Preview

Nt1310 Unit 2 Individual Assignment

Good Essays
Open Document
Open Document
642 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 2 Individual Assignment
Draft 2
Dear FBI, How comfortable would you be with a government having access to your personal information and data on your phone? A recent incident involving a terrorist attack in San Bernardino, sparked a controversy between Apple and the Federal Bureau of investigation. Following the attack by two individuals committed an act of terror, killing 14 people, the iPhone belonging to one of the terrorists was found. As you may know, your organization is requesting the court for Apple's forced assistance in weakening the encryption on an IPhone related to the San Bernardino terrorist attacks and supposedly has vital information on it. These terrorist attacks were performed by ISIS's lone wolves, named Syed Rizwan Farook, who owns the phone and Tashfeen Malik, his wife. In my opinion, the phone shouldn't be cracked for three reasons. First of all because it undermines America's founding principles and it
…show more content…
This shows that weakening the encryption and even cracking the phone will break other people's rights to privacy and it would undermine America's founding principles and UDHR article 12 saying that "No one shall be subjected to arbitrary interference with his privacy." With the greatest respect, I ask you to consider that the right to privacy is inalienable. This information was derived from the Los Angeles Times. A second reason to why the phone shouldn’t have to be cracked, is about the certainty that the data sought needed to investigate the terrorist attacks actually is on the phone? According to (Article title and author) there is no 100% guarantee that the information your organization wants is actually on the phone. This question was asked by David Auerbach, a software expert at the think tank New

You May Also Find These Documents Helpful

  • Satisfactory Essays

    I am the original owner of this document. Any changes required on this document please directly contact me first. I will provide further detail on this.…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 604 Words
    • 3 Pages

    6. What is the basic unit of information in an LDAP directory? What is the…

    • 604 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Assignment

    • 506 Words
    • 3 Pages

    An example is of a virtual insurance company, we're not talking only aboutInternet delivery for products. We're talking about the online insurance agency necessarily, although that's certainly one component of the enterprise. We're also talking about back-office infrastructure and support, perhaps dedicating third parties to support this infrastructure to create an electronic communications medium.…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    For this you need to edit the /etc /network/interfaces file and you need to add the…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1310 Unit 2 assignment

    • 475 Words
    • 2 Pages

    RBOCS- Regional Bell operating company (RBOC) is a term describing one of the U.S. regional telephone companies (or their successors) that were created as a result of the breakup of American Telephone and Telegraph Company (AT&T, known also as the Bell System or "Ma Bell") by a U.S. Federal Court consent decree on December 31, 1983. The seven original regional Bell operating companies were Ameritech, Bell Atlantic, BellSouth, NYNEX, Pacific Bell, Southwestern Bell, and US WEST. Each of these companies owned at least two Bell operating companies (Bell operating company). The BOCs were given the right to provide local phone service while AT&T was allowed to retain its long-distance service.…

    • 475 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 883 Words
    • 4 Pages

    Name Entity (NE) is an expression that refers to proper names such as persons, locations, and organizations. For example: Arafat Awajan is a full professor at Princess Sumaya University for Technology in Jordan, then Arafat Awajan, Princess Sumaya University for Technology, and Jordan would be identified as reference to person, an organization, and location, respectively. The task that attempts to locate, extract, and automatically classify named entities into predefined classes or types in open-domain and unstructured texts, such as newspaper articles, was called Name Entity Recognition (NER)[Shaalan 2014].…

    • 883 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 2784 Words
    • 12 Pages

    • In 1970, Corning used pure silica to create a fiber with a loss of…

    • 2784 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 468 Words
    • 2 Pages

    Main Reading: Solomon, M.R. (2011) Consumer behaviour; buying, having and being, 9th edn. New Jersey: Pearson Education Inc…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 2 Assignment

    • 354 Words
    • 2 Pages

    2. No I do not feel that inheritance violates the principle of equality of opportunity and abolishing it would not promote productivity or an even distribution of income. While everyone may not have the same opportunities in life, those who have been able to become successful and wealthy with out inheritance have worked hard to achieve their wealth. To tell some one that they can’t leave their hard earned belongs to family is violating ones right of freedom, life and pursuit of happiness. Not only that, by allowing the government to take over peoples property; doesn’t mean that productivity will increase or that the funds will be distributed evenly among Americans. This theory of abolishing inheritance doesn’t seem to have any correlation…

    • 354 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The argument being presented in the given piece is the FBI asking permission from Apple to have the ability to access people’s private messages in their apple products. This argument came into conversation after the terrorist attack in San Bernardino, California. The author’s claim towards the argument is that the FBI should not be able to have the ability to tap into people’s individual cell phones. Although the FBI’s idea of decoding Apple’s encryption code in order to gain access to tapping into all iPhones under service, it seems that the cons outweigh the pros of this certain situation. However, there has to be a completely different way the FBI can develop a better way to combat terrorism without interfering with all of Apple’s customers.…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Syed Farook and his wife were shot after an attack in San Bernardino, California, during which 14 people were killed. A phone was recovered which the FBI says contains information which is critical to the case and has therefore requested that Apple give them access to the encrypted data contained in the…

    • 53 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The article Swartz wrote pointed out to many people that phone companies can track one’s cell phone by tower signals. Swartz also alerted citizens that the government could use similar methods to secretly monitor movements of suspects. The main idea of Swartz’s essay is that the prosecutors have not been successful in accessing court approval to gain evidence against suspects. Swartz quotes, “Prosecutors argue that having such data is crucial to finding suspects, corroborating their whereabouts with witness accounts, or helping build a case for a wiretap on the phone” (302). In the last paragraph of Swartz’s article she soothes people’s conscience by quoting, “[T]he stream of data that carries a telephone conversation or an e-mail message contains a great deal of information, including when and where the communications originated. And that makes it harder for courts to determine whether a certain digital surveillance method invokes Fourth Amendment protections against unreasonable searches”…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “What will a future without secretes look like” Ted Talk by Alessandro Acquisti is simply summarized by the video title; it also explains how social networks destroyed our privacy. Marty copper, the father of the cell, phone build the first cell phone 37 years ago and ever since then everybody’s privacy has exponentially decreased. Apple watch is finally going to get released spring 2015, with such a powerful device always attached to the user, the human intimacy with technology is greater than ever. Juan Enriquez briefly describes any action done online is a permanent tattoo to the virtual world that can never be erased. Alessandro Acquisti’s ted talk about the future of our privacy and how they escalated from secretes to just general information to the public.…

    • 685 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    With all of the latest hullabaloo about cell phones being used as bugging devices, you may be feeling a bit creeped out at the prospect of being monitored without your knowing it. Although some cell phones can be remotely programmed, most modern cell phones would require physical access to your phone to tamper with it. Luckily, when cell phones are transmitting, certain tell-tale signs can be a dead giveaway that your phone is being monitored.…

    • 464 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Brown, K. (2012). Steering the Nation 's Cell Phone Laws in the Right Direction. Temple Journal Of Science, Technology & Environmental Law, 31(1), 31-44…

    • 1261 Words
    • 6 Pages
    Better Essays