Snowden and His Honest Wikileaks, US Government, NSA, and Illegal: "Back Doors"
11-17-2017
Unit 6 Discussion 2
Post 2 Davis
Response to Davis
from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
I agree with Apple. Because while building a
backdoor into an encryption mechanism that is knowingly flawed for future exploitation.
Creating encryption tools with a vulnerability to make it easier for everyone
both good and bad which defeats the purpose of cryptography.
For example, "In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession." Tim Cook
Tim was modest when he stated, "in someone's physical possession."
He should have worded it slightly different and stated: "in anyone's physical possession." Backdoors will have the potential to do the same exact thing on a global scale for multiple entities. Imagine the possibilities for unrelenting cyber warfare on the infrastructure of all countries in all industry sectors. The actual concern is that if there is a backdoor(s), there is always the potential for the backdoor(s) to be closed and opened again by anyone or group.
Apple, The FBI And iPhone Encryption: A Look At What's At Stake (n.d.). Retrieved from http://www.npr.org/sections/thetwo-way/2016/02/17/467096705/apple-the-fbi-and-iphone-encryption-a-look-at-whats-at-stake
For example, "In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession." Tim Cook
Tim was modest when he stated, "in someone's physical possession."
He should have worded it slightly different and stated: "in anyone's physical possession." Backdoors will have the potential to do the same exact thing on a global scale for multiple entities. Imagine the possibilities for unrelenting cyber warfare on the infrastructure of all countries in all industry sectors. The actual concern is that if there is a backdoor(s), there is always the potential for the backdoor(s) to be closed and opened again by anyone or group.
Apple, The FBI And iPhone Encryption: A Look At What's At Stake (n.d.). Retrieved from http://www.npr.org/sections/thetwo-way/2016/02/17/467096705/apple-the-fbi-and-iphone-encryption-a-look-at-whats-at-stake
Response from: Miss. Bayo Elizabeth Cary, AA,
BA, MLIS
Introduction:
Cyber-Security/Forensics/Cyber-Stalking and Intl Terror
Violations-Supported by US Government: NSA:
A
2014 White House order has handicapped our intelligence collectors by granting
foreign nationals privacy protections that are similar-to those afforded to
U.S. citizens under the Constitution; the collection restrictions are not
necessary or required by law and should be rolled back," the plan said. Rep.
McCaul, chairman of the House Homeland Security Committee, was referring to a
January 2014 White House plan that sought to curtail surveillance programs that
caused a public outcry after they were exposed by former National Security
Agency contract worker Edward Snowden (CPR, Jan. 20, 2014)—Edward Snowden (Leithauser,
2016, p. 1)
In the real world, privacy no longer exists.
It can be difficult to recognize, how much information, is unwilling shared,
through connective electronic devices. When you have the opportunity, to learn
more about IT forensics, you will find, that there are cameras, and speakers,
in almost everything, that utilizes, computer software: cellphones, ipads,
computers, TV, CCTV cameras, etc. Because, this is now, a computer based living
environment, and there are back-doors everywhere-almost nothing, that happens
to you, is completely private-people know. Feel comforted, in the fact, that
cameras, are always rolling, i.e.: “You’re on Candid Camera!” iPhone, and
Apple, have no legal right, to keep information, related to Intl terror, and domestic
attacks-private:
Encrypted
messaging applications have allowed extremists to recruit and plot, all while
evading detection," his plan said. "Terrorists are 'going dark,'
causing law enforcement to 'go blind.' This phenomenon is one of the greatest
counterterrorism challenges of the 21st century and is making it harder to stop
acts of terror. (Leithauser, 2016, p. 1)
Sometimes,
when people, first realize, how little privacy-they have, they begin to feel a
little: “paranoid.” IT security, and a violation of your presumed, right to
privacy, is violated, in large part, by Intl terror, in the US-now, who are
actively, attacking Americans-through, our electronics devices-as in our US
government, and the NSA activities, that Snowden warned Americans about,
through Wikileaks, before he escaped, to Russia, for emergency political asylum:
“Cyber STALKing (M2 PressWire: Advisory, 2015, p. 1):
It
is generally assumed that direct, physical exposure to terror attacks
constitutes a primary factor determining young people’s subsequent PTSD and
emotional and behavioral problems. (Braun, et., al., 2009, p. 851)
If
you are curious, and wonder, if people notice you, and if your life has been
recorded, and shared-you could Google: YouTube. Are you a YouTube-star, from a
home video recording, and you were not aware of it yet? When private lives are
recorded, your friends, family, institutions, and even your ex-boyfriend, might
feel comfortable enough, to post the photos, and videos online, and under your
actual name-you could also try searching: Flickr.
It is much better, to face reality, as it is,
and, to be careful, about how you interact in public-if you are sensitive,
about image. On, the-one-hand, you could become, a YouTube star. EMOTIONAL TRAUMA:
on-the-other-hand, you could feel too embarrassed, and want to die of
mortification-based on what-even, your own family posts, online, about you,
and-in: pictures, and video. Empirical evidence, shows, that photos, videos,
and imagining, are incredibly frightening-they affect a person emotionally-as a
vicarious experience (Braun, et. al., 2009, p. 852).
In cases, when an individual, is
not directly impacted by a: violent form of aggression, from an Intl terror
attack-even just viewing, something terrifying, that has been inflicted, on
other innocent people-can cause: extreme fears, and other PTSD symptoms (Braun, et. al., 2009, p. 852). The US government, is
not doing enough, to keep Americans safe, from Intl terrorists, who now call,
America home:
It
is no longer enough to remove combatants from the battlefield if their fellow
operatives can turn to the Internet to inspire thousands more," it said.
"Washington has failed to establish an adequate system for offensive cyber
operations against terrorists' virtual networks, so we must establish a clear
policy for when and how to take such actions. - Tom Leithauser (Leithauser,
2016, p. 1)
Some
religions, such as Buddhist from Vietnam-who were forced to live through, the
Vietnam war, were soo traumatized, by the attack-low flying B-52 airplanes, the
non-stop air raids, every 5-10 minutes, for years, and landmines-that the,
entire religion evolved, to reflect contemporary conflicts, and resolution.
Buddhists, from Vietnam, follow very strict rules, regarding, what you are
permitted, to expose yourself to.
Buddhist from Vietnam, such as Nobel
Peace Prize winner, Thich Nat Hanh, who helped to end the Vietnam war, so-that,
anything you are exposed to, will effect-you. Therefore, you must: eat, drink, think,
and view the rest of the world, from a careful, and mindful stand point-think: “Is
it healthy for my: mind, body, family, friends, community, world, and for my
overall health-to be watching, and paying attention to this?’ Photos, from the
Vietnam War, and TV footage, was the very first time, in US history, that
America was exposed, to the inhumane degradation, caused by WAR.
When something, is really
unhealthy-like rotten meat, you should not eat it. When something in the air,
is too poisonous, you should find cleaner air, to breathe. When people,
illegally post, something offensive, and crazy online-like: child porn-you, should
never watch it. There really is not much privacy, anywhere anymore. When
people, try too hard, to keep something, too private-then, I personally think,
a problem may exist. There are some secrets, that one-should, never keep. Keep
in mind, that a lack of privacy, is the modern reality, and, it is not going to
change.
References
Braun-Lewensohn, Orna, Celestin, Leon-Patrice,
Celestin-Westreich, Smadar, Ponjaert-Kristoffersen, Ingrid, Verte´, Dominique.
(2009). Adolescents’ Mental Health Outcomes According to Different Types of
Exposure to Ongoing Terror Attacks. J Youth Adolescence. Vol. 38. p. 850-862. DOI
10.1007/s10964-008-9305-8
Leithauser, Tom. (2016). McCAUL's
ANTI-TERROR STRATEGY SEEKS CYBER ATTACKS ON TERROR NETWORKS. Cyber Security
Policy Report. Retrieved from www.proquest.com
M2 PressWire: Advisory. (2015). Digital
Trust Appoints Advisory Board. M2 PressWire: Coventry. Retrieved from
Comments
Post a Comment