There has been numerous attacks that have stolen
thousand of peoples information and the ever-increasing
permission that new model needs makes it easier to collect.
While being to able to monitor what a person does online would
be a huge boon it comes with the difficult question of what
threats can the government respond to.
Sources Jensen, K. (2019, August
2). The 5G revolution.CQ researcher,29, 1-36.
Retrieved from http://library.cqpress.com/
Kennerly, E. (2018,
February 9). Privacy and the internet.CQ researcher,28, 121-144. Retrieved from http://
library.cqpress.com/
Wallace, C. P. (2020,
February 7). Hidden money.CQ researcher,30, 1-58. Retrieved from http://