Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

Do you remember the controversy concerning Apple and the FBI? It was a case that swept the country and encroached on unprecedented ground. The FBI demanded that Apple release information on how to unlock an encrypted iPhone that was connected to a terrorist attack, but Apple chose to vehemently refuse the FBI, stating that it would be endangering the entirety of their consumer base by doing so. The FBI threatened Apple with lawsuit after lawsuit, but in the end they were able to unlock the device without Apple’s help.

The popular trend of providing mobile devices with encryption has led to increased complications during investigations, and Comey chose to clarify the Bureau’s stance on the privacy of the typical American citizen. While there has to be a reasonable expectation of privacy in houses, vehicles, and even mobile devices, Comey claims that these expectations can reasonably be revoked in a court of law. He says: “With good reason, the people of the United States--through judges and law enforcement--can invade our public spaces."

This statement prompts yet another question: how does a personal device qualify as a public space? According to Comey, a mobile device actually can be considered a public space: “Even our memories are not absolutely private in the United States,” Comey said. “Even our communications with our spouses, with our lawyers, with our clergy, with our medical professionals are not absolutely private. Because a judge, under certain circumstances, can order all of us to testify about what we saw, remembered, or heard. There are really important constraints on that. But the general principle is one that we’ve always accepted in the United States and has been at the core of our country: There is no such thing as absolute privacy in America. There is no place outside of judicial authority.”

Additionally, Comey made sure to point out that the FBI has no business telling American citizens how to live and govern themselves, and that the tech companies don’t either. You might recall the open letter that many tech companies addressed to the the FBI last April, demanding that the government cease issuing mandates that would require tech companies to provide encryption keys for their software.

It’s natural that these Silicon Valley giants don’t agree with Comey. In fact, there are even those amongst his peers who don’t believe he’s right on the matter. Nuala O’Connor, the President and CEO of the Center for Democracy & Technology, as well as the first Federal chief Privacy Officer for Homeland Security, is one of them. She says, “He could not be more wrong on encryption.”

O’Connor is hardly the only one of his contemporaries who disagree with Comey. Two other notable former government officials had something to say about the FBI’s stance on encryption, and they both spoke at the RSA Cybersecurity Conference. Former Department of Homeland Security Secretary Michael Chertoff claims that forcing Apple to provide software that can hack into an encrypted iPhone would be like “creating a bacterial biological weapon.” Similarly, Mike McConnell, a former Director of National Intelligence, claimed that “ubiquitous encryption is something the nation needs to have.”

This isn’t a problem that only technology companies have to deal with. It’s something that all users of smart technology (and most technology in general) have to endure. After all, any rulings in favor of the FBI’s stance could be detrimental to user privacy. For example, in the case of Apple creating a software that can crack their iPhone’s encryption, what would happen if this software were stolen and exploited by hackers? It would become a major problem, just like the NSA’s surveillance vulnerabilities that were stolen and sold on the Black Market just this past summer.

In light of Comey’s response, what are your thoughts on the FBI’s stance on encryption? Do you think that government agencies have the right to access devices, despite invading the privacy of its citizens? Do you think that this “greater good” argument holds water? Share your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Managed IT Services Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Save Money Cloud Computing Data Recovery Office Server Windows 10 Passwords Tech Term Chrome Gadgets Virtualization Saving Money Holiday Social Media Managed IT Services Microsoft Office Automation Managed Service Operating System Artificial Intelligence Computers Facebook Cybercrime Internet of Things Hacking Wi-Fi BYOD Mobile Device Management Networking IT Support Health Managed Service Provider Remote Spam Alert Office 365 Covid-19 Telephone Systems Information Technology Information BDR Social Engineering Mobility Bandwidth Recovery Employer-Employee Relationship Router Law Enforcement Big Data Remote Monitoring Data Breach Mobile Computing Password Money App History Application Encryption Applications Human Resources Remote Computing Data Storage Patch Management Private Cloud Mobile Office Managed IT Apps Office Tips Training Blockchain Paperless Office VPN How To Government Two-factor Authentication Avoiding Downtime Infrastructure Voice over Internet Protocol Mouse HaaS Vulnerability Windows 7 Word Flexibility Marketing Bring Your Own Device Data Management Servers Work/Life Balance WiFi IT solutions Entertainment Website Budget Wireless Data Security Gmail Google Drive Settings Virtual Reality Apple Conferencing Social User Error Save Time Scam Vendor Meetings Data Protection Managed Services Display Cleaning Vendor Management Risk Management Hacker Employee/Employer Relationship End of Support USB RMM The Internet of Things Physical Security Lithium-ion battery Education Safety Staff Software as a Service Telephone System HIPAA Sports Machine Learning Redundancy Firewall Keyboard Connectivity Remote Work SaaS Hiring/Firing Identity Theft YouTube Black Market Procurement Net Neutrality Workplace Strategy Help Desk Network Congestion eWaste Document Management Printing Augmented Reality Solid State Drive Fraud Wireless Technology Downtime Business Intelligence Virus How to Remote Worker Audit Unified Threat Management Worker Managed Services Provider Data storage IT Management Cryptocurrency Computer Accessories Wearable Technology Automobile Database Botnet Retail Hard Drives Remote Workers Instant Messaging IT Plan Robot Computing Infrastructure Comparison Excel Processor Going Green CES Biometrics Unsupported Software Printer Virtual Desktop Bluetooth Charger Hard Drive Content Management Business Technology Battery DDoS Access Control Compliance Shadow IT OneNote Legal Computer Care Current Events Computing Virtual Assistant SharePoint Telephony Authentication Internet Exlporer IT Consultant Samsung Humor Customer Service PDF Value Environment Update Digital Signage Spam Blocking Fax Server Electronic Medical Records Proactive IT Google Docs Best Practice Mobile Administrator Experience Windows 10s Devices AI IT Infrastructure Tablet Bing Best Available Cast Enterprise Content Management FinTech Domains Scalability Business Owner webinar Accountants Social Network Emergency WIndows 7 Tip of the week MSP Professional Services Microchip IaaS Public Cloud Thought Leadership Maintenance Employer Employee Relationship Credit Cards Investment NarrowBand Bloatware Password Management Employees Search Assessment Password Manager Employee/Employer Relationships iPhone Multi-Factor Security ISP Windows Server 2008 Windows 365 Tools Search Engine Twitter Video Conferencing ROI Tablets Entrepreneur Shortcuts NIST Sales Television Business Mangement Bitcoin PowerPoint Point of Sale Smart Tech Windows Media Player Personal Files Trending Cryptomining User Addiction Supply Chain Management Shortcut Amazon Chromecast Batteries Cost Management Monitoring Public Computer Recycling Windows 8.1 Practices Digitize Social Networking Colocation Transportation Uninterrupted Power Supply Managing Stress Regulations Wiring Computer Fan Cache Rootkit Amazon Web Services Windows Server 2008 R2 Monitor Safe Mode Cameras Customer relationships Criminal GDPR Email Best Practices Running Cable Workers Hosted Computing IT Assessment Benefits Manufacturing FENG Wireless Internet Online Shopping Memory IBM Managed IT Service Reputation Security Cameras Streaming Media File Sharing Computer Tips Flash Camera Virtual CIO Content Inventory OneDrive Smart Technology Specifications Biometric Security Tech Support Wire Peripheral Techology Evernote Laptop Supercomputer Using Data Customers Travel Software Tips Printer Server Digital Security Cameras Sync Printers Audiobook Emails Copiers Millennials 5G Science Smart Office Quick Tip Wireless Charging Touchpad Smartwatch Ergonomics Virtual Private Network Distributed Denial of Service Politics Netflix Development Customer Relationship Management Advertising Two Factor Authentication Workforce OLED Root Cause Analysis PCI DSS Cables Virtual Machine Analyitcs Knowledge Fiber Optics Programming Music Employee Notifications HBO 2FA Skype Project Management Nanotechnology Messaging Telecommuting Cabling Data loss Policy Cortana Hypervisor Antivirus Leadership Digital Signature Trend Micro Relocation Troubleshooting Outlook Dark mode Start Menu Warranty SMS Default App Windows 8 Consultant Screen Mirroring HVAC Procedure IT service Video Games Loyalty Google Apps Saving Time Worker Commute Analysis Shopping Books Google Search Frequently Asked Questions Analytics dark theme

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code