discussion question on law

discussion question on law

I need 100-250 word for each include references

1. In Chapter 9, Delbert describes India’s struggle to respond to pervasive cyber attacks and consideration of offensive cyber operations. Find an example of offensive cyber attacks that have been deployed. What is the rationale for the deployment of this tool? Do you believe it is the appropriate response? Explain.

2. In Mitchel Broussard’s article, the author reported that a federal court authorized a search warrant to search a suspect’s phone. However, rather than simply allowing law enforcement access to the device, this warrant required the suspect to utilize Apple’s Touch ID function by placing her finger onto the device to provide her fingerprint.

Is there a difference between the court granting access to a device versus requiring the suspect to aid in the access of the device? What are the distinctions between these two searches? Are there differences in the right to privacy expectations between these two?

Answer preview

Part 1- Offensive Cyber Attack

Several countries have sought to counter the issue of cyber-attacks and threats using one of the technological approaches identified as the offensive cyber-attack. Australia is one of the countries that has deployed the offensive cyber-attack to Islamic states such as Daesh in Iraq and Syria. According to the Australian government, the offshore cybercriminals have been targeting the Australian’s networks and military operations causing the risk of access deniability of their systems (Waters, 2008). I, therefore, believe..

(360 words)
Scroll to Top