Snowden and His Honest Wikileaks, US Government, NSA, and Illegal: "Back Doors"


11-17-2017




Unit 6 Discussion 2 Post 2 Davis

Response to Davis from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS



Top of Form



I agree with Apple. Because while building a backdoor into an encryption mechanism that is knowingly flawed for future exploitation. Creating encryption tools with a vulnerability to make it easier for everyone both good and bad which defeats the purpose of cryptography.
For example, "In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession." Tim Cook
Tim was modest when he stated, "in someone's physical possession."
He should have worded it slightly different and stated: "in anyone's physical possession." Backdoors will have the potential to do the same exact thing on a global scale for multiple entities.  Imagine the possibilities for unrelenting cyber warfare on the infrastructure of all countries in all industry sectors. The actual concern is that if there is a backdoor(s), there is always the potential for the backdoor(s) to be closed and opened again by anyone or group.


Apple, The FBI And iPhone Encryption: A Look At What's At Stake (n.d.). Retrieved from
http://www.npr.org/sections/thetwo-way/2016/02/17/467096705/apple-the-fbi-and-iphone-encryption-a-look-at-whats-at-stake



Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS



Introduction:



Cyber-Security/Forensics/Cyber-Stalking and Intl Terror Violations-Supported by US Government: NSA:



A 2014 White House order has handicapped our intelligence collectors by granting foreign nationals privacy protections that are similar-to those afforded to U.S. citizens under the Constitution; the collection restrictions are not necessary or required by law and should be rolled back," the plan said. Rep. McCaul, chairman of the House Homeland Security Committee, was referring to a January 2014 White House plan that sought to curtail surveillance programs that caused a public outcry after they were exposed by former National Security Agency contract worker Edward Snowden (CPR, Jan. 20, 2014)—Edward Snowden (Leithauser, 2016, p. 1)




          
          In the real world, privacy no longer exists. It can be difficult to recognize, how much information, is unwilling shared, through connective electronic devices. When you have the opportunity, to learn more about IT forensics, you will find, that there are cameras, and speakers, in almost everything, that utilizes, computer software: cellphones, ipads, computers, TV, CCTV cameras, etc. Because, this is now, a computer based living environment, and there are back-doors everywhere-almost nothing, that happens to you, is completely private-people know. Feel comforted, in the fact, that cameras, are always rolling, i.e.: “You’re on Candid Camera!” iPhone, and Apple, have no legal right, to keep information, related to Intl terror, and domestic attacks-private:



Encrypted messaging applications have allowed extremists to recruit and plot, all while evading detection," his plan said. "Terrorists are 'going dark,' causing law enforcement to 'go blind.' This phenomenon is one of the greatest counterterrorism challenges of the 21st century and is making it harder to stop acts of terror. (Leithauser, 2016, p. 1)





Sometimes, when people, first realize, how little privacy-they have, they begin to feel a little: “paranoid.” IT security, and a violation of your presumed, right to privacy, is violated, in large part, by Intl terror, in the US-now, who are actively, attacking Americans-through, our electronics devices-as in our US government, and the NSA activities, that Snowden warned Americans about, through Wikileaks, before he escaped, to Russia, for emergency political asylum: “Cyber STALKing (M2 PressWire: Advisory, 2015, p. 1):





It is generally assumed that direct, physical exposure to terror attacks constitutes a primary factor determining young people’s subsequent PTSD and emotional and behavioral problems. (Braun, et., al., 2009, p. 851)





If you are curious, and wonder, if people notice you, and if your life has been recorded, and shared-you could Google: YouTube. Are you a YouTube-star, from a home video recording, and you were not aware of it yet? When private lives are recorded, your friends, family, institutions, and even your ex-boyfriend, might feel comfortable enough, to post the photos, and videos online, and under your actual name-you could also try searching: Flickr.





          It is much better, to face reality, as it is, and, to be careful, about how you interact in public-if you are sensitive, about image. On, the-one-hand, you could become, a YouTube star. EMOTIONAL TRAUMA: on-the-other-hand, you could feel too embarrassed, and want to die of mortification-based on what-even, your own family posts, online, about you, and-in: pictures, and video. Empirical evidence, shows, that photos, videos, and imagining, are incredibly frightening-they affect a person emotionally-as a vicarious experience (Braun, et. al., 2009, p. 852).



            In cases, when an individual, is not directly impacted by a: violent form of aggression, from an Intl terror attack-even just viewing, something terrifying, that has been inflicted, on other innocent people-can cause: extreme fears, and other PTSD symptoms (Braun, et. al., 2009, p. 852). The US government, is not doing enough, to keep Americans safe, from Intl terrorists, who now call, America home:





It is no longer enough to remove combatants from the battlefield if their fellow operatives can turn to the Internet to inspire thousands more," it said. "Washington has failed to establish an adequate system for offensive cyber operations against terrorists' virtual networks, so we must establish a clear policy for when and how to take such actions. - Tom Leithauser (Leithauser, 2016, p. 1)





Some religions, such as Buddhist from Vietnam-who were forced to live through, the Vietnam war, were soo traumatized, by the attack-low flying B-52 airplanes, the non-stop air raids, every 5-10 minutes, for years, and landmines-that the, entire religion evolved, to reflect contemporary conflicts, and resolution. Buddhists, from Vietnam, follow very strict rules, regarding, what you are permitted, to expose yourself to.





         Buddhist from Vietnam, such as Nobel Peace Prize winner, Thich Nat Hanh, who helped to end the Vietnam war, so-that, anything you are exposed to, will effect-you. Therefore, you must: eat, drink, think, and view the rest of the world, from a careful, and mindful stand point-think: “Is it healthy for my: mind, body, family, friends, community, world, and for my overall health-to be watching, and paying attention to this?’ Photos, from the Vietnam War, and TV footage, was the very first time, in US history, that America was exposed, to the inhumane degradation, caused by WAR.





        When something, is really unhealthy-like rotten meat, you should not eat it. When something in the air, is too poisonous, you should find cleaner air, to breathe. When people, illegally post, something offensive, and crazy online-like: child porn-you, should never watch it. There really is not much privacy, anywhere anymore. When people, try too hard, to keep something, too private-then, I personally think, a problem may exist. There are some secrets, that one-should, never keep. Keep in mind, that a lack of privacy, is the modern reality, and, it is not going to change.












References



Braun-Lewensohn, Orna, Celestin, Leon-Patrice, Celestin-Westreich, Smadar, Ponjaert-Kristoffersen, Ingrid, Verte´, Dominique. (2009). Adolescents’ Mental Health Outcomes According to Different Types of Exposure to Ongoing Terror Attacks. J Youth Adolescence. Vol. 38. p. 850-862. DOI 10.1007/s10964-008-9305-8

Bottom of Form



Leithauser, Tom. (2016). McCAUL's ANTI-TERROR STRATEGY SEEKS CYBER ATTACKS ON TERROR NETWORKS. Cyber Security Policy Report. Retrieved from www.proquest.com







M2 PressWire: Advisory. (2015). Digital Trust Appoints Advisory Board. M2 PressWire: Coventry. Retrieved from



Comments

Popular posts from this blog

Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2