Chapter 7-Activity 6
Chapter 7-Activity 6
Sebastian
COURSE/BLOCK: BS-Architecture 1A
Surveillance metadata is details about data pertaining to the actions of an observed party. metadata
summarizes basic information about data, which can make categorizing, finding, and working with
particular instances of data easier. In the case of surveillance – especially on the part of government
agencies -- metadata not only facilitates categorizing and retrieving content but provides information on
its own and may also be used to legitimize collecting and examining content. Surveillance metadata is
usually associated with electronic communication channels, such as phone, email, and social media.
Data is collected through wiretapping and other electronic surveillance methods, including government
Trojans, wiretap Trojans, and keyloggers. Typically, surveillance metadata is gathered by government
or law enforcement pertaining to a particular suspect or person of interest. Metadata related to a phone
call, for example, include the date, time, call duration, calling/contacted the party, and, in the case of
mobile phones, location. The conversation itself is not metadata but content, as is, for example, an
email message.The point that collectors of surveillance metadata, such as the National Security
Agency (NSA), emphasize to justify continued monitoring is that they record only metadata and not
content. However, metadata has been shown to be quite revealing. Furthermore, according to
whistleblower Edward Snowden, the NSA sometimes collects content as well as metadata, and the
agency has access to all email content.Metadata has become a household word since Snowden, a
former NSA employee, reported that the agency’s PRISM program was monitoring United States
citizens. Snowden revealed that the NSA collects metadata from many communication sources
including
● Facebook data.
● App data and GPS locations from cell phones. Snowden also reported that the NSA
surveillance network and, in doing so, subverted the privacy rights of individuals.
https://www.whatis.techtarget.com/definition/surveillance-metadata
What should Sarah do? Choose on the three individual ethical theories mentioned (intuitionism,
utilitarianism, or universal principle), state why you chose that theory, and answer the question
based on your theory chosen. (10 pts.)
As an individual and the one that witnessed the situation, I think that what Sarah did is not
ethical. I can see why Sarah did that, It is because of the angriness that she feels about what
did his boyfriends did to her. Sarah can express her emotions but not in that manner posting
the pics on social media and taking screenshots of the conversations of the girl with his
boyfriend. I could advise her that she must talk with his boyfriend first about why he did it to
her. Totally, the wrong thing in that situation is the boy. He is immature knowing that he has a
girlfriend already and has some flirts with another girl as the girl didn't know that the boy that
she is having with has already a relationship. I can conclude that it is Utilitarianism. is not
always possible to predict the outcome of an action. Bowen points out that “consequences are
too unpredictable to be an accurate measure of the ethics of situations.” In other words, the
consequences of actions can be highly volatile or impossible, even, to predict. Using outcomes
as a measurement of ethics will not, therefore, provide an accurate way for professionals to
measure whether decisions are ethical. Professionals must be able to evaluate decisions and
choices with concrete ethical guidelines instead of hoping that certain outcomes will result in
them having made an ethical choice
SAQ 11: Online Safety Tips
1. Narrate a family’s, friend’s, or your own experience of cyberattack and explain how you fought of
that attack or what could your family/friend/or you have done to prevent that attack. (10 pts.)
Cyberattack
Based on my experience, Cyberattack is one that must have to pay close attention especially if
you have some business. Like for me. I have my own business which is the Piso Wifi wherein I
realize that my security access was not that strong enough. I just know that my piso wifi has
been hacked by someone by checking it that the I.P address has been erased and I cannot
access with my piso wifi even I reconnect with the server and even I type the password, I
cannot even have the glance to connect with it. So I decided to erase all my configurations with
my own business which is the piso wifi and bring it to an experienced technician to install some
security and he advised that I must keep my software and systems up to date, install some
firewalls and the password itself must be strong enough that it is not the same as the password
you entered before.