Blown to Bits Chapter 2 Questions
This chapter describes the various ways in which our personal privacy is compromised by the digital explosion.
Reading Questions:
Keep these questions in mind as you read chapter 2 .
Copy this document into Word or Google docs and for each question, write a short answer or paragraph as specified. Please use complete sentences. Upload your completed assignment to CANVAS.
Questions for pages 19-55
Short answer:
1. What is an RFID tag and what does it do? A Radio Frequency Identification tag; Indentifies things using radio waves
2. What is an EDR and what does it do?
“event data recorder” records event data
3. What is the difference between "big brotherism" and "little brotherism"?
Little Brotherism is where your neighbors and people just like you are able to access your information through the bits of information you leave on the internet. Big Brotherism is when it's more official people like governments, or the CIA who are using more intense tracking in order to catch criminals etc
.
4.
…show more content…
4. How do “we leave digital footprints and fingerprints?” Do you think this is important for everyone to know? Why or why Not?
We leave digital footprints and fingerprints pretty much every time we use technology in general. Downloading, uploading, messaging, copying things like files, music, documents, and etc. all leave digital footprints and finger prints. I think it is important for everyone to know that because they should be aware that when they leave digital footprints and fingerprints that like in real life it can be tracked. Everyone should have the right to know when their privacy is at
Throughout the article, the author make statements about the negitivity of the side of digital fingerprints and online tracking. He mentioned it as a fact and did not offer it as a proposal. He put out his different statements on the side of his
Imagine having a distinctive feature that separates you from everyone else on the planet. On each person’s palm side of their hands and soles of their feet are epidermal ridge patterns that singles him or her out from everyone else on the planet (Barnes, 2012). The ridge patterns on the last joint of each person fingers, known as fingerprints grants each person the opportunity to be unique. Fingerprints have become a common means of identification around the world. Despite the popularity of fingerprint, there are a very few common misconceptions of about fingerprints, one being that every person is born with fingerprints. There are rare instants where people are simply born without these identification marks on the palms and soles of their
The human fingerprint is fascinating; it is impossible to have two fingerprints that are identical to one another. Although it was realized early on that every person’s fingerprint is unique, the “science” of fingerprinting analysis did not really start until the 1800s (Staff, 2014, p. 1). Dr. Henry Faulds was credited with devising a method for obtaining fingerprints with the use of printer ink (German, 2016, p. 1). However, the identification and fingerprint cards did not become a reality until the early 1900s. It became popular when more and more groups and agencies began to see the value of fingerprinting. In 1946, it is shown that the FBI was in possession of 100 million fingerprint cards, which were all maintained in manual files (German, 2016, p. 1).
Fingerprints offer a solid method for an individual's identification. This is the basis for clarification of fingerprints and has since replaced techniques for identifying people who are reluctant to admit previous arrests. (Moore, 2017) This essay will discuss the historical backdrop of fingerprints as a science and timeline, the progression, and accomplishments.
In an article by CNN about how Police are using social media sites as crime fight tools. The article states “We leave small clues about our lives all over the Internet like fingerprints.” The article talks about a man named Melvin Colon who is facing charges of murder, along with weapons and drug related crimes. His page was private, however a friend of his on Facebook gave police access to Colon’s private information. Which showed incriminating posts, references to past crimes, and photos that showed gang affiliation. Other ways police use these sites are by creating fake profiles to befriend the suspect to view their private information or authorities can request private information from social networks with subpoenas or warrants. These techniques are growing popular in different police
Baby fingerprints can be captured for multiple reasons: preventing babies from being switched at hospitals or help to find missing children. Many parents have already captured their child’s fingerprints for child safety reasons, to have on hand in case of an
The most significant milestone in forensic science is the use of fingerprints in business transactions. People in accident Babylon used fingerprints because they are unique to every human being. The reason fingerprints are distinct to individuals is because they are formed when the bottom layer of the epidermis develops at the different rate than the rest of the skin, thus it buckles and tugs on the
Fingerprints are the rigged tips of the fingers and they often leave a print unrecognizable to the naked eye after making contact when an object. No two people have identical fingerprints. They can also tell the race and gender of a person. Jon Bon Jovi once said “Each one of you has something no one else has, or has ever had: your fingerprints, your brain, your heart. Be an individual. Be unique. Stand out. Make noise. Make someone notice. That 's the power of individuals.” Fingerprints are a key piece of an individual because they provide a sense of identity.
Fingerprinting has been in the criminal justice system for so long. For example, in 1903 when the Bertillon system couldn’t distinguish between two men, Will West and William West, it was fingerprinting that clearly distinguished them. After that, New York City Civil service commission used it in 1901, and the training of American police by Scotland Yard representatives at the 1904 world’s fair. Fingerprinting began to be used in earnest in all major U.S. cities.
Fingerprint scanning has recently been introduced into technology, for example iPhone now have a fingerprint detector to unlock the iPhone instead of using a pin, and this only gives the owner of the phone authority to access the information within the phone. Also fingerprint scanning has been used in fast food chains for example Chicago’s fast food restaurant has an ordering system which uses fingerprints to determine customer’s orders. Governments use finger print scanning in many ways one of which is for passport verification in airports. Research shows that more than half (62%) of
There are many reasons why fingerprinting is used as an important methods for identification (Hall, 2015). As stated by Hall (2015), “A fingerprint consists of several identifiable characteristic, such as loops, arches, whorls, islands, and bifurcations. The arrangement, frequency, and design of these features are among the many characteristics used to distinguish prints from one another” (p. 510). Everybody’s fingerprints are the same. Fingerprints are kept in Federal and state agencies of the within the law. When someone commits a crime, a forensic scientist takes fingerprints and match them through the database in computers. Since fingerprinting does not go against the Fifth Amendment, a search warrant is not required. Fingerprints can be matched with someone’s hair down the color of their eyes. Another type of type of recognition to identify someone is through blood tests, and it is used in the U.S. Benches. The individuals who has this procedure done may feel pain and get sick from the procedure.
In 1997, President William J. Clinton, as cited by Woodward (2003), states that having right to privacy is one of the most cherished freedoms by individuals. However, most of the consumers today just cares about the convenience brought by technology. Many consumers do not like passwords and PINs because it might be forgotten due to its complexity or it might took a lot of time to be authenticated. Fingerprint authentication was implemented to address these problems. Vacca (2007) remarks that consumers will use fingerprint authentication because of its convenience (p. 121). Although finger-scan technology provides the convenience, which consumers always wanted, without sacrificing security, this technology infringes their privacy at the same time. Individuals lose their anonymity when they disclose their biometric information. Woodward (1997) states that the individual is disclosing an
The use of fingerprints and handprint patterns as a means of personal identification dates back to thousands of years. There were archaeological records of the usage of these by the Chinese dating back to 2000 years ago (Stuart James, 2014, p. 331). As a matter of fact, in Babylon and ancient China, fingerprints were routinely pressed into clay tablets (Figure 1). It is thought that this was done for purposes of authenticating or perhaps just out of superstition (Farelo, 2009). However, Sir William Herschel, a British administrator is credited for being the first European to recognize the value of fingerprinting as a means of personal identification. When he was working for the Civil Service of India, he entered into a contract with a local businessman and asked him to put his right hand print on the back of the contract (Stuart James, 2014, p. 331). Apparently, in that part of the country, traces of bodily impressions were considered more binding than signatures (Saferstein, 2011, p. 4).
use of physiological or behavioral characteristics to determine or verify identity data derived from direct measurement of a part of the human body. In areas of business, the identities of personnel and employees needs to be verified .This is required for attendance .Thus there is restriction on the access to computers for unauthorized users since there are no shared or compromised passwords between the employees. Hundred of years back, fingerprints were used in the forensics and crime branch investigations with the help of automatic fingerprint identification systems. A fingerprint is a distinctive or identifying mark
From the first day of life until the day that last breath is taken, there are few consistencies, however, one thing that will never change is that tiny bulb on the end of every finger. Fingerprints are unique, there will never be two in the entire world that match, the small area between the tip of the finger to the first joint will never be shared, not even with a twin. Tiny patterns formed on each finger are enough to identify a person with certainty. The small ridges leave traces of collecting dirt and oils naturally produced on anything that the person touches, essentially leaving an invisible trail. The scientific study of using fingerprints for identification purposes is known as dactylography. Nonetheless, for hundreds of years now criminal investigators have used this