Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

Do you remember the controversy concerning Apple and the FBI? It was a case that swept the country and encroached on unprecedented ground. The FBI demanded that Apple release information on how to unlock an encrypted iPhone that was connected to a terrorist attack, but Apple chose to vehemently refuse the FBI, stating that it would be endangering the entirety of their consumer base by doing so. The FBI threatened Apple with lawsuit after lawsuit, but in the end they were able to unlock the device without Apple’s help.

The popular trend of providing mobile devices with encryption has led to increased complications during investigations, and Comey chose to clarify the Bureau’s stance on the privacy of the typical American citizen. While there has to be a reasonable expectation of privacy in houses, vehicles, and even mobile devices, Comey claims that these expectations can reasonably be revoked in a court of law. He says: “With good reason, the people of the United States--through judges and law enforcement--can invade our public spaces."

This statement prompts yet another question: how does a personal device qualify as a public space? According to Comey, a mobile device actually can be considered a public space: “Even our memories are not absolutely private in the United States,” Comey said. “Even our communications with our spouses, with our lawyers, with our clergy, with our medical professionals are not absolutely private. Because a judge, under certain circumstances, can order all of us to testify about what we saw, remembered, or heard. There are really important constraints on that. But the general principle is one that we’ve always accepted in the United States and has been at the core of our country: There is no such thing as absolute privacy in America. There is no place outside of judicial authority.”

Additionally, Comey made sure to point out that the FBI has no business telling American citizens how to live and govern themselves, and that the tech companies don’t either. You might recall the open letter that many tech companies addressed to the the FBI last April, demanding that the government cease issuing mandates that would require tech companies to provide encryption keys for their software.

It’s natural that these Silicon Valley giants don’t agree with Comey. In fact, there are even those amongst his peers who don’t believe he’s right on the matter. Nuala O’Connor, the President and CEO of the Center for Democracy & Technology, as well as the first Federal chief Privacy Officer for Homeland Security, is one of them. She says, “He could not be more wrong on encryption.”

O’Connor is hardly the only one of his contemporaries who disagree with Comey. Two other notable former government officials had something to say about the FBI’s stance on encryption, and they both spoke at the RSA Cybersecurity Conference. Former Department of Homeland Security Secretary Michael Chertoff claims that forcing Apple to provide software that can hack into an encrypted iPhone would be like “creating a bacterial biological weapon.” Similarly, Mike McConnell, a former Director of National Intelligence, claimed that “ubiquitous encryption is something the nation needs to have.”

This isn’t a problem that only technology companies have to deal with. It’s something that all users of smart technology (and most technology in general) have to endure. After all, any rulings in favor of the FBI’s stance could be detrimental to user privacy. For example, in the case of Apple creating a software that can crack their iPhone’s encryption, what would happen if this software were stolen and exploited by hackers? It would become a major problem, just like the NSA’s surveillance vulnerabilities that were stolen and sold on the Black Market just this past summer.

In light of Comey’s response, what are your thoughts on the FBI’s stance on encryption? Do you think that government agencies have the right to access devices, despite invading the privacy of its citizens? Do you think that this “greater good” argument holds water? Share your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Users Business Management Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Cloud Computing Server Save Money Windows 10 Passwords Saving Money Holiday Social Media Gadgets Chrome Tech Term Virtualization Managed IT Services Automation Managed Service Microsoft Office Facebook Operating System Artificial Intelligence Cybercrime Computers BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Health Wi-Fi Spam Office 365 Telephone Systems Information Managed Service Provider Remote Information Technology Alert Covid-19 Bandwidth Router BDR Social Engineering Mobility Recovery Employer-Employee Relationship Encryption Remote Monitoring Applications Application App History Law Enforcement Big Data Data Breach Human Resources Password Money Mobile Computing How To Blockchain Government Paperless Office Office Tips Data Storage Training Patch Management Private Cloud VPN Managed IT Remote Computing Apps Mobile Office Website Budget Google Drive Avoiding Downtime Wireless Vulnerability Windows 7 Gmail Word Infrastructure Settings Voice over Internet Protocol Servers Bring Your Own Device Data Management Two-factor Authentication Work/Life Balance Flexibility Marketing WiFi Mouse IT solutions Data Security HaaS Entertainment User Error Education Physical Security RMM Meetings USB Safety Sports HIPAA Redundancy Keyboard Risk Management Hacker Telephone System Staff Software as a Service The Internet of Things Conferencing Machine Learning Lithium-ion battery Connectivity Remote Work Scam Save Time Firewall Vendor Vendor Management Cleaning Managed Services Virtual Reality Display Apple Social Data Protection End of Support Employee/Employer Relationship Samsung Comparison Internet Exlporer Computing CES Wearable Technology Value Hard Drives PDF Retail Business Technology Electronic Medical Records Content Management Instant Messaging IT Consultant Spam Blocking Access Control Robot Excel Proactive IT Virtual Assistant Hiring/Firing Biometrics Digital Signage Humor Best Practice Authentication Virtual Desktop YouTube Black Market DDoS Procurement SharePoint Net Neutrality Update Workplace Strategy Business Intelligence Document Management Help Desk Solid State Drive Wireless Technology Printing Worker Google Docs How to Downtime Audit IT Management Customer Service Identity Theft Environment Botnet Data storage Virus IT Plan Fax Server Managed Services Provider Automobile Augmented Reality Database Unified Threat Management Computing Infrastructure Computer Accessories Unsupported Software SaaS Fraud Going Green Remote Workers Remote Worker Charger Processor Compliance Cryptocurrency Network Congestion OneNote eWaste Computer Care Battery Printer Shadow IT Current Events Hard Drive Bluetooth Legal Telephony Root Cause Analysis GDPR Copiers Hosted Computing 5G Advertising Printer Server HBO Quick Tip Knowledge Wireless Internet Shortcut Music Online Shopping Politics Cost Management Smartwatch Skype Ergonomics File Sharing Data loss Notifications Camera Development Inventory Social Networking OLED Specifications Outlook PCI DSS Leadership Wire Virtual Machine Troubleshooting Evernote Fiber Optics Employee Travel Start Menu 2FA Screen Mirroring Printers Running Cable Messaging Loyalty Cabling Millennials Relocation Wireless Charging Memory Frequently Asked Questions Policy Smart Office Hypervisor Books Trend Micro Video Games Mobile Dark mode Windows 10s Cast Virtual Private Network SMS Default App Workforce Worker Commute Cables Experience Tip of the week Procedure webinar Saving Time Emergency Shopping Employer Employee Relationship Google Search Scalability Professional Services dark theme Public Cloud Project Management AI Assessment Nanotechnology IT Infrastructure Telecommuting Business Owner Science Consultant Cortana Bing Analytics Windows Server 2008 NarrowBand FinTech Social Network Digital Signature Search Tools iPhone Warranty Distributed Denial of Service Television Customer Relationship Management Investment Best Available Google Apps Analyitcs WIndows 7 Employees HVAC Employee/Employer Relationships Analysis Programming ISP Windows 365 Files Administrator Video Conferencing Public Computer Devices ROI Shortcuts Regulations Chromecast Sales Enterprise Content Management Bitcoin Transportation Computer Fan MSP Antivirus Personal Rootkit Accountants Cryptomining Point of Sale Colocation Uninterrupted Power Supply Microchip Supply Chain Management Thought Leadership Credit Cards Windows 8 Benefits Password Manager User PowerPoint Windows Media Player Monitoring Workers Password Management IT service Batteries FENG Digitize Multi-Factor Security Monitor Windows 8.1 Search Engine IBM Twitter Windows Server 2008 R2 Tablet Smart Technology Business Mangement Managing Stress Flash Customer relationships NIST Domains Email Best Practices Streaming Media IT Assessment Smart Tech Manufacturing Trending Reputation Cameras Software Tips Tech Support IaaS Supercomputer Addiction Maintenance Amazon Content Managed IT Service Recycling Bloatware Security Cameras Techology Sync Laptop Computer Tips Emails Virtual CIO Wiring OneDrive Practices Biometric Security Customers Peripheral Cache Amazon Web Services Audiobook Tablets Using Data Two Factor Authentication Criminal Entrepreneur Touchpad Digital Security Cameras Netflix Safe Mode

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code