“Building a ‘backdoor’ to the iPhone: an ethical dilemma”
QUESTION 1 (a/b) – On digital traces
In reference to the case “Building a ‘backdoor’ to the iPhone: an ethical dilemma”: The case discusses reasons why the FBI wanted to examine the data stored in the terrorists’ iPhones. They refer to digital traces (even if they don’t use this term, which you can easily Google). (A) From a computer forensics standpoint, provide two examples of digital traces stored in the terrorists’ device (iPhone) that could be relevant to the then ongoing investigation. (B) What are other everyday use devices with the ability to store (and potentially share with third party) digital traces? Please list and briefly discuss at least two. [30 points] Note: In total, your answer should not exceed 15 lines. Please write one para per answer.
QUESTION 2 – On use of technologies that deviate from the purpose they were designed for
In reference to the case “A $10 million question and other cybersecurity-related ethical dilemmas amide the COVID-19 pandemic”: Identify non healt-related positive and negative uses of analytics capabilities applied to data collected with digital contact tracing apps (one positive and one negative is enough). [30 points] Note: In total, your answer should not exceed 15 lines. Please write one para per answer.
Sample Solution
UESTION 1: Digital traces stored in the terrorists' iPhones
- Location data: The terrorists' iPhones would have stored location data, such as GPS coordinates and cell tower IDs. This data could be used to track the terrorists' movements and identify places they visited.
- Communication data: The terrorists' iPhones would have stored communication data, such as call logs, text messages, and email messages. This data could be used to identify the terrorists' associates and uncover their plans.
Full Answer Section
QUESTION 2: Everyday use devices with the ability to store digital traces- Smart home devices: Smart home devices, such as thermostats, security cameras, and voice assistants, can store data about users' activities and routines. This data could be used to track users' movements and identify their habits.
- Wearable devices: Wearable devices, such as smartwatches and fitness trackers, can store data about users' health and fitness. This data could be used to track users' movements and identify their physical activities.
- Browsing history
- Search engine queries
- Social media activity
- Online purchases
- Financial transactions
- Gaming activity
- Fitness data
- Sleep data