aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
blob: f95c0a13784c92caf9098d5920de17485ea86bb9 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
.TL
Title
.AU
Mohit Agarwal
.AI
January 2022
.LP
A problem (instability), a solution

The Internet offers an arguable Utopian communication method. The
nature of computers and the information stored on them means that data
such as a book or film can be duplicated practically instantly. When
sharing information on the Internet, the physical limitations of
traditional methods do not apply. To give someone a book is either to
lose the copy yourself or to obtain or to produce another physical
copy of that book. With the Internet, however, information can exist
in a more absolute state, separated entirely from any physical media.
Millions of people can download a single book as easily as one person
could, and the traditional limitations that lead us to 'own'
individual property no longer exist. In this way, the Internet
eliminates the ownership of information in whatever forms it
perpetuated through the attachment of information to media such as
books or celluloid film, and the copying of information can take place
in its purest state: of literal information, and then being stored as
pure information, although on a physical media such as a hard drive,
for all meaningful reasons (due to the large capacities and low cost
of modern drives) unattached to anything physical whatsoever. Although
this was true for other methods of sharing information, such as
through radio broadcasts, information received via the Internet can be
easily stored, processed, and accessed at any time, as well as giving
anyone the ability to broadcast their own information rather than
receive it, as usage of broadcasting towers was and remains limited,
whereas the internet may be used to present new information by anyone.
A key example of this might be Wikipedia. Wikipedia allows individuals
to contribute to entries that form a vast encyclopedia.

An argument is often made against digital privacy in the interest of
national security. With access to communications and usage history law
enforcement and government can quickly discover large amounts of
information useful in a criminal investigation or in preventing
criminal activity. Graham explores the use of encryption by terrorists
{CTC terrorists} which is often cited in a reason for giving
governments access to unencrypted Internet communications so that
suspicious activity can be flagged and investigated in order to
prevent a terror attack or in order to better respond in the case of
an attack. Graham describes the extensive use of end to end encryption
used by terrorists in order to avoid interception by the authorities.
Due to US usage of intercepted communications to uncover and prevent a
number of al-Qa'ida plots, the terrorist organisation and other
terrorist groups have increasingly used encrypted communications (read
citation from Graham). An significant factor is the use of
non-mainstreams software in early use of encryption by terrorists,
including a program that built a wrapper around the popular, secure,
and open source PGP called \fIMujahedeen secrets\fR. Although now
terrorists and criminals use widely available, popular, and
user-friendly software such as the Tails operating system or Telegram
(Graham citation 28), terrorists organisations have shown an ability
to make use of more obscure and complicated systems, as well as use
publicly available source code in order to construct software for
operatives to use.

Although the issue of popular messaging technologies and their support
for 'end-to-end encryption' is often discussed, the argument that the
introduction of end-to-end encryption by large companies such as
Facebook gives an advantage to criminals {conversation Facebook}{home
office} is arguably an entirely invalid one. By preventing the usage
of true end-to-end encryption in industry, we will not be able to
prevent those attempting to evade the law from doing so, as shown in
the case of terrorist organisations who have used more obscure
software in the past and also in the case of the abundance of illegal
activity that occurs on the so called dark web in the form of the
trade of drugs and child pornography among others (cite). Instead the
limitation of use of encryption on popular software will only decrease
the privacy of those uninterested in criminal activity and instead
using technology to communicate. In the case of platforms such as
Instagram (which is owned by Facebook) it is quite clear that the vast
majority of communications (cite) will not contain anything illegal
(reword) and that it is these conversations that will suffer from a
lack of encryption. The information exposed by Edward Snowden in 2013
demonstrates that the US government has processed and collected vast
amounts of unencrypted data (cite) and likely continues to do so. In
the case of unencrypted messaging the problem remains and preventing
end to end encryption will simply allow governments to maintain the
status quo of being able to intercept and read all communications
between its citizens and individuals outside of their jurisdictions.

In order to conduct the vast amounts of surveillance they did in the
GDR (German Democratic Republic) in support of the ruling party
{Jarausch}, the Stasi gathered information from a vast network of
informants who greatly outnumbered Stasi agents {Bruce 2014}. Whilst
in Nazi Germany there may have been around 1 Gestapo agent for every
2300 citizens, in the GDR it was closer to 1 informant or officer for
every 63 citizens. Those living in the GDR often had experiences
involving investigation by the Stasi and there was clearly an
understanding amongst citizens {funder} of the GDR that one had to be
wary of an informant or agent listening in. In modern western society
there is a similar collective understanding that governments
attempting to carry out surveillance on a massive scale on their own
citizens. A key distinction, however, is that in societies such as the
UK, this work is not carried out by a vast network of informants,
there are no gargantuan gargantuan stores of paper, and there are no
hundreds of miles of film (cite all) documenting and aiding the
surveillance of the authorities. Instead, there 

As with any technology, regulation has followed behind development in
an attempt to control its limits. Much as automotive regulation
followed the increase in popularity of cars in areas such as the UK
and US, regulation will no doubt follow the newfound popularity of
heavy encryption. There are however, difference in the case of
encryption when compared to cars. The rate of change with modern
technology is far greater. There are already discussions about quantum
computers and their potential to overcome current encryption methods.
In the case of encryption regulation will continuously struggle to
control encryption methods due in part to how quickly they change, but
perhaps moreso due to their decentralised nature, where a government
cannot prevent the existence of software that enables encryption which
is open source and reproducible internationally. Just as media privacy
through torrents and access to hidden services over tor are possible
without significant regulation, regulation of encryption may prove
impossible.

Concerns exist with digital technologies on at a hardware level. The
Intel Management Engine that exists {Intel Management}

{firewall}

.nr HY 0
.ad l