Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Case Analysis Dilnoza

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

GAM / IT / FILM 228 Ethics in Gaming and Cinema

Case Analysis Template


Name: Dilnoza
Case title:

Answer EACH question below by integrating material from the module into
the responses.

Section I. Recognize an Ethical Issue

Provide a brief description of the ethical issue, the specific harms, and the
stakeholders connected to the issue. Be sure to use concepts and principles
from the module in your response.

The article's ethical issue is on the use of mobile device forensic tools
(MDTFs) by law enforcement to get beyond smartphone encryption,
especially when it comes to criminal or national security investigations.
When these techniques are utilized improperly or without sufficient
protections, there is a unique risk of privacy and civil liberties being violated.
This is particularly true when private corporations are under pressure to
install "backdoors" in their products. Additionally, there's a chance that these
instruments end up in the hands of non-democratic regimes, who might use
them for repression and spying. Law enforcement organizations like the FBI,
tech firms like Apple, people whose privacy is in jeopardy, and the general
public that depends on safe technologies are the main stakeholders.
This problem involves striking a compromise between individual rights
(deontology, respect for privacy and autonomy) and national security
(utilitarianism, maximizing community safety). The level to which privacy can
be violated by law enforcement for security reasons raises ethical concerns,
as does the management of supervision and openness to prevent misuse.

Section II. Get the Facts

Based on the facts provided in the case and your own independent research,
identify the factual claims that are pertinent to the case analysis and the
facts that are not known. Responses should have evidence of research.

The factual assertions listed below are relevant to the case study:

1. 1.FBI Gains Approach to Shooter's Phone: Two days following the


attempted assassination at a Trump rally, Thomas Matthew Crooks'
phone was successfully obtained by the FBI. The way the phone was
accessed, though, was kept a secret.
2. Law enforcement Use of Cellebrite: Almost all police departments
across the nation have access to Cellebrite, a popular mobile forensic
tool, for data extraction and phone unlocking. It is one of the methods
used by law enforcement to get beyond phone security. 3. Advanced
Methods at FBI Quantico: The field agents in Pennsylvania were not
able to access the phone through the FBI lab in Quantico, Virginia,
which employed more sophisticated methods.

3. Widespread Use of MDTFs: Mobile device forensic tools (MDTFs) are


available to more than 2,000 law enforcement agencies in all 50
states. Modern phone unlocking is made especially easy using the
pricey but efficient gray key tool.
4. Earlier FBI-Apple Disputes: The FBI tried to get Apple to support in
unlocking suspects' phones in situations such as the Pensacola and
San Bernardino massacres. Citing privacy concerns and possible
security implications for all users, Apple declined in both situations.
5. Unlocking Phones with Outside Assistance: Although it was not formally
verified, the FBI in the San Bernardino case ultimately was able to
activate the phone with the assistance of outside parties, most likely
Cellebrite. In a similar vein, the FBI unlocked the phones in the
Pensacola case without Apple's help.

Phone Access Methods: To unlock phones, law enforcement might employ


brute-force tactics or flaws in phone software. The strength of the passcode
determines how long this will take.

The facts that are not known:

1. The precise process by which the FBI unlocked Crooks' phone.


2. What information was discovered on the phone following its access.
3. Whether outside suppliers, such as Cellebrite, were engaged in this
particular instance.

Section III. Identify, Evaluate, and Recommend a Course of Action

Identify and evaluate alternatives for acting, frequently referencing ethical


principles covered in the module. Be sure to use specific and direct reference
to module materials with proper citation (either paraphrase or direct quotes).
The analysis should conclude with a recommendation for a specific course of
action.

Alternative1:
Continue Using MDTFs Without Making Them Public the FBI might keep
utilizing Cellebrite and Gray key without using its phone access methods
public. The FBI has demonstrated the increasing efficacy of MDTFs by using
similar techniques to crack encrypted devices in situations like San
Bernardino, as mentioned in the passage. Ethical Evaluation: Although
maintaining these technologies' secrecy is in line with national security
considerations, government agencies also have an ethical duty to be
transparent and accountable to the public. Risks: In the absence of
openness, the general population is oblivious to possible misuses of these
instruments or weaknesses in their own gadgets.

Alternatives 2: Make IT Companies Construct Backdoors This was suggested


in the San Bernardino case, when Apple gave in to FBI struggle to install a
backdoor in its encryption program. Apple declined, saying that developing a
tool of that kind would compromise user security. Ethical Analysis:
Compelling computer corporations to jeopardize their security might shield a
small number of individuals (in situations involving national security), but it
would expose a large amount of data, violate user privacy, and increase the
possibility of abuse.
Alternative 3: Enhance Legal Monitoring The continuous clash between law
enforcement's demands and privacy is mentioned in the chapter.
Implementing better legal monitoring and openness, such as mandating law
enforcement to follow specific protocols, could balance these needs.

Ethical Assessment: By addressing the ethical issues of data extraction and


monitoring, this strategy ensures that law implementation operates within
the bounds of the law and respects both privacy and security. Suggestion
Although tools like Cellebrite are helpful, the paragraph emphasizes that
their usage should be weighed against ethical factors about privacy and legal
accountability. The passage suggests that the ideal course of action would
be to increase legal control and clarity in order to stop misuses while
protecting the ability for law enforcement to obtain the data they need in
critical situations.

Work cited
It’s never been easier for the cops to break into your phone
Valle
https://www.theverge.com/24199357/fbi-trump-rally-shooter-phone-thomas-
matthew-crooks-quantico-mdtf

You might also like