Eric Adom ISSC641 W7 Discussions

docx

School

American Military University *

*We aren’t endorsed by this school

Course

641

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

3

Uploaded by Oscarpinto100

Report
1 Hello everyone, Write a one-paragraph summary report of the podcast . The podcast explored the profound impacts new technologies have had and how it has played with the existing law regarding data transmission. The issues and challenges presented by VoIP communication were particularly emphasized as they are often different from those of traditional voice calls. It created many clear issues including those that interfered with the streamlining of laws that suit developments in telecommunications and communication between interests of the government and individual privacy rights. Write a second paragraph discussing your own thoughts on the podcast . I like the fact that the podcast has a huge scope on the discussed subject matters. However, I believe CALEA should be highlighted as it is the most substantial one among them. In my project paper for this class, I took an in-depth look at the issues surrounding how such laws impact the government's proposal of how this law would fare in real life. Nonetheless, the podcast's coverage of CALEA failed to comprehensively talk about the regulations which are now clearly outdated and the tool's limited scope. The existence of fresh businesses and industries, which makes some of the CALEA aspects immaterial, has faced legal restrictions and confinements being non-evidence-competent within given timeframes. However, the podcast asserted merely that the entire burden for CALEA compliance fell on telecommunication companies. In fact, telecom providers got involved in finding what was needed, receiving their final accounting from the FBI afterwards. A dense virtual topic of CALEA, in addition to the disparity of interests between the government and private parties, adds to its complexity issue. What do you feel about the government's wiretapping activities? Why or why not?
2 I agree consideration should remain to wiretapping powers enforced by the state. Under the social contract, there is a level of engagement between the people and the government, who, in turn, maintain law and order to justify payments for the conduct of governance. Only when some rights are given up, can an administration maintain the ability to run the country properly. The aspect of security versus privacy will depend seriously on the existing perceptions of risk. Following 9/11, during such incidents, people unanimously tend towards making the government possess a wide range of powers for wiretapping and telecommunication surveillance (Du Toit et al., 2023) . Yet, over time the fear goes away and people are not willing to that much sacrifice for their privacy. While being responsible for safety and security issues, at the same time, it is important to protect the privacy rights of all. Mass surveillance is a priority in to fight against crimes, however, we must find a way to protect ourselves without disrespecting the privacy of other people. Should the government require data collection and retention? Explain. From a general perspective, I agree government should store the data in a way that it is easy for them to access it when they want, same as businesses must retain their records as required by the law. But such a process must be regarded as just. Particularly, I have no idea what is reasonable in retention—it depends on many factors like costs, capabilities in handling data, etc. and the above-mentioned need for vast storage space for the produced data. The data raised by such data is mind-blowing, becoming the most burning topic in the process of its feasibility. The rise of data as another one of the industries' sub-categories introduces more complexity as well brokers of data and social media platforms use it to make money from the case (Runeson et al., 2022) . Grasping matter, the main issue of the data recording and retention must also be considered. It might cover data type definitions for data retention purposes, setting
3 up retention periods and privacy risk limitations, for example, on the "collection level" of personal data, to protect people's private information. References Du Toit, L., Meir, E., Noort, E., & Palaver, W. (2023). Introduction to the Special Issue “Nonviolence and Religion”.   Religions ,   14 (3), 403. Runeson, P., Olsson, T., & Linåker, J. (2021). Open Data Ecosystems—An empirical investigation into an emerging industry collaboration concept.   Journal of Systems and Software ,   182 , 111088. York, D., & Zar, J. (2008). Blue Box #85: Internet phone calls and terrorism, Georgia Tech report on Emerging Cyber Security Threats, phone jamming, 802.1X-REV, 802.1AE, VoIP security news and more. On  Blue Box: The VoIP Security Podcast  [MP3].
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help