aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms10
1 files changed, 5 insertions, 5 deletions
diff --git a/paper.ms b/paper.ms
index 0d16103..4ccda5a 100644
--- a/paper.ms
+++ b/paper.ms
@@ -84,13 +84,13 @@ of end-to-end encryption by terrorists in order to avoid
interception by the authorities. Due to U.S. usage of intercepted
communications to uncover and prevent a number of al-Qaeda plots, the
terrorist organisation and other terrorist groups have increasingly
-used encrypted communications (read citation from Graham). A
+used encrypted communications. A
significant factor is the use of non-mainstream software in the early use
of encryption by terrorists, including a program that built a wrapper
around the popular, secure, and open source PGP called \fIMujahedeen
Secrets\fR by al-Qaeda. Although now terrorists and criminals use widely
available, popular, and user-friendly software such as the Tails
-operating system or Telegram (Graham citation 28), terrorist
+operating system or Telegram, terrorist
organisations have shown an ability to make use of more obscure and
complicated systems, as well as to use publicly available source code in
order to construct software for operatives to use.
@@ -151,7 +151,7 @@ can operate with a very limited number of operatives \[oq]on the
ground\[cq] and instead focus attention on the giant amounts of data
they have for processing in order to make the findings they intend to:
be it crime, terrorism, or \[en] as was the case in the Gestapo and
-Stasi - descent.
+Stasi \[en] descent.
.HLINE
@@ -358,8 +358,8 @@ proprietary. For many, this will continue to be the norm. Yet, the
pressure from increasing popular open source software will continue to
mount. The open source messaging platform \[oq]Signal\[cq] offers a
security oriented product and publishes requests they receive from
-courts and law enforcement alongside their replies online (cite).
-Demonstrating their respect for user privacy and that they are unable
+courts and law enforcement alongside their replies online {Signal
+Grand Jury}{Ars Signal}. Demonstrating their respect for user privacy and that they are unable
to release data as they do not collect it is perhaps something that
users are finding more appealing. Indeed, when Apple refused to unlock
a phone for the FBI following a terrorist attack it gained