Terrorists Take Advantage of Facebook, Twitter: Lewis

Terrorists Take Advantage of Facebook, Twitter: Lewis

Assessment

Interactive Video

Business, Information Technology (IT), Architecture, Social Studies

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses the use of global networks by terrorist groups and the challenges faced by law enforcement agencies. It explores the balance between civil liberties and internet censorship, highlighting the role of the NSA in data privacy. The video also compares the privacy approaches of companies like Google and Apple, emphasizing the impact on user safety and the need for law enforcement to adapt.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a major concern for law enforcement regarding individuals returning from conflict zones?

They may become political leaders.

They could be radicalized and commit violence.

They might spread misinformation.

They might start new businesses.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do tech companies like Google and Apple respond to NSA's data collection efforts?

By ignoring the issue.

By collaborating with other governments.

By supporting NSA's efforts.

By enhancing user privacy measures.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the irony in Google's privacy argument?

Google supports government surveillance.

Google does not collect any user data.

Google offers complete privacy to all users.

Google claims privacy from the government but not from itself.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key difference between Google's and Apple's approach to user data?

Apple anonymizes data from the start.

Google does not collect any data.

Apple collects all user data.

Google anonymizes data immediately.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What challenge do law enforcement agencies face with the changing business models of tech companies?

Increased collaboration with intelligence agencies.

Increased ease of hacking.

Difficulty in accessing user data.

Lack of global market presence.