aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-01-25 23:00:12 +0000
committerroot <root@turin.home>2022-01-25 23:00:12 +0000
commit11e3e6e472781b2078c9179e344abd42ece2cb53 (patch)
treef1a439a42f80154e9c538dd7b2ac277c11878df8 /paper.ms
parentf99481ad484caa2bc34ec101c0baa8845f6dcb16 (diff)
Minor changes
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms22
1 files changed, 12 insertions, 10 deletions
diff --git a/paper.ms b/paper.ms
index 9275254..63572db 100644
--- a/paper.ms
+++ b/paper.ms
@@ -45,24 +45,26 @@ governments access to unencrypted Internet communications so that
suspicious activity can be flagged and investigated in order to
prevent a terror attack or in order to better respond in the case of
an attack. Graham describes the extensive use of end to end encryption
-used by terrorists in order to avoid interception by the autorities.
+used by terrorists in order to avoid interception by the authorities.
Due to U.S. usage of intercepted communications to uncover and prevent
a number of al-Qa'ida plots, the terrorist organisation and other
terrorist groups have increasingly used encrypted communications (read
citation from Graham). An significant factor is the use of
non-mainstreams software in early use of encryption by terrorists,
-including a program that built a rapper around the popular, secure,
+including a program that built a wrapper around the popular, secure,
and open source PGP called \fIMujahedeen secrets\fR. Although now
terrorists and criminals use widely available, popular, and
user-friendly software such as the Tails operating system or Telegram
-(Graham citation 28), Messaging
-technologies and their support for `end-to-end encryption' is a
-particularly significant issue. Introduction of end-to-end encryption
-being introduced by large companies such as Facebook has raised
-concern {conversation facebook} over the potential for usage by
-criminals and a lack of ability for Facebook or law enforcement to
-obtain conversation between criminals which may be vital in an
-investigation.
+(Graham citation 28), terrorists organisations have shown an ability
+to make use of more obscure and complicated systems, as well as use
+publicly available source code in order to construct software for
+operatives to use. Messaging technologies and their support for
+`end-to-end encryption' is a particularly significant issue.
+Introduction of end-to-end encryption being introduced by large
+companies such as Facebook has raised concern {conversation facebook}
+over the potential for usage by criminals and a lack of ability for
+Facebook or law enforcement to obtain conversation between criminals
+which may be vital in an investigation.
Concerns exist with digital technologies on at a hardware level. The
Intel Management Engine that exists {Intel Management}