Crime
Drugs
National Security
Privacy
100

What is the impact to slow economic growth (don't read the tag, explain the warrants)

Slow economic growth causes war because countries blame each other, and become less cooperative. 

100

What is the name of the popular drug that is smuggled into the US. 

Fentanyl 

100

E2EE stands for...

End to End Encryption

100

Explain why it would be bad for the law to have access to encrypted comms

it threatens digital privacy, gives too much power to the government

200

Explain why violence will slow economic growth

It increases costs for healthcare, law enforcement, and reduces economic productivity

200

What was the Operation called that led to the government seizure of nearly 44 million fentanyl pills (hint: it may not be underlined)

Operation Last Mile 

200

What is the name of the 2 Chinese state sponsored cyberattacks on US telecomms 

The Salt and Vault Typhoon attacks

200

Define digital privacy

The secrecy of your information online. 

300

What is crime mitigation

The reduction in criminal activities

300

True or False: Drugs have killed more people than all the wars the US has fought since 1900. 

False! They've killed more people than wars the US has fought AFTER WWII. 

300

What is the abbreviation for the law that allowed lawful intercept capabilities for telecommunications which likely enabled the Chinese cyberattacks

CALEA 
300

Explain why digital privacy is necessary for financial security

It protects your bank information, and company secrets. 

400

What are warrant proof gaps and how does the pro resolve it. 

They are communications that the police cant access even if they have a warrant and the pro resolves it by allowing access to encrypted communications. 

400

Why are encrypted communications becoming more popular and how does this contribute to drug smuggling. 

Companies are marketing their encrypted comms to their consumers so more people are using them which includes drug dealers. 

400

Explain why forcing companies to provide lawful access to encrypted comms risk increasing cyberattacks

Lawful access provides a backdoor (entry point) that hackers could target to gain access into encrypted comms. 

400

Explain why privacy causes extinction using the animal analogy provided in the Levesque 16 evidence

Animals go crazy if they don't have privacy, humans are like animals, so if secrets spill out, we all go bananas. 

M
e
n
u