SlideShare a Scribd company logo
1 of 6
1
Annotated Bibliography
Tamika S. Bouldin
Liberty University
CJUS 540
Thesis Statement: Private companies engaged in commerce
within the borders of the United States should (or should not) be
compelled to provide “back doors” to law enforcement to
circumvent proprietary encryption coding.
Annotated Bibliography
Castro, D., & McQuinn, A. (2016). Unlocking Encryption:
Information Security and the
Rule of Law. Information Technology and Innovation
Foundation.
In this scholarly article, Castro and McQuinn (2016) observes
that the continued improvements information security practices,
especially in the utilization of encryption to safeguard the
confidentiality of information, can potentially improve the
overall security of customers and business enterprises.
However, as commodities get securer for customers and firms, it
is getting harder for law enforcement agencies to easily access
and oversee some data that can possibly help them to deter or
investigate criminal activities such as terrorism. This problem
has paved the way for one of the most challenging policy
dilemmas of the information era, because encryption not only
enhances security for customers and business organizations, but
it also makes it more challenging for government authorities to
protect them from other sophisticated forms of threat.
According to Castro and McQuinn (2016), there is need to
address this complex dilemma. Therefore, the government can
make any choice engaging in a trade off with businesses.
Finklea, K. M. (2016). Encryption and the" going Dark" Debate.
Congressional Research
Service.
In this scholarly work, Finklea (2016) notes that the constantly
changing technology provides opportunities and challenges in
equal measure for U.S law enforcement agencies. Different
forms of technological revolutions have opened a treasure trove
of information of knowledge for investigators and analysts.
Others, opines the other hand, pose distinct challenges.
Although some observers opine that law enforcers now enjoy
access to more data than in the past, a group of scholars argue
that law enforcement is being kept in the dark on matters of
access to data. To them, this problem is primarily attributed to
the fact that technological revolution has radically outpaced law
enforcers’ speed of technological change. These challenges for
law enforcers include strong, end-to-end encryption, providers’
limits on data retention, bounds on firms’ technological abilities
to offer specific data points to law enforcement, and the tools
that facilitate anonymity online. Therefore, law enforcers may
not effectively perform investigations when they lack access to
data.
Stein, J. (2017). Security versus security: balancing encryption,
privacy, and national
Security (Thesis, University of Texas).
Debates on whether the government should access classified
corporate data has been simmering over the last few decades. In
this scholarly work, Stein (2017) analyzes the existing
controversies over encryption policy. After careful assessment
of possible solutions to ‘going dark’ as well as analyzing the
cost and benefits of each option, the researcher found
exceptional access to information to be more harmful than
helpful. In the contemporary information society, there appears
to be no leading solution to the ongoing dark problem.
Nonetheless, Stein (2017) observes that exceptional access to
data and communication is a simple answer to a simple
challenge. According to Stein (2017) the task of going dark is
an uphill one, and as such, requires multifactorial and clearly
defined solutions. The utilization of complex encryption tools
forces people who listen such as the FBI or CIA to be much
more targeted. When it comes to the going dark discourse,
governments have not fully won the access battle.
Soghoian, C. (2010). Caught in the cloud: Privacy, encryption,
and government back doors
in the web 2.0 era. J. on Telecomm. & High Tech. L., 8, 359.
The strength of information security mechanisms has increased
in the face of introduction of could computing systems. In the
last decade, customers, companies, and governments have
moved their data to the cloud at a fast pace. In the process have
embraced web-based applications and storage solutions by
organizations that may include Amazon, Google and Microsoft.
However, Soghoiran (2010) notes that the radical shift to cloud
computing needlessly exposes different user groups to privacy
and confidentiality invasions by fraudulent groups of people
such as hackers. Cloud computing technologies have also
rendered end users incapable of amending the protection of a
person’s private files and documents. According to Soghoian
(2010), such real risks and threats related to the cloud
computing approach to data protection are never communicated
to end user groups. Therefore, consumers are rendered unable to
make real and informed decisions. In light of the above, the
researcher calls for the need for government monitoring of oud
data stored by such firms.
Tashea, J. (2018). Cat-and-mouse game: Customers demand
cybersecurity, law
enforcement wants easier access to evidence. ABA Journal, 10,
1
The tussles between government regulators and businesses over
complete access to their information systems have intensified
and are not likely to end any soon. In this journal article,
Tashea (2018) described the sophisticated security control
measures that have been introduced by companies, which outwit
government regulators. In what the author terms as a ‘cat and
mouse’ game, the article describes the iPhone’s encryption tool
as one that has become a puzzle to Indiana State police officers.
Armed with the GrayKey, police officers have a technology has
the capacity to circumvent iPhone passwords and encryption.
Therefore, the police agency was eventually able to plug into
dozens of iPhones in their possession and gather previously
unattainable data for an ongoing investigation. According to
Tashea (2018), communciaiton technologies are increasingly
making it more challenging for law enforcers to collect
evidence, both technically and through service of legal
procedures. Therefore, companies are being urged to cooperate
with law enforcers to provide meaningful data for criminal
procedures.
Harvard Law Review. (2020). Digital Duplications and the
Fourth Amendment.
(2016). Harvard Law Review, 129(4), 1046–1067.
The legal dimension of government’s clamor for corporate data
has been a subject of discussion in the face of widespread
terrorism and technological advancements. In this article,
Harvard Law Review (2020) explores the extent to which such
issues are related to the Fourth Amendment. The phenomenal
growth and spread of digital data in the 21st century has been
both a blessing and a curse for law enforcers. On one hand, this
development has paved the way for a golden age of surveillance
due to the increasing amounts of data that is available regarding
the actual and possible lawbreakers. On the other hand, the
government is faced with large volumes of data to sort through
and filter out least relevant ones. The task of searching such
ever-increasing haystack requires government regulators to
embrace different approaches such as algorithmic queries.
However, these approaches are increasingly sparking debates on
whether the government is violating the fourth amendment.
Murphy, M. H. (2016). Technological solutions to privacy
questions: what is the role of
law?. Information & Communications Technology Law, 25(1),
4-31.
The solution to the unending division in opinion between
corporations and government law enforcers have never been
reached on matters related to sharing of crucial data. In this
scholarly work, Murphy (2010) proposes technological
interventions to privacy and confidentiality problems related to
governments’ access to corporate information. Despite the
widespread acknowledgement of privacy as a fundamental
human right, it is sometimes criticized as an anachronistic value
in the contemporary society. Although the prominence of this
perspective has reduced in the wake of the Snowden revelations
and expanded public concern with online privacy, government
supporters are still persistent in clamoring for support when
they are depicted as competing with national security, safety, as
well as socioeconomic progress. According to Murphy (2016),
technological advancements pose major threats to right to
privacy. As a consequence, there have been renewed interests in
technological interventions to privacy problems. As such, the
author explore the existing privacy debates through the lenses
of multiple stakeholders in order to determine possible
technological solutions.
Mayer, J. (2017). Government hacking. Yale LJ, 127, 570.
The information about US government’s hacking of
corporations’ computer systems for law enforcement purposes
has been circulating in both public and media circles. According
to Mayer (2017), this problem has sparked a lot of ethical
debate about citizens’ right to privacy. However, Mayer (2017)
observes that encryption technologies are getting more powerful
as anonymization tools become more prevalent. This has
rendered the government unable to collect crucial information
for security –purposes. Consequently, Mayer raises concerns
that the government may resort to use of malicious software for
espionage if companies fail to furnish them with classified
records of all their customers . Law enforcement hacking poses
major controversies for criminal processes. The courts of law
are merely starting to piece through the privacy ideology.
Therefore, the author provides a detailed assessment of how
federal laws regulate the government’s utilization of malicious
software for espionage purposes. This problem has caused major
divisions in legal circles for a long time.

More Related Content

Similar to 1Annotated BibliographyTamika S. BouldinLibe

Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
Open Government Data & Privacy Protection
Open Government Data & Privacy ProtectionOpen Government Data & Privacy Protection
Open Government Data & Privacy ProtectionSylvia Ogweng
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Arab Federation for Digital Economy
 
Impact of big data analytics in business economics
Impact of big data analytics in business economicsImpact of big data analytics in business economics
Impact of big data analytics in business economicsDr. C.V. Suresh Babu
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docxouldparis
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
 
Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Jason Fernandes
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
Tech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTier10
 

Similar to 1Annotated BibliographyTamika S. BouldinLibe (16)

Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Open Government Data & Privacy Protection
Open Government Data & Privacy ProtectionOpen Government Data & Privacy Protection
Open Government Data & Privacy Protection
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
 
Big Data Paper
Big Data PaperBig Data Paper
Big Data Paper
 
Impact of big data analytics in business economics
Impact of big data analytics in business economicsImpact of big data analytics in business economics
Impact of big data analytics in business economics
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
THE GREAT HACK.docx
THE GREAT HACK.docxTHE GREAT HACK.docx
THE GREAT HACK.docx
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?
 
Cyber Warfare
Cyber WarfareCyber Warfare
Cyber Warfare
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Tech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTech Companies and the Fight for Privacy
Tech Companies and the Fight for Privacy
 

More from cargillfilberto

COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docxCOMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docxcargillfilberto
 
Common Mistakes I see on this paper are1. Using summaries and .docx
Common Mistakes I see on this paper are1. Using summaries and .docxCommon Mistakes I see on this paper are1. Using summaries and .docx
Common Mistakes I see on this paper are1. Using summaries and .docxcargillfilberto
 
Common symptoms of memory changes during the lifetime in healthy.docx
Common symptoms of memory changes during the lifetime in healthy.docxCommon symptoms of memory changes during the lifetime in healthy.docx
Common symptoms of memory changes during the lifetime in healthy.docxcargillfilberto
 
Common Surface-Level Issues for the Informative Essay(Note Thes.docx
Common Surface-Level Issues for the Informative Essay(Note Thes.docxCommon Surface-Level Issues for the Informative Essay(Note Thes.docx
Common Surface-Level Issues for the Informative Essay(Note Thes.docxcargillfilberto
 
Commercial Space TravelThere are about a half dozen commercial s.docx
Commercial Space TravelThere are about a half dozen commercial s.docxCommercial Space TravelThere are about a half dozen commercial s.docx
Commercial Space TravelThere are about a half dozen commercial s.docxcargillfilberto
 
Common sports-relatedshoulder injuriesShoulder pain is.docx
Common sports-relatedshoulder injuriesShoulder pain is.docxCommon sports-relatedshoulder injuriesShoulder pain is.docx
Common sports-relatedshoulder injuriesShoulder pain is.docxcargillfilberto
 
Common Product Yields VEGETABLES Acorn Squash.docx
Common Product Yields  VEGETABLES Acorn Squash.docxCommon Product Yields  VEGETABLES Acorn Squash.docx
Common Product Yields VEGETABLES Acorn Squash.docxcargillfilberto
 
Common Law Strict Liability Introduction Strict liabilit.docx
Common Law Strict Liability Introduction  Strict liabilit.docxCommon Law Strict Liability Introduction  Strict liabilit.docx
Common Law Strict Liability Introduction Strict liabilit.docxcargillfilberto
 
common core state stanDarDs For english Language arts & .docx
common core state stanDarDs For english Language arts & .docxcommon core state stanDarDs For english Language arts & .docx
common core state stanDarDs For english Language arts & .docxcargillfilberto
 
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docxCOMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docxcargillfilberto
 
Common CoreCasey BerryEnglish 200August .docx
Common CoreCasey BerryEnglish  200August .docxCommon CoreCasey BerryEnglish  200August .docx
Common CoreCasey BerryEnglish 200August .docxcargillfilberto
 
Common Holy Days in Jewish Religious TraditionsComplete th.docx
Common Holy Days in Jewish Religious TraditionsComplete th.docxCommon Holy Days in Jewish Religious TraditionsComplete th.docx
Common Holy Days in Jewish Religious TraditionsComplete th.docxcargillfilberto
 
Common Hacking Techniques You Should Know AboutHacking is th.docx
Common Hacking Techniques You Should Know AboutHacking is th.docxCommon Hacking Techniques You Should Know AboutHacking is th.docx
Common Hacking Techniques You Should Know AboutHacking is th.docxcargillfilberto
 
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docx
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docxCommon Pool Resource ManagementKim Townsend SUS 350 Sustai.docx
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docxcargillfilberto
 
Common Assignment Prepare a written analysis of the impact of the.docx
Common Assignment Prepare a written analysis of the impact of the.docxCommon Assignment Prepare a written analysis of the impact of the.docx
Common Assignment Prepare a written analysis of the impact of the.docxcargillfilberto
 
Common Assignment Essay Objective of this Assignment.docx
Common Assignment Essay   Objective of this Assignment.docxCommon Assignment Essay   Objective of this Assignment.docx
Common Assignment Essay Objective of this Assignment.docxcargillfilberto
 
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docx
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docxCommittee on Enhancing Federal Healthcare Quality ProgramsJa.docx
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docxcargillfilberto
 
Committees1. To provide for greater transparency in the HU.docx
Committees1. To provide for greater transparency in the HU.docxCommittees1. To provide for greater transparency in the HU.docx
Committees1. To provide for greater transparency in the HU.docxcargillfilberto
 
Commitment to ProfessionalismCommitment to Professionalism..docx
Commitment to ProfessionalismCommitment to Professionalism..docxCommitment to ProfessionalismCommitment to Professionalism..docx
Commitment to ProfessionalismCommitment to Professionalism..docxcargillfilberto
 

More from cargillfilberto (20)

COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docxCOMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
 
Common Mistakes I see on this paper are1. Using summaries and .docx
Common Mistakes I see on this paper are1. Using summaries and .docxCommon Mistakes I see on this paper are1. Using summaries and .docx
Common Mistakes I see on this paper are1. Using summaries and .docx
 
Common symptoms of memory changes during the lifetime in healthy.docx
Common symptoms of memory changes during the lifetime in healthy.docxCommon symptoms of memory changes during the lifetime in healthy.docx
Common symptoms of memory changes during the lifetime in healthy.docx
 
Common Surface-Level Issues for the Informative Essay(Note Thes.docx
Common Surface-Level Issues for the Informative Essay(Note Thes.docxCommon Surface-Level Issues for the Informative Essay(Note Thes.docx
Common Surface-Level Issues for the Informative Essay(Note Thes.docx
 
Commercial Space TravelThere are about a half dozen commercial s.docx
Commercial Space TravelThere are about a half dozen commercial s.docxCommercial Space TravelThere are about a half dozen commercial s.docx
Commercial Space TravelThere are about a half dozen commercial s.docx
 
Common sports-relatedshoulder injuriesShoulder pain is.docx
Common sports-relatedshoulder injuriesShoulder pain is.docxCommon sports-relatedshoulder injuriesShoulder pain is.docx
Common sports-relatedshoulder injuriesShoulder pain is.docx
 
Common Product Yields VEGETABLES Acorn Squash.docx
Common Product Yields  VEGETABLES Acorn Squash.docxCommon Product Yields  VEGETABLES Acorn Squash.docx
Common Product Yields VEGETABLES Acorn Squash.docx
 
Common Law Strict Liability Introduction Strict liabilit.docx
Common Law Strict Liability Introduction  Strict liabilit.docxCommon Law Strict Liability Introduction  Strict liabilit.docx
Common Law Strict Liability Introduction Strict liabilit.docx
 
Common Core .docx
Common Core                                                       .docxCommon Core                                                       .docx
Common Core .docx
 
common core state stanDarDs For english Language arts & .docx
common core state stanDarDs For english Language arts & .docxcommon core state stanDarDs For english Language arts & .docx
common core state stanDarDs For english Language arts & .docx
 
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docxCOMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
 
Common CoreCasey BerryEnglish 200August .docx
Common CoreCasey BerryEnglish  200August .docxCommon CoreCasey BerryEnglish  200August .docx
Common CoreCasey BerryEnglish 200August .docx
 
Common Holy Days in Jewish Religious TraditionsComplete th.docx
Common Holy Days in Jewish Religious TraditionsComplete th.docxCommon Holy Days in Jewish Religious TraditionsComplete th.docx
Common Holy Days in Jewish Religious TraditionsComplete th.docx
 
Common Hacking Techniques You Should Know AboutHacking is th.docx
Common Hacking Techniques You Should Know AboutHacking is th.docxCommon Hacking Techniques You Should Know AboutHacking is th.docx
Common Hacking Techniques You Should Know AboutHacking is th.docx
 
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docx
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docxCommon Pool Resource ManagementKim Townsend SUS 350 Sustai.docx
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docx
 
Common Assignment Prepare a written analysis of the impact of the.docx
Common Assignment Prepare a written analysis of the impact of the.docxCommon Assignment Prepare a written analysis of the impact of the.docx
Common Assignment Prepare a written analysis of the impact of the.docx
 
Common Assignment Essay Objective of this Assignment.docx
Common Assignment Essay   Objective of this Assignment.docxCommon Assignment Essay   Objective of this Assignment.docx
Common Assignment Essay Objective of this Assignment.docx
 
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docx
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docxCommittee on Enhancing Federal Healthcare Quality ProgramsJa.docx
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docx
 
Committees1. To provide for greater transparency in the HU.docx
Committees1. To provide for greater transparency in the HU.docxCommittees1. To provide for greater transparency in the HU.docx
Committees1. To provide for greater transparency in the HU.docx
 
Commitment to ProfessionalismCommitment to Professionalism..docx
Commitment to ProfessionalismCommitment to Professionalism..docxCommitment to ProfessionalismCommitment to Professionalism..docx
Commitment to ProfessionalismCommitment to Professionalism..docx
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

1Annotated BibliographyTamika S. BouldinLibe

  • 1. 1 Annotated Bibliography Tamika S. Bouldin Liberty University CJUS 540 Thesis Statement: Private companies engaged in commerce within the borders of the United States should (or should not) be compelled to provide “back doors” to law enforcement to circumvent proprietary encryption coding. Annotated Bibliography Castro, D., & McQuinn, A. (2016). Unlocking Encryption: Information Security and the Rule of Law. Information Technology and Innovation Foundation. In this scholarly article, Castro and McQuinn (2016) observes that the continued improvements information security practices, especially in the utilization of encryption to safeguard the confidentiality of information, can potentially improve the overall security of customers and business enterprises. However, as commodities get securer for customers and firms, it is getting harder for law enforcement agencies to easily access and oversee some data that can possibly help them to deter or investigate criminal activities such as terrorism. This problem has paved the way for one of the most challenging policy
  • 2. dilemmas of the information era, because encryption not only enhances security for customers and business organizations, but it also makes it more challenging for government authorities to protect them from other sophisticated forms of threat. According to Castro and McQuinn (2016), there is need to address this complex dilemma. Therefore, the government can make any choice engaging in a trade off with businesses. Finklea, K. M. (2016). Encryption and the" going Dark" Debate. Congressional Research Service. In this scholarly work, Finklea (2016) notes that the constantly changing technology provides opportunities and challenges in equal measure for U.S law enforcement agencies. Different forms of technological revolutions have opened a treasure trove of information of knowledge for investigators and analysts. Others, opines the other hand, pose distinct challenges. Although some observers opine that law enforcers now enjoy access to more data than in the past, a group of scholars argue that law enforcement is being kept in the dark on matters of access to data. To them, this problem is primarily attributed to the fact that technological revolution has radically outpaced law enforcers’ speed of technological change. These challenges for law enforcers include strong, end-to-end encryption, providers’ limits on data retention, bounds on firms’ technological abilities to offer specific data points to law enforcement, and the tools that facilitate anonymity online. Therefore, law enforcers may not effectively perform investigations when they lack access to data. Stein, J. (2017). Security versus security: balancing encryption, privacy, and national Security (Thesis, University of Texas). Debates on whether the government should access classified corporate data has been simmering over the last few decades. In this scholarly work, Stein (2017) analyzes the existing controversies over encryption policy. After careful assessment of possible solutions to ‘going dark’ as well as analyzing the
  • 3. cost and benefits of each option, the researcher found exceptional access to information to be more harmful than helpful. In the contemporary information society, there appears to be no leading solution to the ongoing dark problem. Nonetheless, Stein (2017) observes that exceptional access to data and communication is a simple answer to a simple challenge. According to Stein (2017) the task of going dark is an uphill one, and as such, requires multifactorial and clearly defined solutions. The utilization of complex encryption tools forces people who listen such as the FBI or CIA to be much more targeted. When it comes to the going dark discourse, governments have not fully won the access battle. Soghoian, C. (2010). Caught in the cloud: Privacy, encryption, and government back doors in the web 2.0 era. J. on Telecomm. & High Tech. L., 8, 359. The strength of information security mechanisms has increased in the face of introduction of could computing systems. In the last decade, customers, companies, and governments have moved their data to the cloud at a fast pace. In the process have embraced web-based applications and storage solutions by organizations that may include Amazon, Google and Microsoft. However, Soghoiran (2010) notes that the radical shift to cloud computing needlessly exposes different user groups to privacy and confidentiality invasions by fraudulent groups of people such as hackers. Cloud computing technologies have also rendered end users incapable of amending the protection of a person’s private files and documents. According to Soghoian (2010), such real risks and threats related to the cloud computing approach to data protection are never communicated to end user groups. Therefore, consumers are rendered unable to make real and informed decisions. In light of the above, the researcher calls for the need for government monitoring of oud data stored by such firms. Tashea, J. (2018). Cat-and-mouse game: Customers demand cybersecurity, law enforcement wants easier access to evidence. ABA Journal, 10,
  • 4. 1 The tussles between government regulators and businesses over complete access to their information systems have intensified and are not likely to end any soon. In this journal article, Tashea (2018) described the sophisticated security control measures that have been introduced by companies, which outwit government regulators. In what the author terms as a ‘cat and mouse’ game, the article describes the iPhone’s encryption tool as one that has become a puzzle to Indiana State police officers. Armed with the GrayKey, police officers have a technology has the capacity to circumvent iPhone passwords and encryption. Therefore, the police agency was eventually able to plug into dozens of iPhones in their possession and gather previously unattainable data for an ongoing investigation. According to Tashea (2018), communciaiton technologies are increasingly making it more challenging for law enforcers to collect evidence, both technically and through service of legal procedures. Therefore, companies are being urged to cooperate with law enforcers to provide meaningful data for criminal procedures. Harvard Law Review. (2020). Digital Duplications and the Fourth Amendment. (2016). Harvard Law Review, 129(4), 1046–1067. The legal dimension of government’s clamor for corporate data has been a subject of discussion in the face of widespread terrorism and technological advancements. In this article, Harvard Law Review (2020) explores the extent to which such issues are related to the Fourth Amendment. The phenomenal growth and spread of digital data in the 21st century has been both a blessing and a curse for law enforcers. On one hand, this development has paved the way for a golden age of surveillance due to the increasing amounts of data that is available regarding the actual and possible lawbreakers. On the other hand, the government is faced with large volumes of data to sort through and filter out least relevant ones. The task of searching such ever-increasing haystack requires government regulators to
  • 5. embrace different approaches such as algorithmic queries. However, these approaches are increasingly sparking debates on whether the government is violating the fourth amendment. Murphy, M. H. (2016). Technological solutions to privacy questions: what is the role of law?. Information & Communications Technology Law, 25(1), 4-31. The solution to the unending division in opinion between corporations and government law enforcers have never been reached on matters related to sharing of crucial data. In this scholarly work, Murphy (2010) proposes technological interventions to privacy and confidentiality problems related to governments’ access to corporate information. Despite the widespread acknowledgement of privacy as a fundamental human right, it is sometimes criticized as an anachronistic value in the contemporary society. Although the prominence of this perspective has reduced in the wake of the Snowden revelations and expanded public concern with online privacy, government supporters are still persistent in clamoring for support when they are depicted as competing with national security, safety, as well as socioeconomic progress. According to Murphy (2016), technological advancements pose major threats to right to privacy. As a consequence, there have been renewed interests in technological interventions to privacy problems. As such, the author explore the existing privacy debates through the lenses of multiple stakeholders in order to determine possible technological solutions. Mayer, J. (2017). Government hacking. Yale LJ, 127, 570. The information about US government’s hacking of corporations’ computer systems for law enforcement purposes has been circulating in both public and media circles. According to Mayer (2017), this problem has sparked a lot of ethical debate about citizens’ right to privacy. However, Mayer (2017) observes that encryption technologies are getting more powerful as anonymization tools become more prevalent. This has rendered the government unable to collect crucial information
  • 6. for security –purposes. Consequently, Mayer raises concerns that the government may resort to use of malicious software for espionage if companies fail to furnish them with classified records of all their customers . Law enforcement hacking poses major controversies for criminal processes. The courts of law are merely starting to piece through the privacy ideology. Therefore, the author provides a detailed assessment of how federal laws regulate the government’s utilization of malicious software for espionage purposes. This problem has caused major divisions in legal circles for a long time.