aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-02-19 16:18:54 +0000
committerroot <root@turin.home>2022-02-19 16:18:54 +0000
commit84102b68aabaec8755612be5619057eb36ad5dce (patch)
tree505c207df7fa009717990561d80e5b9a348f39d7 /paper.ms
parent8524d5fd8cf7c8a3fde26080a7e64f84b1dd736c (diff)
Discussing terror, 9/11 Commission Report
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms51
1 files changed, 28 insertions, 23 deletions
diff --git a/paper.ms b/paper.ms
index 8630579..b79f1d0 100644
--- a/paper.ms
+++ b/paper.ms
@@ -63,29 +63,34 @@ encryption existing thereby only as a tool of authoritarian control.
An argument is often made against allowing widespread use of
encryption and generally against widespread effective operations
security (OPSEC) in the public sector in the interest of
-national security. With access to communications and usage history law
-enforcement and government can quickly discover large amounts of
-information useful in a criminal investigation or in preventing
-criminal activity. Graham{#CTC terrorists} explores the use of
-encryption by terrorists which is often cited in a reason for giving
-governments access to unencrypted Internet communications so that
-suspicious activity can be flagged and investigated in order to
-prevent a terror attack or in order to better respond in the case of
-an attack. Graham describes the extensive use of end to end encryption
-used by terrorists in order to avoid interception by the authorities.
-Due to U.S. usage of intercepted communications to uncover and prevent a
-number of al-Qa'ida plots, the terrorist organisation and other
-terrorist groups have increasingly used encrypted communications (read
-citation from Graham). An significant factor is the use of
-non-mainstreams software in early use of encryption by terrorists,
-including a program that built a wrapper around the popular, secure,
-and open source PGP called \fIMujahedeen secrets\fR. Although now
-terrorists and criminals use widely available, popular, and
-user-friendly software such as the Tails operating system or Telegram
-(Graham citation 28), terrorists organisations have shown an ability
-to make use of more obscure and complicated systems, as well as use
-publicly available source code in order to construct software for
-operatives to use.
+national security, and the prevention of terror. With access to
+communications and usage history governments can gather significant
+information on terrorists and use this intelligence against
+terrorists. It is clear that intelligence plays a significant role in
+counterterrorism. The 9/11 terrorist attacks are seen potentially as a
+phenomenal failure of intelligence as detailed in The 9/11 Commission
+report {#9/11 commission report}, which detailed institutional failures
+and also emphasised the difficulty and importance of intelligence in
+counterterrorism {intelligence and national security}. Graham{#CTC
+terrorists} explores the use of encryption by terrorists which is
+often cited in a reason for giving governments access to unencrypted
+Internet communications so that suspicious activity can be flagged and
+investigated in order to prevent a terror attack or in order to better
+respond in the case of an attack. Graham describes the extensive use
+of end to end encryption used by terrorists in order to avoid
+interception by the authorities. Due to U.S. usage of intercepted
+communications to uncover and prevent a number of al-Qa'ida plots, the
+terrorist organisation and other terrorist groups have increasingly
+used encrypted communications (read citation from Graham). An
+significant factor is the use of non-mainstreams software in early use
+of encryption by terrorists, including a program that built a wrapper
+around the popular, secure, and open source PGP called \fIMujahedeen
+secrets\fR. Although now terrorists and criminals use widely
+available, popular, and user-friendly software such as the Tails
+operating system or Telegram (Graham citation 28), terrorists
+organisations have shown an ability to make use of more obscure and
+complicated systems, as well as use publicly available source code in
+order to construct software for operatives to use.
Although the issue of popular messaging technologies and their support
for 'end-to-end encryption' is often discussed, the argument that the