You are on page 1of 5

Assignment 1: Information Literacy

Jose Flores
Part 1: Find a Technology Current Event Article

This article discusses topics that involves Privacy, Security and Ethics.
This article was found on the Tech Crunch web site.
Part 2: Summary of Article
The article No, Apple Has Not Unlocked 70 iPhones For Law Enforcement
has topics involving privacy, security, and ethics. There are two particular cases
being brought to our attention in this article. In New York, where the first discussed
case is taking place, Apple is not complying with requests from the FBI to provide
personal information belonging to their iPhone customers even though they have
the tools to do so. The phone in this particular case runs on an IOS 7 platform. For
phones running on an IOS 7 platform and previous, Apple has the capability of
extracting data even if the phones are locked. The second case is in the state of
California. The FBI is trying to get Apple to weaken the security of a device so that
its pass code can be cracked by using brute force. The device is running on an IOS 9
platform. The data on the phone is encrypted and connected to a user defined
password that Apple cannot access. That is the reason the FBI wants Apple to
weaken its passcode security. Apple started securing their devices with password
protected encryption when they released the IOS8. The outcome of these cases
could set a precedence for future public policy and law regarding privacy, security
and ethics in the world of technology.
Part 3: Two Additional Internet Articles
Keywords Used to Search: Apple Has Not Unlocked 70 iPhones
Search Engines Used: Yahoo and Google
Comparing the two search engines, I found that using Google was faster and more
direct to the keywords I used. Unlike the Yahoo search engine where it had a bunch
of ads for selling unlocked iPhones, the Google search engine brought us to the
main article I had read with other relating articles right below it. Googles search
engine worked better in this case opposed to Yahoo.
1

Assignment 1: Information Literacy


Jose Flores
Part 4: TRAAP Your Sources
1. The article was written on Jan. 26, 2016 17:59 GMT. This article has not been
updated.
2. This article refers to an earlier case involving prosecutors in New York
wanting Apple to extract data in an illegal drug distribution case, in which
they refused. Much like the FBI wants Apple to do so currently in New York.
This article goes into more detail as to the reasoning behind why the
company refused to comply and also references the addition of encrypted
data being linked to user-defined passwords making it impossible for Apple to
do so.
3. The author of this article is Mary Ann Russon. Mary Ann is qualified to write
about this topic based off the following information retrieved from her
LinkedIn page. In the UK, she has written for the International Business
Times, The Economist, Mobile Europe, European Communications,
Computerworld UK, Techworld.com, PC Advisor, Macworld UK, Digital Arts,
iPad & iPhone User, TotalFilm, NEO Magazine, the Bournemouth Daily Echo,
BBC Watchdog, Sideways News and MyFamilyUK. In Singapore, she has
worked for The Straits Times, Today, FiRST - Asia's Premier Movie Magazine
and was editor of a portfolio of magazines including the Asian MobileNews
and MSDN Southeast Asia. This information shows that she has a large
amount of experience researching and reporting on topics related to business
and technology issues.
4. This particular article is accurate and is supported by a court order found
inside the article.
5. The reason the article was written is to inform. The material in this article is
objective as the author is stating only facts about how the FBI is going to
Apple trying to get personal information off of devices, how Apple is refusing
to comply based on the possibility that it could tarnish their image to
customers and the Apple brand as a whole, and the added security measures
Apple is adding to its operating system software to further protect its
customer information.
Part 5: Two Additional Journal Articles
Keywords used: Data request by the government.

The database used was ProQuest.


2

Assignment 1: Information Literacy


Jose Flores

When I used the keywords to search in the database, I was able to bring up
scholarly articles very quickly with not a lot of screen jumping trying to find exactly
what I was looking for. That is the reason I chose this database.

Assignment 1: Information Literacy


Jose Flores

Assignment 1: Information Literacy


Jose Flores
Part 6: Compare the Internet and Journal Articles
The Google article was free to look up and was very quick on finding the topic
from the keywords used. The article found in ProQuest wouldnt have been as easily
accessible if I were not a CCBC student and having access to the CCBC library. The
article found in the Google search was posted on Feb. 18 th, 2016. This article is
extremely recent talking about cases that are currently going on. The second article
found in ProQuest was posted in Nov. 2012. The timeliness of this second article is
still on par with todays laws indicating that the private sector is the most reliable
and comprehensive source of information available to law enforcement. Mathew
Panzarino is the author of the first article and the Editor in Chief at Tech Crunch.
Stephen K. Pell is the author of the second article who is the principal consultant for
SKP Strategies, LLC and former Council to the Assistant Attorney General and Senior
Counsel to the Deputy Attorney General.
Part 7: Cite All Five Sources
Works Cited (Using APA format)
Panzarino, M., (2016, February 18). No, Apple has not unlocked 70 iPhones for law
enforcement. TechCrunch. Retrieved from http://techcrunch.com/2016/02/18/noapple-has-not-unlocked-70-iphones-for-law-enforcement/
Russon, M. A., (2016, January 26). Apple is refusing to unlock iPhones for police,
even those belonging to crystal meth dealers. International Business Times.
Retrieved from http://www.ibtimes.co.uk/apple-refusing-unlock-iphones-policeeven-those-belonging-crystal-meth-dealers-1540221
Lomas, N., (2016, February 17). Why Apple is right to reject the FBIs push to brute
force iPhone security. TechCrunch. Retrieved from
http://techcrunch.com/2016/02/17/why-apple-is-right-to-reject-the-fbis-push-tobrute-force-iphone-security/
Rubinstein, I. S., Nojeim, G. T., & Lee, R. D. (2014). Systematic government access
to personal data: A comparative analysis. International Data Privacy Law, 4(2),
96-119. doi:http://dx.doi.org.ccbcmd.idm.oclc.org/10.1093/idpl/ipu004
Pell, S. K. (2012). Systematic government access to private-sector data in the
United States. International Data Privacy Law, 2(4), 245-254.
doi:http://dx.doi.org.ccbcmd.idm.oclc.org/10.1093/idpl/ips020

You might also like