Case study - forced decryption ruled unconstitutional

Assignment Help Computer Network Security
Reference no: EM13978696

Case Study: Forced Decryption Ruled Unconstitutional

Read the article titled, "U.S. Courts Rule For-and Against-P rotecting a Suspect''s Hard Drives" located at the following IEEE Spectrum link:

https://spectrum.ieee.org/riskfactor/computing/it/us-courts-rule-for-and-against-protecting-a-suspects-hard-drives

Write a three to four (3-4) page paper in which you:

Analyze the decision by the 11th U.S. Circuit of Appeals to determine whether you believe the decision rendered was correct or incorrect based on the evidence suspected by the government.

Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity. Justify your answer.

Take a position on whether or not you believe technology is moving too fast for the judicial system. Suggest at least two (2) improvements that the courts can make in order to catch up and / or keep up with the advancements in technology issues and crimes.

Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Outline system forensics issues, laws, and skills.

Compare and contrast the various types of computer forensic tools.

Use technology and information resources to research advanced issues in computer forensics.

Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

Verified Expert

The case involves the FBI's attempts to decrypt the contents of more than ten storage devices and hard drives found in the apartment of Jeffrey Feldman in the course of a child pornography investigation. After spending months trying to decrypt the drives, the government applied for a court order forcing Feldman to provide the government with the decrypted contents of the drives.

Reference no: EM13978696

Questions Cloud

Write paper on anxiety disorder and discuss its history : For this paper, choose one anxiety disorder to focus on and write about in detail. Discuss its history, diagnostic criteria, etiology, demographics, treatments, and how it compares to other anxiety disorders
The paying of a cash dividend causes the firms : The paying of a cash dividend causes the firms
Find the highest affordable house price : Suppose you have $50,000 annual disposable income and would like to spend 30% of the income on the mortgage payment. Find the highest affordable house price if a 30-year mortgage rate is 6.0%. Due to low interest policy, as of January 10 of 2015, the..
How people give feedback on your website : My favorite point is about measuring and improving. In the world of technology, things can change in a matter of minutes. Therefore, you need to make sure that you are evaluating the site to keep up with your competitors and technology.
Case study - forced decryption ruled unconstitutional : Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity.
What is the expected return of stock porfolio : Currently the risk free return is 3 percent and the expected market rate of return is 10 percent. What is the expected return of the following three stock porfolio?
An individual owns neither stock nor mutual funds : A survey of 200 college graduates who have been working for at least 3 years found that 90 owned only mutual funds, 20 owned only stocks, and 70 owned both. What is the probability that an individual owns stock? A mutual fund? What is the probability..
Investment portfolio currently contains three stocks : Susan's investment portfolio currently contains three stocks that have a total value equal to $100,000. The beta of this portfolio is 1.5. Susan is considering investing an additional $50,000 in stock that has beta equal to 3. After she adds this sto..
What does beta measure and reflect : What does Beta (β) measure and reflect? Consider the following: A firm’s operations are 45% GREATER than an average firm in the market. Relevant government securities trade @ 3.7%; and the current average return on the market as a whole is 9.1%. What..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Key concepts from jackson and trochim-donnelly

Part I checks your understanding of key concepts from Jackson and Trochim & Donnelly. Answer the following questions: 1. Jackson even-numbered Chapter exercises (pp. 220-221; 273-275) 2. What are degrees of freedom? How are the calculated?

  Explain security model of class using cnss model

suppose that the security model is required for protection of your class. Using CNSS model, examine each of the cells and write a short statement.

  Use a balanced scorecard system

Why is it reasonable to use a balanced scorecard system to measure staff performance? How does this approach mitigate concerns about measurement dysfunction?

  Beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance

  Write an essay about the privacy on the internet

Write an essay about the Privacy on the Internet. Narrow the big topics down to a specific research question and clearly state what it is in the introduction.

  What are the security issues of this

The majority of Australian SMEs are not taking advantage of cloud computing services, though uptake is strengthening among individuals, according to new research.

  Determine impact of at least five potential logical threats

Determine the impact of at least five (5) potential logical threats that require attention. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from ..

  What is the purpose of the diffie-hellman algorithm

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  Use a two-stage transposition technique to encrypt

Use a two-stage transposition technique to encrypt the following message using the key "Decrypt". Ignore the comma and the period in the message

  Minimum contacts test

Compare the minimum contacts test, as it is applied to the bricks-and-mortar activity of businesses, to their cyberspace activity. If you were a small business

  Design a secure authentication technology for gfi

Identify and describe the organizational authentication technology and network security issues. Make a list of access points internal and external (remote). Design a secure authentication technology and network security for GFI

  Problem related to internet communication

Question 1: What is Net Neutrality and why is it important? Question 2: From the group project, identify at least one important step needed to work successfully with a team when working virtually (collaborating online rather than face to face). Th..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd