aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
blob: 63572db00d8cbe419996f6aab05530d168668e4c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
.TL
Title
.AU
Mohit Agarwal
.AI
January 2022
.LP
The Internet offers a potentially Utopian vision of human interaction.
The nature of computers and the information stored on them means that
a large file such as a book can be duplicated practically instantly.
When sharing information on the Internet, it is not limited by the
physical limitation of traditional methods. To give someone a book is
either to lose the copy yourself or to obtain or produce a copy of
that book, which can be a difficult process. With the Internet,
however, information can exist in a more absolute state, separated
entirely from any physical media. Millions of people can download a
single book as easily as one person could, and the traditional
limitations that lead us to `own' individual property no longer exist.
In this way, the Internet eliminates the ownership of information in
whatever forms it perpetuated through the attachment of information
to media such as books or celluloid film, and the copying of
information can take place in its purest state: of literal
information, and then being stored as pure information, although on a
physical media such as a hard drive, for all meaningful reasons (due to
the large capacities and low cost of modern drives) unattached to
anything physical whatsoever. Although this was true for other methods
of sharing information, such as through radio broadcasts, information
received via the Internet can be easily stored, processed, and
accessed at any time, as well as giving anyone the ability to
broadcast their own information rather than receive it, as usage of
broadcasting towers was and remains limited, whereas the internet may
be used to present new information by anyone. A key example of this
might be Wikipedia. Wikipedia allows individuals to contribute to
entries that form a vast encyclopedia.

-- todo: "Take part in information, not only consume it"

An argument is often made against digital privacy in the interest of
national security. With access to communications and usage history law
enforcement and government can quickly discover large amounts of
information useful in a criminal investigation or in preventing
criminal activity. Graham explores the use of encryption by terrorists
{CTC terrorists} which is often cited in a reason for giving
governments access to unencrypted Internet communications so that
suspicious activity can be flagged and investigated in order to
prevent a terror attack or in order to better respond in the case of
an attack. Graham describes the extensive use of end to end encryption
used by terrorists in order to avoid interception by the authorities.
Due to U.S. usage of intercepted communications to uncover and prevent
a number of al-Qa'ida plots, the terrorist organisation and other
terrorist groups have increasingly used encrypted communications (read
citation from Graham). An significant factor is the use of
non-mainstreams software in early use of encryption by terrorists,
including a program that built a wrapper around the popular, secure,
and open source PGP called \fIMujahedeen secrets\fR. Although now
terrorists and criminals use widely available, popular, and
user-friendly software such as the Tails operating system or Telegram
(Graham citation 28), terrorists organisations have shown an ability
to make use of more obscure and complicated systems, as well as use
publicly available source code in order to construct software for
operatives to use. Messaging technologies and their support for
`end-to-end encryption' is a particularly significant issue.
Introduction of end-to-end encryption being introduced by large
companies such as Facebook has raised concern {conversation facebook}
over the potential for usage by criminals and a lack of ability for
Facebook or law enforcement to obtain conversation between criminals
which may be vital in an investigation. 

Concerns exist with digital technologies on at a hardware level. The
Intel Management Engine that exists {Intel Management}

{Stasiland}{firewall}

.nr HY 0
.ad l