aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-03-22 23:39:41 +0000
committerroot <root@turin.home>2022-03-22 23:39:41 +0000
commitb6dc7c4e0b04473bf3d68ff2f71dbb2d4dd7d6ca (patch)
treea802608b4bc8082d91917c6cfea02cea6d6f1dee /paper.ms
parent2ef9c9c104a9f4d78609c0687adf842215fb5a94 (diff)
Minor changes, mostly formatting
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms34
1 files changed, 17 insertions, 17 deletions
diff --git a/paper.ms b/paper.ms
index cbd156f..2da6aef 100644
--- a/paper.ms
+++ b/paper.ms
@@ -5,9 +5,9 @@ sort
.TL
Cryptography, crime, terror, and surveillance
.AU
-\f[TI]Mohit Agarwal
+\f[R]Mohit Agarwal
.AI
-February 2022
+March 2022
.LP
Modern encryption methods allow a level of privacy in communication
that has not before been seen: information that is encrypted cannot be
@@ -135,7 +135,7 @@ surveillance of the authorities. Instead, the level of surveillance
that large, secretive groups of individuals once had to carry out in
order to enable a surveillance state can be performed instead through
bureaucracies and technological methods. In modern times, governments
-can operate with a very limited number of operatives `on the ground`,
+can operate with a very limited number of operatives 'on the ground',
and instead focus attention on the giant amounts of data they have for
processing in order to make the findings they intend to: be it crime,
terrorism, or - as was the case with the Gestapo and Stasi - descent.
@@ -222,7 +222,7 @@ A shift toward open standards reveals a problem for law enforcement
agencies and counterterrorism forces. The tools of mass surveillance
that once enabled investigation into crime or terror such as reading
messages/emails, listening to calls, tracking location, or analysing
-metadata (cite?) may no longer be effective, thereby potentially
+metadata may no longer be effective, thereby potentially
preventing such investigation to occur. For governments, this is
arguably the result of such heavy surveillance in the first place.
It is clear that knowledge such as the 2013 Snowden leaks had an impact
@@ -303,7 +303,10 @@ that remains significant in the enterprise security space {goodin rsa
denial}{perlroth government}.
The question must be asked as to whether the discussion of encryption
-and surveillance is necessary.
+and surveillance is necessary. Governments and law enforcement clearly
+have alternative methods to direcrlty analysing communications in
+order to stop crime or terror which might better respect the privacy
+of the general public. Metadata analysis has proved
Individuals around the world have clearly expressed interest in
matters of privacy and encryption (cite) and open source software
@@ -313,8 +316,8 @@ state surveillance. Measures taken by governments to prevent this
development will doubtless be limited unless extreme actions such as
those seen in China are taken. Otherwise, development will continue to
occur in both free and non free societies in support of individual
-freedoms. The assertion of "Linus' law" that , "given enough eyeballs,
-all bugs are shallow" (cite - CathBaz) creates a serious inability
+freedoms. The assertion of \[oq]Linus' law\[cq] that , \[lq]given enough eyeballs,
+all bugs are shallow\[rq] (cite - CathBaz) creates a serious inability
for actors such as governments to engineer backdoors into software as
the NSA previously has (cite) or to prevent the development of
software altogether (find example). On the other hand, a significant
@@ -369,8 +372,8 @@ processors made after 2018, and are therefore potentially a real
threat to security {kocher spectre}
The executive summary to the 9/11 Commission Report {#9/11 commission
-report} describes the September 2001 terrorist attacks as 'a shock,
-not a surprise'. In a similar light, the release of information
+report} describes the September 2001 terrorist attacks as \[oq]a shock,
+not a surprise\[cq]. In a similar light, the release of information
relating to mass surveillance and mishandling of data such as the 2013
Edward Snowden releases ought to also be potentially considered a
shock, not a surprise given the level of data that both governments
@@ -413,10 +416,6 @@ earlier).
.nr HY 0
.ad l
-Intro
- Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008
- USA FREEDOM Act (2015)(HR 2048)
-
Cryptography
https://wikiless.org/wiki/Kerckhoffs%27s_principle?lang=en
Timing Attacks
@@ -451,10 +450,6 @@ Government
Leahy Law
DeadHand and MonsterMind
-Terror
- September 2001
- 2001 Anthrax attacks
-
Privacy
Apple and App Tracking Transparency
https://www.flurry.com/blog/ios-14-5-opt-in-rate-att-restricted-app-tracking-transparency-worldwide-us-daily-latest-update/
@@ -480,3 +475,8 @@ https://ooni.org/post/2021-russia-blocks-tor/
https://www.openrightsgroup.org/
+\[oq]go\[cq]
+\[lq]How Terrorists Use Encryption,\[rq]
+
+TODO : recite bulletin
+https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence