Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

Do you remember the controversy concerning Apple and the FBI? It was a case that swept the country and encroached on unprecedented ground. The FBI demanded that Apple release information on how to unlock an encrypted iPhone that was connected to a terrorist attack, but Apple chose to vehemently refuse the FBI, stating that it would be endangering the entirety of their consumer base by doing so. The FBI threatened Apple with lawsuit after lawsuit, but in the end they were able to unlock the device without Apple’s help.

The popular trend of providing mobile devices with encryption has led to increased complications during investigations, and Comey chose to clarify the Bureau’s stance on the privacy of the typical American citizen. While there has to be a reasonable expectation of privacy in houses, vehicles, and even mobile devices, Comey claims that these expectations can reasonably be revoked in a court of law. He says: “With good reason, the people of the United States--through judges and law enforcement--can invade our public spaces."

This statement prompts yet another question: how does a personal device qualify as a public space? According to Comey, a mobile device actually can be considered a public space: “Even our memories are not absolutely private in the United States,” Comey said. “Even our communications with our spouses, with our lawyers, with our clergy, with our medical professionals are not absolutely private. Because a judge, under certain circumstances, can order all of us to testify about what we saw, remembered, or heard. There are really important constraints on that. But the general principle is one that we’ve always accepted in the United States and has been at the core of our country: There is no such thing as absolute privacy in America. There is no place outside of judicial authority.”

Additionally, Comey made sure to point out that the FBI has no business telling American citizens how to live and govern themselves, and that the tech companies don’t either. You might recall the open letter that many tech companies addressed to the the FBI last April, demanding that the government cease issuing mandates that would require tech companies to provide encryption keys for their software.

It’s natural that these Silicon Valley giants don’t agree with Comey. In fact, there are even those amongst his peers who don’t believe he’s right on the matter. Nuala O’Connor, the President and CEO of the Center for Democracy & Technology, as well as the first Federal chief Privacy Officer for Homeland Security, is one of them. She says, “He could not be more wrong on encryption.”

O’Connor is hardly the only one of his contemporaries who disagree with Comey. Two other notable former government officials had something to say about the FBI’s stance on encryption, and they both spoke at the RSA Cybersecurity Conference. Former Department of Homeland Security Secretary Michael Chertoff claims that forcing Apple to provide software that can hack into an encrypted iPhone would be like “creating a bacterial biological weapon.” Similarly, Mike McConnell, a former Director of National Intelligence, claimed that “ubiquitous encryption is something the nation needs to have.”

This isn’t a problem that only technology companies have to deal with. It’s something that all users of smart technology (and most technology in general) have to endure. After all, any rulings in favor of the FBI’s stance could be detrimental to user privacy. For example, in the case of Apple creating a software that can crack their iPhone’s encryption, what would happen if this software were stolen and exploited by hackers? It would become a major problem, just like the NSA’s surveillance vulnerabilities that were stolen and sold on the Black Market just this past summer.

In light of Comey’s response, what are your thoughts on the FBI’s stance on encryption? Do you think that government agencies have the right to access devices, despite invading the privacy of its citizens? Do you think that this “greater good” argument holds water? Share your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Smartphones Business Continuity Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Windows 10 Passwords Virtualization Saving Money Gadgets Holiday Tech Term Social Media Chrome Managed Service Managed IT Services Automation Microsoft Office Computers Facebook Artificial Intelligence Operating System Cybercrime Internet of Things BYOD Mobile Device Management Networking Wi-Fi IT Support Health Hacking Spam Information Office 365 Remote Telephone Systems Alert Information Technology Covid-19 Managed Service Provider Router BDR Bandwidth Employer-Employee Relationship Recovery Social Engineering Mobility Remote Monitoring Mobile Computing Law Enforcement Application App Data Breach History Password Money Big Data Human Resources Encryption Applications Blockchain Paperless Office Mobile Office Government Data Storage Patch Management Private Cloud Office Tips Training Managed IT VPN Apps How To Remote Computing Mouse Flexibility HaaS Marketing Avoiding Downtime WiFi Vulnerability IT solutions Entertainment Website Windows 7 Infrastructure Budget Word Voice over Internet Protocol Wireless Servers Bring Your Own Device Data Management Work/Life Balance Gmail Settings Data Security Two-factor Authentication Google Drive HIPAA Sports Redundancy Social Keyboard Telephone System Staff Software as a Service User Error Machine Learning Meetings Remote Work Connectivity Conferencing Scam USB Risk Management Hacker Save Time Vendor Management The Internet of Things Lithium-ion battery Vendor Managed Services Cleaning Display Data Protection Firewall End of Support Employee/Employer Relationship Physical Security Education Virtual Reality RMM Apple Safety Virtual Assistant Network Congestion PDF eWaste Unified Threat Management Authentication Hiring/Firing Computer Accessories Proactive IT Digital Signage Best Practice YouTube Update Black Market Wearable Technology Retail Hard Drives Printer Bluetooth Business Intelligence Instant Messaging Google Docs Procurement Workplace Strategy Identity Theft Excel Net Neutrality Robot Document Management Audit Worker Help Desk IT Management Solid State Drive Biometrics Wireless Technology Virtual Desktop Downtime Printing How to Botnet IT Consultant Augmented Reality IT Plan Data storage Fraud DDoS Automobile Managed Services Provider Humor Remote Worker Unsupported Software SharePoint Database Cryptocurrency Computing Infrastructure Charger Remote Workers Going Green Customer Service Compliance OneNote Computer Care Environment Processor Current Events Comparison Fax Server Telephony Battery CES Samsung Shadow IT Hard Drive Legal SaaS Business Technology Content Management Value Internet Exlporer Computing Access Control Spam Blocking Electronic Medical Records Virus PowerPoint Screen Mirroring Windows Media Player Loyalty Bloatware PCI DSS Virtual Machine User Workforce Books Fiber Optics Employee Virtual Private Network Frequently Asked Questions 2FA Windows 10s Relocation Cables Tablets Messaging Cabling Mobile Cast Entrepreneur Policy Hypervisor Managing Stress Telecommuting Emergency Trend Micro Project Management Tip of the week Video Games Nanotechnology webinar Dark mode Worker Commute Public Cloud Shortcut Cortana Employer Employee Relationship SMS Default App Professional Services Cameras Experience Digital Signature Assessment Cost Management Procedure Saving Time Shopping Google Search Warranty Windows Server 2008 Scalability Social Networking dark theme Business Owner HVAC Google Apps AI IT Infrastructure Tools Bing Analysis Television FinTech NarrowBand Social Network Administrator Running Cable Search Devices Printer Server Enterprise Content Management iPhone Memory Investment Employee/Employer Relationships MSP Accountants Public Computer Employees Windows 365 Credit Cards Transportation ISP Microchip Regulations Thought Leadership Password Management Computer Fan Files Password Manager Rootkit Video Conferencing ROI Bitcoin Shortcuts Sales Chromecast Multi-Factor Security Point of Sale Benefits Science Personal Cryptomining Search Engine Twitter Workers NIST FENG Colocation Business Mangement Supply Chain Management Uninterrupted Power Supply Batteries Smart Tech IBM Monitoring Trending Customer Relationship Management Windows 8.1 Monitor Amazon Smart Technology Digitize Flash Distributed Denial of Service Addiction Recycling Analyitcs Windows Server 2008 R2 Wiring Software Tips Practices Supercomputer Programming Customer relationships Emails Email Best Practices Reputation Amazon Web Services IT Assessment Streaming Media Manufacturing Consultant Sync Cache Analytics Content Safe Mode Criminal Tech Support Managed IT Service Security Cameras GDPR Antivirus Techology Hosted Computing Computer Tips Laptop Netflix Virtual CIO Customers Online Shopping Two Factor Authentication Windows 8 OneDrive Biometric Security Best Available Wireless Internet Audiobook File Sharing Root Cause Analysis IT service Peripheral WIndows 7 Music Using Data Camera HBO Inventory Knowledge Digital Security Cameras Touchpad Specifications Wire Evernote Tablet Copiers 5G Skype Politics Data loss Domains Advertising Quick Tip Travel Millennials Troubleshooting Smartwatch Printers Outlook Leadership Ergonomics Smart Office Maintenance Wireless Charging Development Notifications OLED Start Menu IaaS

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code