How can I earn money with StudyBay? Top writers
Order Assignment
This order has already been completed on Studybay
On Studybay you can order your academic assignment from one of our 45000 professional writers. Hire your writer directly, without overpaying for agencies and affiliates! Check price for your assignment
15 total offers received. Writer hired: chelahmilcah

ASSIGHMENT1

Please I need 2 pages for each TOPIC AND 4 REFERENCES FOR EACH TOPIC. Use the resources provided to each topic as references and add more please.... Use recent references from 2013 to 2016 PLEASE KEENLY FOLLOW INSTRUCTIONS AND ANSWER ALL QUESTIONS TO EACH DISCUSSION TOPIC. EACH TOPIC GOES WITH ITS REFERENCES Discussion Activity #5 Course Objective: Assess the policy, legal, and personal components related to identity management, theft, and anonymity. The class discusses current national and international concerns regarding the proliferation of identity theft. Topic 1: Drones and Unmanned Aircraft Privacy Issues There are many news reports about military use of robotic drones, often referred to as unmanned aerial vehicles (UAVs), or unmanned aircraft systems (UAS). These remote control drones are now being used for border security, and also for US civilian surveillance, by law enforcement and by other citizens. Read the article found in your reserved readings entitled “Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications”, and consider the good and bad effects of policy to regulate mobile devices and data for surveillance of US citizens. For national security reasons, should government license civilian operators or allow them to remain anonymous? Describe several possible effects on national security if a robotic drone purchased by a civilian is outfitted with weapons. Should the government set a maximum and minimum altitude outside of which civilian robotic drones cannot fly? To protect privacy, should the government set a restrictions on use of cameras by drones? Background sources - add more to these through your own research -- 1. see Subtitle B: Unmanned Aircraft Systems in last year's FAA Reauthorization Act.
 2. Integration of Drones Into Domestic Airspace: Selected Legal Issues [2013 - Congressional Research Service] 3. FBI Fesses Up: We’ve Used Domestic Drones 10 Times - < http://www.slate.com/blogs/future_tense/2013/07/26/fbi_admits_in_letter_to_rand_paul_that_it_s_used_domestic_drones_10_times.html > 4. The Washington Times, November 7, 2013 -- Invasion: 7,500 Drones in U.S. Airspace within 5 years, FAA Warns http://www.washingtontimes.com/news/2013/nov/7/faa-chief-announces-progress-drone-regs/ Topic 2: Privacy and Data Encryption - modified What are possible consequences for privacy or safety of civilians if data transmissions or video data that are gathered by surveillance (private or government) are transmitted through the Internet in unencrypted format, or if that data or related meta-data are stored in the cloud indefinitely? Who should own or monitor data and pictures of YOU that are gathered by surveillance? Should the private sector own the meta-data about you that are collected without your knowledge? Background: 
1. Want NSA Attention? Use Encrypted Emails [2013 - encryption can actually draw scrutiny by governments / agencies that cannot tolerate citizen privacy]

 2. The Great Firewall of China, Reinforced, Prevents Encryption [2012 - China clearly fears private, encrypted communication by its citizens]

 3. BlackBerry to Allow 'Indian Government to Monitor Messages' [2013 - Governments that cannot tolerate privacy will partner with corporations to undermine encryption] 

4. Don't Get Your Sources in Syria Killed [2013 - Committee to Protect Journalists. A visceral real world example: Encryption is now being recommended to shield sources in Syria, Egypt, and elsewhere from surveillance technology manufactured in the west.] Topic 3: Inexperienced Internet Users Are inexperienced Internet users at a higher risk for experiencing identity theft, or is everyone now equally vulnerable? Support your opinion. 1) Explain specifically how end-user tracking and recording technologies may either increase or reduce cybersecurity risks for less knowledgeable and inexperienced users when using the Internet, or when shopping at a brick-and-mortar establishment 2) Describe the mechanics of specific kinds of attacks (e.g. phishing, sites serving malware) that average Web users are subjected to, and that less-sophistical users may be more tempted to fall for.
Please I need 2 pages for each TOPIC AND 4 REFERENCES FOR EACH TOPIC. Use the resources provided to each topic as references and add more please.... Use recent references from 2013 to 2016 PLEASE KEENLY FOLLOW INSTRUCTIONS AND ANSWER ALL QUESTIONS TO EACH DISCUSSION TOPIC.
Related Materials
Assignment ID
56281
Discipline
Type
CREATED ON
October 31, 2016
COMPLETED ON
November 2, 2016
Price
$40
This order has already been completed on Studybay
On Studybay you can order your academic assignment from one of our 45000 professional writers. Hire your writer directly, without overpaying for agencies and affiliates!
Check price for your Coursework
Latest reviews for chelahmilcah
Bentleynana1
November 30, 2016
Bentleynana1
thanks
within beauty
November 22, 2016
within beauty
great work !!!
homidi538
November 21, 2016
homidi538
I got 79/100, this is disappointing given the amount I paid.