In the article titled “Forcing Apple to Hack That IPhone Sets a Dangerous Precedent”, Congressman Darrell Issa argues that protecting the privacy of millions of people should be more important that forcing Apple to unlock an iPhone that a terrorist used. Congressman Issa suggests that forcing Apple to create new software to unlock the device will put privacy of millions of people at risk. Congressman Issa writes this article in response to the controversial decision of the court to force Apple…
Digital Privacy Without privacy there is no freedom. Conversely, without security there is no country. Imagine a chaotic world where citizens live in constant fear of what could happen to them, because of the lack of safety in their country. Terrorism has especially been an issue in America, and with the growing number of threats, it is impossible to tell when or where domestic attacks may occur. The government should have every right to access digital information of their citizens, to maintain…
protect our privacy, but this method of keeping personal may not help people stay private. Privacy is something that is very important and something that everyone has in common, but in the past few years that privacy barrier has been broken multiple times and the freedom of keeping secrets has been taken away. The National Security Agency (NSA) is an agency that hopes to protect the U.S. secrets, and outwit their opponents in data superhighway, while at the same time protect the privacy rights…
private information you shared through the internet was accessible. What would you do if privacy disappeared? Well it has. We are currently living in a world that’s more connected than ever before. Information is just a few clicks or taps on a screen away. But this connection has allowed corporations all over the world to control us by seeing exactly when, where and what we are doing. In a few years, the term privacy won't be a fundamental right, but a luxury few of us will have. This is all…
surveillance in places such as prisons, war bases or mental institutions- drones could become a serious violation of privacy in communities. People are fearful for the privacy of their homes, jobs and families. Some are even reacting impulsively or violently to stop the invasion of drones in their neighborhoods. Michael Frank shares a few of these scenarios in his article “Drone Privacy: Is Anyone in Charge”. “Last year, a Kentucky man use a shotgun to blast a drone out of the air above his…
computers have been hacked into, and the user has been completely unaware of the illegal activity happening at the time. What methods are being used to get this information? Well it’s quite easy actually. Here are just a few threats that put our internet privacy at risk: Cookie proliferation: The invisible cookie software agents that track your browsing habits and personal data are likely to multiply in 2013. Advertising networks, marketers, and other data profiteers depend on cookies to learn…
In the United States the government collects data from everyone either from their social medias accounts or their browsing history. These large corporations cooperate with the government in order to collect data and store it for them, in which the NSA looks for suspicious behavior that may involve terrorism. Although the USA PATRIOT Act, a sweeping law that allows the gov’t to collect data and wiretap subjects, was created after the 9/11 attacks, all citizens weren’t aware of it for many years…
As the world increases its dependence on technology, it is inevitable that this technology is brought into voting machines. Electronic voting machines are a relatively new invention which allow voters to vote via a computer rather than a ballot sheet. Some people are uncomfortable with electronic voting machines either because of fear that they can be hacked or because of lack of electronic literacy; however, electronic voting machines should be used because of their easier and more secure vote…
Home Depot appropriately handled its data breach crisis through the company’s quick acting with an initial statement to the general public and through crisis management emails sent to its customers. In Home Depot’s initial statement spokeswoman Paula Drake reassured their customers that the company had been actively working with forensics and security teams since they had become aware of a potential breach (Li, 2014). According to W. Timothy Coombs, Ph.D. in his research paper Crisis Management…
On December 2, 2015, 14 people lost their lives and 22 people were injured when a terrorist attack occurred in San Bernardino. Both shooters were killed on the scene during a police shootout. However, one of the shooter’s iPhone was found on the scene of the crime. Up until now, the FBI has been working closely with Apple to help gain information from the iPhone that was needed to help insure national security. However, recently the FBI wanted Apple to create a new form of IOS, Apple’s…