“Building a ‘backdoor’ to the iPhone: an ethical dilemma”

Full Answer Section

  QUESTION 2: Everyday use devices with the ability to store digital traces
  1. Smart home devices: Smart home devices, such as thermostats, security cameras, and voice assistants, can store data about users' activities and routines. This data could be used to track users' movements and identify their habits.
  2. Wearable devices: Wearable devices, such as smartwatches and fitness trackers, can store data about users' health and fitness. This data could be used to track users' movements and identify their physical activities.
QUESTION 3: Positive and negative uses of analytics capabilities applied to data collected with digital contact tracing apps Positive use: Analytics capabilities can be used to identify areas where the virus is spreading rapidly. This information can be used to target public health interventions, such as lockdowns and testing campaigns. Negative use: Analytics capabilities can be used to track individuals' movements. This information could be used to target individuals for discrimination or harassment. In addition to the above, here are some other examples of digital traces that could be relevant to a criminal investigation:
  • Browsing history
  • Search engine queries
  • Social media activity
  • Online purchases
  • Financial transactions
  • Gaming activity
  • Fitness data
  • Sleep data
It is important to note that the collection and use of digital traces raises a number of ethical concerns. For example, the collection of data without a user's consent could be considered a violation of privacy. Additionally, the use of data for purposes other than those for which it was collected could also be considered unethical.  

Sample Solution

   

UESTION 1: Digital traces stored in the terrorists' iPhones

  1. Location data: The terrorists' iPhones would have stored location data, such as GPS coordinates and cell tower IDs. This data could be used to track the terrorists' movements and identify places they visited.
  2. Communication data: The terrorists' iPhones would have stored communication data, such as call logs, text messages, and email messages. This data could be used to identify the terrorists' associates and uncover their plans.

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS