the iPod (Lethem 217). In his essay, Lethem argues that when a successful company sues other individuals for using the intellectual property of their product, the company has a usemonopoly on the product.…

    • 1592 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    (I am side 2: "Military Women in Combat: Why Making It Official Matters") "The Under Cover Parent" by Harlan Coben Coben begins his essay with an explanation of his personal experience and initial thoughts on spyware. In the second paragraph, Coben describes consumer-level spyware, and he explains how it works.…

    • 826 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Police officers have needed the information on electronic devices. They need this data for finding missing citizens and suspects. But have been stopped in their tracks countless times. They have been stopped by the owners and others that believe the 4th Amendment enables them to decline the seizing and search of their devices. They want officers to have a warrant.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The FBI not only wants to win their most recent case against Apple, it wants to essentially take over the company. What started out as a request to unlock the killer's iPhone, may eventually evolve into them wanting to turn on user's cameras and microphones for espionage purposes. FBI TRIES TO TURN APPLE INTO SURVEILLANCE TOY What was previously a court battle of ethics has turned to an all out war of the FBI versus privacy. Their most recent attempt has them demanding Apple to create custom software that will completely bypass security features on iOS.…

    • 366 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Finfisher Case Study

    • 1271 Words
    • 5 Pages

    FinFisher: Disguising Greed as Security Gamma International is a company that provides a software solution for organizations that need intelligence to maintain security. In order to get intelligence, FinFisher (the software tool) uses various methods in order to tap into people 's daily routines, including screenshots of desktops at regular intervals, webcam hijacking, and keylogging. This spyware can get into computers through seemingly harmless methods such as email attachments.…

    • 1271 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The future is always changing and never ending. In George Orwell’s 1984, Orwell ruminates on his thoughts and ideas of what the future will be like. Orwell wrote 1984 in 1949 during the writing era of postmodernism. Postmodernist books often expressed thoughts of the future, as well as other themes. The book, 1984, describes the future as a place where the Party has taken over and controls everything and everyone (Oceania is a place of war and control.)…

    • 922 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The Importance Of Spyware

    • 169 Words
    • 1 Pages

    Spyware is a good thing to spy on kids because you could know what your kid is doing. But they're not telling their kids about it but they don't what their kid to find out about it. He is trying to tell parents that spyware is good. Because you can know what your kids are watching.…

    • 169 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The foundation of computer crimes lies with The Computer Fraud and Abuse Act (CFAA) of 1986, 18 U.S.C. 1030. According to Easttom and Taylor (2011), the CFAA was a federal act which provided protection of computer systems that were part of a federal entity or financial-institution. Over time and through a series of congressional hearings, lawmakers have amended and tailored language in a manner to protect the government's interest in computer crimes while striking a balance with the ability of the states to mount their own initiative in a state's prosecution (Department of Justice, n.d.). Congress has continued to amend the CFAA just as cyber crimes continue to take advantage of the evolution of the computer and cyber communications.…

    • 386 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    As humans continue to crave convenience, large technological companies are starting to add features to make products easier to use. However, the consumers do not realize that in order for them to receive such large amounts of convenience, they are sacrificing their privacy. Some of Samsung’s new Smart Televisions ship off “...voice data to an unnamed third party—presumably for the purpose of translating the speech to text”(Newman). This perfectly illustrates how today’s latest technology is invading privacy, one step at a time. People who use the voice command feature on their television can accidentally say something that they should no tell others.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Remote lock for andriod smartphone Manjiri M. Bole, Yogini S. Chavan, Arif J. Shaikh, Saurabh D. Chikhale Computer Department, K.J.C.O.E.M.R Computer Department, K.J.C.O.E.M.R Computer Department, K.J.C.O.E.M.R Computer Department, K.J.C.O.E.M.R. Abstract — In this paper, we propose a MAC-based remote lock and wipe system through the SMS push notification to protect against the private data disclosure when smart phone is lost or stolen. The proposed system provides the integrity checking mechanism so that the malicious users are unable to launch denialof- service attacks which send the lock or wipe commands to the normal users on purpose. Also, it satisfies the SMS length limitation of 80 bytes long without downgrading the security level.…

    • 2041 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    Information technology has revolutionized virtually all aspects of human life. From communication to entertainment, all human endeavors have been affected by information technology. Whereas the benefits of information technology must be recognized, it is important to mention the challenges that it presents. Individuals and organizations rely on information technology for such issues as communication. Despite instituting measures to ensure data security, breaches usually occur.…

    • 1252 Words
    • 6 Pages
    Superior Essays