Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

Do you remember the controversy concerning Apple and the FBI? It was a case that swept the country and encroached on unprecedented ground. The FBI demanded that Apple release information on how to unlock an encrypted iPhone that was connected to a terrorist attack, but Apple chose to vehemently refuse the FBI, stating that it would be endangering the entirety of their consumer base by doing so. The FBI threatened Apple with lawsuit after lawsuit, but in the end they were able to unlock the device without Apple’s help.

The popular trend of providing mobile devices with encryption has led to increased complications during investigations, and Comey chose to clarify the Bureau’s stance on the privacy of the typical American citizen. While there has to be a reasonable expectation of privacy in houses, vehicles, and even mobile devices, Comey claims that these expectations can reasonably be revoked in a court of law. He says: “With good reason, the people of the United States--through judges and law enforcement--can invade our public spaces."

This statement prompts yet another question: how does a personal device qualify as a public space? According to Comey, a mobile device actually can be considered a public space: “Even our memories are not absolutely private in the United States,” Comey said. “Even our communications with our spouses, with our lawyers, with our clergy, with our medical professionals are not absolutely private. Because a judge, under certain circumstances, can order all of us to testify about what we saw, remembered, or heard. There are really important constraints on that. But the general principle is one that we’ve always accepted in the United States and has been at the core of our country: There is no such thing as absolute privacy in America. There is no place outside of judicial authority.”

Additionally, Comey made sure to point out that the FBI has no business telling American citizens how to live and govern themselves, and that the tech companies don’t either. You might recall the open letter that many tech companies addressed to the the FBI last April, demanding that the government cease issuing mandates that would require tech companies to provide encryption keys for their software.

It’s natural that these Silicon Valley giants don’t agree with Comey. In fact, there are even those amongst his peers who don’t believe he’s right on the matter. Nuala O’Connor, the President and CEO of the Center for Democracy & Technology, as well as the first Federal chief Privacy Officer for Homeland Security, is one of them. She says, “He could not be more wrong on encryption.”

O’Connor is hardly the only one of his contemporaries who disagree with Comey. Two other notable former government officials had something to say about the FBI’s stance on encryption, and they both spoke at the RSA Cybersecurity Conference. Former Department of Homeland Security Secretary Michael Chertoff claims that forcing Apple to provide software that can hack into an encrypted iPhone would be like “creating a bacterial biological weapon.” Similarly, Mike McConnell, a former Director of National Intelligence, claimed that “ubiquitous encryption is something the nation needs to have.”

This isn’t a problem that only technology companies have to deal with. It’s something that all users of smart technology (and most technology in general) have to endure. After all, any rulings in favor of the FBI’s stance could be detrimental to user privacy. For example, in the case of Apple creating a software that can crack their iPhone’s encryption, what would happen if this software were stolen and exploited by hackers? It would become a major problem, just like the NSA’s surveillance vulnerabilities that were stolen and sold on the Black Market just this past summer.

In light of Comey’s response, what are your thoughts on the FBI’s stance on encryption? Do you think that government agencies have the right to access devices, despite invading the privacy of its citizens? Do you think that this “greater good” argument holds water? Share your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Windows 10 Passwords Chrome Gadgets Virtualization Social Media Saving Money Holiday Tech Term Managed IT Services Microsoft Office Automation Managed Service Operating System Artificial Intelligence Computers Facebook Cybercrime Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Health Networking IT Support Spam Remote Office 365 Alert Telephone Systems Covid-19 Information Information Technology Managed Service Provider Social Engineering Mobility BDR Recovery Employer-Employee Relationship Bandwidth Router Remote Monitoring Big Data Law Enforcement App History Mobile Computing Password Money Application Encryption Human Resources Applications Data Breach Private Cloud Blockchain How To Managed IT Office Tips Paperless Office Training Apps VPN Data Storage Patch Management Remote Computing Mobile Office Government Avoiding Downtime Data Security Flexibility Marketing Wireless Bring Your Own Device WiFi Data Management IT solutions Work/Life Balance Entertainment Gmail Website Budget Settings Infrastructure Voice over Internet Protocol Vulnerability Windows 7 Word Two-factor Authentication Google Drive Servers Mouse HaaS User Error Meetings Vendor Save Time Risk Management Hacker Managed Services Staff Software as a Service Display Telephone System Machine Learning The Internet of Things Cleaning Lithium-ion battery Connectivity Remote Work Employee/Employer Relationship USB Conferencing RMM End of Support Firewall Education Physical Security Scam Safety Virtual Reality Sports HIPAA Apple Redundancy Social Vendor Management Data Protection Keyboard Workplace Strategy YouTube Charger Comparison Net Neutrality Black Market CES Help Desk Compliance OneNote Computer Care Printing Wearable Technology Retail Current Events Hard Drives Content Management Virus Document Management Telephony Business Technology Instant Messaging Solid State Drive Robot Wireless Technology Samsung Access Control Excel Unified Threat Management How to Downtime Managed Services Provider Computer Accessories Virtual Assistant Biometrics Virtual Desktop Value Authentication Database Data storage Electronic Medical Records Remote Workers Automobile Spam Blocking DDoS Processor Hiring/Firing Update Printer SharePoint Computing Infrastructure Going Green Bluetooth Hard Drive Google Docs Customer Service Identity Theft Battery Environment Shadow IT Computing Legal Business Intelligence Fax Server IT Consultant Internet Exlporer Worker Audit Augmented Reality SaaS IT Management Fraud Humor Digital Signage Botnet PDF Remote Worker IT Plan Network Congestion Cryptocurrency Proactive IT eWaste Unsupported Software Best Practice Procurement GDPR Hosted Computing Social Network WIndows 7 Experience Scalability Software Tips Shortcut Supercomputer Wireless Internet Online Shopping Investment Employee/Employer Relationships Business Owner Sync Emails File Sharing Employees Cost Management Camera Windows 365 Social Networking NarrowBand Inventory Specifications ISP Search Wire Video Conferencing Evernote ROI Two Factor Authentication Bitcoin Travel Shortcuts iPhone Netflix Sales Root Cause Analysis Printers Point of Sale Personal User Millennials Cryptomining PowerPoint Windows Media Player Running Cable HBO Knowledge Smart Office Supply Chain Management Memory Music Wireless Charging Batteries Skype Files Monitoring Data loss Virtual Private Network Windows 8.1 Chromecast Digitize Managing Stress Workforce Outlook Leadership Troubleshooting Cables Windows Server 2008 R2 Uninterrupted Power Supply Cameras Start Menu Colocation Customer relationships Screen Mirroring Project Management Email Best Practices Loyalty Nanotechnology IT Assessment Science Telecommuting Manufacturing Frequently Asked Questions Monitor Books Cortana Digital Signature Managed IT Service Security Cameras Mobile Windows 10s Computer Tips Distributed Denial of Service Cast Warranty Virtual CIO Customer Relationship Management OneDrive Biometric Security Tip of the week Reputation webinar HVAC Peripheral Analyitcs Streaming Media Emergency Google Apps Programming Tech Support Employer Employee Relationship Analysis Using Data Printer Server Content Professional Services Public Cloud Digital Security Cameras Techology Administrator Laptop Assessment Devices Copiers 5G Windows Server 2008 Customers Enterprise Content Management Quick Tip Accountants Smartwatch Audiobook Tools Antivirus MSP Ergonomics Microchip Touchpad Television Thought Leadership Development Windows 8 Credit Cards OLED IT service Password Management PCI DSS Password Manager Virtual Machine Fiber Optics Multi-Factor Security Employee Politics Advertising 2FA Search Engine Public Computer Twitter Messaging Tablet Cabling Regulations Domains NIST Policy Notifications Transportation Business Mangement Hypervisor Rootkit Smart Tech Trend Micro Trending Computer Fan Dark mode IaaS Maintenance Addiction SMS Amazon Default App Consultant Relocation Workers Procedure Bloatware Benefits Recycling Saving Time Practices Shopping Google Search Analytics FENG Wiring dark theme Video Games IBM Cache AI Tablets Amazon Web Services IT Infrastructure Best Available Bing Worker Commute Flash Safe Mode FinTech Entrepreneur Smart Technology Criminal

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code