Government Surveillance and Data Protection

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What triggered the FBI's request to Apple for access to an iPhone?

  • A data breach at Apple
  • An organized cybercrime
  • A hacking incident
  • The 2016 terrorist attacks in Bernardino (correct)

Why did Apple refuse the FBI's request to modify their operating system?

  • Due to legal restrictions
  • To prevent unauthorized access
  • To protect the right to privacy (correct)
  • They lacked the technical capability

What was the outcome for the FBI after their case was almost taken to court?

  • Apple provided the necessary data
  • The FBI found a vulnerability to crack the phone (correct)
  • The court ordered Apple to comply
  • The FBI dropped the case

Which country experienced a combination of invasive surveillance and lack of adequate data protection in 2013?

<p>Kenya (D)</p> Signup and view all the answers

Who documented the crackdown on civil society in Kenya?

<p>Peace Brigades International (D)</p> Signup and view all the answers

What are human rights defenders in Kenya advocating for to limit state surveillance?

<p>Ratification of Kenya’s first data protection law (A)</p> Signup and view all the answers

What security measures do the human rights defenders encourage to protect privacy?

<p>Usage of encryption and anonymity tools (A)</p> Signup and view all the answers

What impact could the court case involving the FBI and Apple have had on society?

<p>Highlighting the risks of weakening encryption (A)</p> Signup and view all the answers

Why was the FBI case considered a legal setback in privacy terms?

<p>The FBI found a vulnerability to crack the phone (D)</p> Signup and view all the answers

What actions were taken by the government against Human Rights defenders in Kenya?

<p>Office raids, computer hacks, and phone tapping (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Related Documents

More Like This

C.I.A. Leaked Data on Surveillance Quiz
5 questions
US Government Surveillance and Data Quiz
122 questions
Government Surveillance Laws and Technology
33 questions
Use Quizgecko on...
Browser
Browser