This is the Computer / Internet issue that I am interested to that has ethical and social implications to our society nowadays Software Piracy. What is piracy? It is the unauthorized use or reproduction of copyrighted or patented material: or it is robbery. Piracy or Software Piracy is illegal in any law. Software piracy hurts every one in the cyber world even it is cheap many are affected with this crime, the software developers, software owners, and especially the software users. This illegal distribution and duplication of copyrighted software has significant impact to the company. It cost billions of dollars a year in job looses. Yes indeed pirated software is cheap and affordable but do you know the risk in using them?
The risks in using or purchasing Pirated Software are:
Quality. It often lacks key elements and documentation, and comes with no warranty protection or upgrade options.
Viruses. Untested, counterfeit discs may be infected with viruses that will damage your hard drive or cripple your network, without the benefit of technical support.
At Work. Copying or using illegally copied software at work puts the entire company at risk for copyright infringement. Pirated software that is either dysfunctional or that contains viruses wastes company resources and drives up IT costs.
With these risks would still like to use pirated software even they are cheap and affordable but less quality vulnerable to viruses and using copyright software that is illegal? I guess not? I guess some will agree to my opinion that many people here in the Philippines or even in others often purchasing pirated software rather that original ones. Let’s ask why? Many people today are practical when it comes to cost, they still continue to purchase pirated software rather than the original ones without license even their are some bugs in the software and even it is illegal as long as it works. This product doesn’t even meet the customer’s satisfaction due to his poor quality. How will people know that the software they are purchasing is pirated ones? For me their are two ways in differentiating the software if its pirated or not first and foremost check if the software has any software licenses or check if the software is in a box. Second check the price if you find out that it is too cheap for the software then it is pirated.
According to some computer, economics and legal experts believe that if a solution to the so-called software piracy situation were truly desired, then an important first step would be a reexamination of the entire issue by unbiased parties or representatives of all interests and points of view rather than just by those representing the views of the large software developers. However, they are generally aware that this could be very difficult because of the strong forces that favor the status quo, particularly the great political influence of the largest software developers. They also emphasize that the issue could become increasingly irrelevant in the future.
Among the unilateral steps that could be taken were there serious interests on the part of at least some of the major parties involved in achieving a reduction in the so-called software piracy but in the absence of any the policy measures for achieving such solution are:
(1) Adjustment by vendors of proprietary software of their prices to levels that are consistent with the income levels in each country or region. In fact, this could actually result in increased revenue for them due to the greater volume of authorized sales.
(2) Enforcement by national governments of existing antitrust laws and the creation of new ones where necessary in order to increase competition and thereby lower prices so that it is easier for users to purchase software from authorized sources. Ideally, it would be most effective to do this in the countries in which such software is developed. However, in the absence of the political will to do so in such countries, the coordinated enactment and enforcement of such laws in a number of user countries, even the lowest income ones, could still have quite an effect.
(3) A more honest approach by companies that are accusing users of so-called software piracy. This includes (a) stopping the exaggeration of the negative effects, (b) openly admitting and making at least token restitution for the vast amount of damage which has resulted from years of abusive monopoly practices and (c) avoiding the use of nonsensical terminology such as software piracy.
(4) Increased promotion of the use of free software. Because its license always requires that it be available at no monetary cost and encourage the study, modification, extension and redistribution of it, thus, by definition, there can be no such thing as piracy of free software. Indeed, the increased use of free software is likely to become the most effective solution in the long run as its use continues to proliferate as a consequence of successive improvements in its performance, of more people becoming aware of its benefits, and of governments and other organizations continuing to remove the various barriers to its widespread use.
Software piracies social and ethical implication is that with this, many jobs and billion of dollars can be lost with a single pirated CD. People must know that these illegal software damages the developers the owners and the cyber world. So let’s stop piracy because piracy is stealing and stealing is against the law.
Thursday, April 22, 2010
Computer Privacy
One author defines privacy as freedom from inappropriate use of judgement of others.
a.) Is this a good definition why or why not?
b.) Suppose we use this definition do we have a negative rights or do we have a positive rights? why or why not?
It is the ability of an individual or group to keep their lives and personal affairs out of public view, or to control the flow of information about themselves. - wikipedia.com
For the author he defines privacy as freedom from inappropriate use of judgement of others I think its is not a good definition for the word. Privacy is something like to be alone or a freedom for unauthorized intrusions. I don't think that in engaging in our privacy we don't judge other people in some other kind. I think the right word for his definition is the word criticism.
With this definition I thinks we will still have our negative rights and positive rights because a positive right imposes a moral obligation on a person to do something for someone, while a negative right merely obliges others to refrain from interfering with someones attempt to do something. This means that our positive rights are those those rights that are standard to our obligations to the society thus in negative rights, one is considered free to the extent to which no person interferes with his or her activity. for example right to property or right of freedom as long as you don't hurt anybody.
Privacy has no definite boundaries and it has different meanings for different people. Privacy for any people is very important it includes their important information that they their self must only know and it is unethical for people who disturb their privacy.
a.) Is this a good definition why or why not?
b.) Suppose we use this definition do we have a negative rights or do we have a positive rights? why or why not?
It is the ability of an individual or group to keep their lives and personal affairs out of public view, or to control the flow of information about themselves. - wikipedia.com
For the author he defines privacy as freedom from inappropriate use of judgement of others I think its is not a good definition for the word. Privacy is something like to be alone or a freedom for unauthorized intrusions. I don't think that in engaging in our privacy we don't judge other people in some other kind. I think the right word for his definition is the word criticism.
With this definition I thinks we will still have our negative rights and positive rights because a positive right imposes a moral obligation on a person to do something for someone, while a negative right merely obliges others to refrain from interfering with someones attempt to do something. This means that our positive rights are those those rights that are standard to our obligations to the society thus in negative rights, one is considered free to the extent to which no person interferes with his or her activity. for example right to property or right of freedom as long as you don't hurt anybody.
Privacy has no definite boundaries and it has different meanings for different people. Privacy for any people is very important it includes their important information that they their self must only know and it is unethical for people who disturb their privacy.
Monday, April 12, 2010
New List of Computer Virus
OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.
AT&T VIRUS: Every three minutes it tells you what great service you are getting.
MCI VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus.
PAUL REVERE VIRUS: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:>.
POLITICALLY CORRECT VIRUS: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism."
RIGHT TO LIFE VIRUS: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.
ROSS PEROT VIRUS: Activates every component in your system, just before the whole darn thing quits.
MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.
TED TURNER VIRUS: Colorizes your monochrome monitor.
ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll be back.
DAN QUAYLE VIRUS #2: Their is sumthing rong wit your komputer, ewe jsut cant figyour out watt!
GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.
NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of people really mad just thinking about it.
FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of your computer.
GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time. (plus or minus a 3.5 percent margin of error.)
TERRY RANDALL VIRUS: Prints "Oh no you don't" whenever you choose "Abort" from the "Abort" "Retry" "Fail" message.
TEXAS VIRUS: Makes sure that it's bigger than any other file.
ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.
CONGRESSIONAL VIRUS: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.
AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.
FREUDIAN VIRUS: Your computer becomes obsessed with marrying its own motherboard.
PBS VIRUS: Your programs stop every few minutes to ask for money.
ELVIS VIRUS: Your computer gets fat, slow and lazy, then self destructs; only to resurface at shopping malls and service stations across rural America.
OLLIE NORTH VIRUS: Causes your printer to become a paper shredder.
NIKE VIRUS: Just does it.
SEARS VIRUS: Your data won't appear unless you buy new cables, power supply and a set of shocks.
JIMMY HOFFA VIRUS: Your programs can never be found again.
CONGRESSIONAL VIRUS #2: Runs every program on the hard drive simultaneously, but doesn't allow the user to accomplish anything.
KEVORKIAN VIRUS: Helps your computer shut down as an act of mercy.
IMELDA MARCOS VIRUS: Sings you a song (slightly off key) on boot up, then subtracts money from your Quicken account and spends it all on expensive shoes it purchases through Prodigy.
STAR TREK VIRUS: Invades your system in places where no virus has gone before.
HEALTH CARE VIRUS: Tests your system for a day, finds nothing wrong, and sends you a bill for $4,500.
GEORGE BUSH VIRUS: It starts by boldly stating, "Read my docs....No new files!" on the screen. It proceeds to fill up all the free space on your hard drive with new files, then blames it on the Congressional Virus.
CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a 286/AT.
LAPD VIRUS: It claims it feels threatened by the other files on your PC and erases them in "self defense".
CHICAGO CUBS VIRUS: Your PC makes frequent mistakes and comes in last in the reviews, but you still love it.
ORAL ROBERTS VIRUS: Claims that if you don't send it a million dollars, it's programmer will take it back.
AT&T VIRUS: Every three minutes it tells you what great service you are getting.
MCI VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus.
PAUL REVERE VIRUS: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:>.
POLITICALLY CORRECT VIRUS: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism."
RIGHT TO LIFE VIRUS: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.
ROSS PEROT VIRUS: Activates every component in your system, just before the whole darn thing quits.
MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.
TED TURNER VIRUS: Colorizes your monochrome monitor.
ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll be back.
DAN QUAYLE VIRUS #2: Their is sumthing rong wit your komputer, ewe jsut cant figyour out watt!
GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.
NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of people really mad just thinking about it.
FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of your computer.
GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time. (plus or minus a 3.5 percent margin of error.)
TERRY RANDALL VIRUS: Prints "Oh no you don't" whenever you choose "Abort" from the "Abort" "Retry" "Fail" message.
TEXAS VIRUS: Makes sure that it's bigger than any other file.
ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.
CONGRESSIONAL VIRUS: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.
AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.
FREUDIAN VIRUS: Your computer becomes obsessed with marrying its own motherboard.
PBS VIRUS: Your programs stop every few minutes to ask for money.
ELVIS VIRUS: Your computer gets fat, slow and lazy, then self destructs; only to resurface at shopping malls and service stations across rural America.
OLLIE NORTH VIRUS: Causes your printer to become a paper shredder.
NIKE VIRUS: Just does it.
SEARS VIRUS: Your data won't appear unless you buy new cables, power supply and a set of shocks.
JIMMY HOFFA VIRUS: Your programs can never be found again.
CONGRESSIONAL VIRUS #2: Runs every program on the hard drive simultaneously, but doesn't allow the user to accomplish anything.
KEVORKIAN VIRUS: Helps your computer shut down as an act of mercy.
IMELDA MARCOS VIRUS: Sings you a song (slightly off key) on boot up, then subtracts money from your Quicken account and spends it all on expensive shoes it purchases through Prodigy.
STAR TREK VIRUS: Invades your system in places where no virus has gone before.
HEALTH CARE VIRUS: Tests your system for a day, finds nothing wrong, and sends you a bill for $4,500.
GEORGE BUSH VIRUS: It starts by boldly stating, "Read my docs....No new files!" on the screen. It proceeds to fill up all the free space on your hard drive with new files, then blames it on the Congressional Virus.
CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a 286/AT.
LAPD VIRUS: It claims it feels threatened by the other files on your PC and erases them in "self defense".
CHICAGO CUBS VIRUS: Your PC makes frequent mistakes and comes in last in the reviews, but you still love it.
ORAL ROBERTS VIRUS: Claims that if you don't send it a million dollars, it's programmer will take it back.
Monday, April 5, 2010
Privacy and Personal Information
Personal information which regards to medical health of patients is a very crucial file that must not be distributed publicly, these acts of distribution of confidential file containing the names of about 400 AIDS patient sent from a country health department is an absurd act of this disgruntled employee.
One of the reason that technology was made is to lessen the use of paper, using of paper files can be hazardous to our environment, imagine how much trees will be cut to make our notebooks, newspapers and other paper documents, and paper documents can also be unsafe for those lawbreakers who violate the laws of privacy. Paper files can be easily lost, burned, or even stolen by those "disgruntled people" because they are only kept in file cabinets or folders that can be easily be found.
I agree in using electronic files rather than paper files because electronic files can be stored to a database and also can be retrieve rapidly, and a quality of technology that must not be disregarded, Security. Electronic files also has a great security for those hackers whose target is to get files and scatter them or keeping it for themselves. Hacking electronic files is a crucial thing to do which requires usernames and password and even IP addresses (Online) that only the administrator or the Chief Security Officer of the organization knows. For example in a MMORPG game if you get caught hacking other players accounts you will be banned and that’s only in a game, what about if you hacked a crucial document for example the confidential files with 400 AIDS patients, I think its worse than getting banned maybe sentence on jail or paying hundreds of thousands of dollars or pesos.
In this active modern technology spreading and continually improving, using of paper files must be minimized in keeping confidential file rather use electronic files to be easily stored, retrieve and secured.
One of the reason that technology was made is to lessen the use of paper, using of paper files can be hazardous to our environment, imagine how much trees will be cut to make our notebooks, newspapers and other paper documents, and paper documents can also be unsafe for those lawbreakers who violate the laws of privacy. Paper files can be easily lost, burned, or even stolen by those "disgruntled people" because they are only kept in file cabinets or folders that can be easily be found.
I agree in using electronic files rather than paper files because electronic files can be stored to a database and also can be retrieve rapidly, and a quality of technology that must not be disregarded, Security. Electronic files also has a great security for those hackers whose target is to get files and scatter them or keeping it for themselves. Hacking electronic files is a crucial thing to do which requires usernames and password and even IP addresses (Online) that only the administrator or the Chief Security Officer of the organization knows. For example in a MMORPG game if you get caught hacking other players accounts you will be banned and that’s only in a game, what about if you hacked a crucial document for example the confidential files with 400 AIDS patients, I think its worse than getting banned maybe sentence on jail or paying hundreds of thousands of dollars or pesos.
In this active modern technology spreading and continually improving, using of paper files must be minimized in keeping confidential file rather use electronic files to be easily stored, retrieve and secured.
Labels:
Computer,
Computer Games,
Computer Information,
Online Games
Friday, April 2, 2010
Computer Ethics
1. Discuss how adherents of ethical egoism and altruism could analyze the following situation:
Case 1:
Roger plans to buy licensed software in the US using his royalties from the sales of his book on computer ethics and donate the software to her alma mater.
Ethical Egoism:
In Roger's ethical egoism he ought to do what is its own self interest which is to buy a licensed software using his own royalties and donate it to his alma mater.
Ethical Altruism:
But under his Ethical Altruism is it really his obligations to purchase this license software and donate it in order to benefit his Alma matter? But rather it his own self interest that he will donate a license software for his alma mater
Case 2:
Bamba debugged a secret code of the NBI that allowed her to access all computer systems if the agency. She plans to sabotage the whole system as a form of revenge to she considered to be the NBI's violation of human rights
Ethical Egoism:
The Ethical Egoism of Bamba that is to debug a secret code of the NBI to access all the computers as the form of her revenge to the organization is her interest in doing so but it is also unethical to debug a secret code and sabotage an organization by the form of revenge.
Ethical Altruism:
Bamba has her moral obligation and has swear to the organizations ought that to serve the organization and as I believe that each individual employee understands the organizations vision mission goals and more importantly the core values to achieve the goal of the organization. Bamba's act to sabotage the NBI is unethical, immoral and unlawful to the society’s standards that would not help, serve and benefit others.
Case 3:
Marjo wants to create a computer virus that would affect only laptop operations.
Ethical Egoism:
Marjo ethical egoism which deals with creating computer virus that would affect only laptop operation is only his self interest in doing so maybe so that he will be acknowledge, to gain popularity or maybe just for fun.
Ethical Altruism:
Under Marjo's ethical altruism will Marjo's computer virus able to help, serve, and benefit others and is it his moral obligation to produce this computer virus? This action of creating a computer virus that would only affect or damage only laptop operations is harmful to people who uses laptops and rather will not help them or even they will not get benefits and just causes
damages to their hardware.
2. Which among the finalist theory appeals to you most (John Stuarts, Mill's, Utilitarianism, Immanuel Kants, Categorical Imperatives and Aristotle Nicomachean Ethics)
All finalist theorist are really interesting to me, Utilitarianism which deals with the rightness or wrongness of an action is determined by its usefulness in bringing about the most happiness, Categorical Imperatives dealing with reasoning or rationalizing and Nicomachean Ethics which deals with virtues. But the only one that appeals to me most is that by Immanuel Kants Categorical Imperatives or moral law, "Act as if the maxim from which you act were to become through your will a universal law.". This law has its source in the autonomy of a rational being, and it is the formula for an absolutely good will. We human beings have the ability to rationalize and to know what are good or bad that would centers our moral laws.
3. Which among the theories seems to predominate in the world of computing as you know it.
For me among those finalist theories the most dominant of all when it comes to the world of computing is the by John Stuarts Utilitarianism because whether we know it is good or bad as long as we are happy of what we are doing. We all know that pornography in an illegal term is bad but more people "hooked" to it for their sexual pleasure, or even creating viruses, web hacking, or even software piracy these actions as we all know are bad but still many people does it because they are happy about it, the trends today whether we like it or not is most people like to be happy or rather than to follow the society moral laws and even his or her virtue.
Case 1:
Roger plans to buy licensed software in the US using his royalties from the sales of his book on computer ethics and donate the software to her alma mater.
Ethical Egoism:
In Roger's ethical egoism he ought to do what is its own self interest which is to buy a licensed software using his own royalties and donate it to his alma mater.
Ethical Altruism:
But under his Ethical Altruism is it really his obligations to purchase this license software and donate it in order to benefit his Alma matter? But rather it his own self interest that he will donate a license software for his alma mater
Case 2:
Bamba debugged a secret code of the NBI that allowed her to access all computer systems if the agency. She plans to sabotage the whole system as a form of revenge to she considered to be the NBI's violation of human rights
Ethical Egoism:
The Ethical Egoism of Bamba that is to debug a secret code of the NBI to access all the computers as the form of her revenge to the organization is her interest in doing so but it is also unethical to debug a secret code and sabotage an organization by the form of revenge.
Ethical Altruism:
Bamba has her moral obligation and has swear to the organizations ought that to serve the organization and as I believe that each individual employee understands the organizations vision mission goals and more importantly the core values to achieve the goal of the organization. Bamba's act to sabotage the NBI is unethical, immoral and unlawful to the society’s standards that would not help, serve and benefit others.
Case 3:
Marjo wants to create a computer virus that would affect only laptop operations.
Ethical Egoism:
Marjo ethical egoism which deals with creating computer virus that would affect only laptop operation is only his self interest in doing so maybe so that he will be acknowledge, to gain popularity or maybe just for fun.
Ethical Altruism:
Under Marjo's ethical altruism will Marjo's computer virus able to help, serve, and benefit others and is it his moral obligation to produce this computer virus? This action of creating a computer virus that would only affect or damage only laptop operations is harmful to people who uses laptops and rather will not help them or even they will not get benefits and just causes
damages to their hardware.
2. Which among the finalist theory appeals to you most (John Stuarts, Mill's, Utilitarianism, Immanuel Kants, Categorical Imperatives and Aristotle Nicomachean Ethics)
All finalist theorist are really interesting to me, Utilitarianism which deals with the rightness or wrongness of an action is determined by its usefulness in bringing about the most happiness, Categorical Imperatives dealing with reasoning or rationalizing and Nicomachean Ethics which deals with virtues. But the only one that appeals to me most is that by Immanuel Kants Categorical Imperatives or moral law, "Act as if the maxim from which you act were to become through your will a universal law.". This law has its source in the autonomy of a rational being, and it is the formula for an absolutely good will. We human beings have the ability to rationalize and to know what are good or bad that would centers our moral laws.
3. Which among the theories seems to predominate in the world of computing as you know it.
For me among those finalist theories the most dominant of all when it comes to the world of computing is the by John Stuarts Utilitarianism because whether we know it is good or bad as long as we are happy of what we are doing. We all know that pornography in an illegal term is bad but more people "hooked" to it for their sexual pleasure, or even creating viruses, web hacking, or even software piracy these actions as we all know are bad but still many people does it because they are happy about it, the trends today whether we like it or not is most people like to be happy or rather than to follow the society moral laws and even his or her virtue.
Cryptography
1. What is an important difference between public key cryptography and secret key cryptography?
Public key cryptography or Asymmetric key
• Based on the concept of a key pair
• The key pair is designated and associated to one, and only one, trading partner
• Each half of the pair (one key) can encrypt information that only the other half (one key) can decrypt
Secret key Cryptography or Symmetric-key algorithms
• Identical keys are used to encrypt and decrypt the message
• A message encrypted by one specific symmetric key can only be decrypted by using the same key, it can be decrypted with a different key
2. What kinds of Information do Echelon Collects?
Echelon apparently collects different data in several ways. Reports suggest it has massive ground based radio antennae to intercept satellite transmissions. In addition, some sites reputedly are tasked with tapping surface traffic
Echelon uses numerous satellites to catch "spillover" data from transmissions between cities. These satellites then beam the information down to processing centers on the ground.
Echelon also routinely intercepts Internet transmissions. The organization allegedly has installed numerous "sniffer" devices. These "sniffers" collect information from data packets as they traverse the Internet via several key junctions. It also uses search software to scan for web sites that may be of interest.
Furthermore, it is believed that Echelon has even used special underwater devices which tap into cables that carry phone calls across the seas. According to published reports, American divers were able to install surveillance devices on to the underwater cables. One of these taps was discovered in 1982, but other devices apparently continued to function undetected.
It is not known at this point whether Echelon has been able to tap fiber optic phone cables.
3. Describe at least three different kinds of uses of encryption that has a social value. Indicate why they are important.
The Social implication of Encryption are:
• Data Security -By transforming information to unreadable form confidential information tends to be secured to anyone.
• Knowledge -By translating of readable message to a secret code which tends other people will not understand to read and must need special knowledge to decrypt.
• Incomprehensible - People that don’t understand tends to be discouraged from reading or copying the messages.
Public key cryptography or Asymmetric key
• Based on the concept of a key pair
• The key pair is designated and associated to one, and only one, trading partner
• Each half of the pair (one key) can encrypt information that only the other half (one key) can decrypt
Secret key Cryptography or Symmetric-key algorithms
• Identical keys are used to encrypt and decrypt the message
• A message encrypted by one specific symmetric key can only be decrypted by using the same key, it can be decrypted with a different key
2. What kinds of Information do Echelon Collects?
Echelon apparently collects different data in several ways. Reports suggest it has massive ground based radio antennae to intercept satellite transmissions. In addition, some sites reputedly are tasked with tapping surface traffic
Echelon uses numerous satellites to catch "spillover" data from transmissions between cities. These satellites then beam the information down to processing centers on the ground.
Echelon also routinely intercepts Internet transmissions. The organization allegedly has installed numerous "sniffer" devices. These "sniffers" collect information from data packets as they traverse the Internet via several key junctions. It also uses search software to scan for web sites that may be of interest.
Furthermore, it is believed that Echelon has even used special underwater devices which tap into cables that carry phone calls across the seas. According to published reports, American divers were able to install surveillance devices on to the underwater cables. One of these taps was discovered in 1982, but other devices apparently continued to function undetected.
It is not known at this point whether Echelon has been able to tap fiber optic phone cables.
3. Describe at least three different kinds of uses of encryption that has a social value. Indicate why they are important.
The Social implication of Encryption are:
• Data Security -By transforming information to unreadable form confidential information tends to be secured to anyone.
• Knowledge -By translating of readable message to a secret code which tends other people will not understand to read and must need special knowledge to decrypt.
• Incomprehensible - People that don’t understand tends to be discouraged from reading or copying the messages.
Cryptography
1. What is an important difference between public key cryptography and secret key cryptography?
Public key cryptography or Asymmetric key
• Based on the concept of a key pair
• The key pair is designated and associated to one, and only one, trading partner
• Each half of the pair (one key) can encrypt information that only the other half (one key) can decrypt
Secret key Cryptography or Symmetric-key algorithms
• Identical keys are used to encrypt and decrypt the message
• A message encrypted by one specific symmetric key can only be decrypted by using the same key, it can be decrypted with a different key
2. What kinds of Information do Echelon Collects?
Echelon apparently collects different data in several ways. Reports suggest it has massive ground based radio antennae to intercept satellite transmissions. In addition, some sites reputedly are tasked with tapping surface traffic
Echelon uses numerous satellites to catch "spillover" data from transmissions between cities. These satellites then beam the information down to processing centers on the ground.
Echelon also routinely intercepts Internet transmissions. The organization allegedly has installed numerous "sniffer" devices. These "sniffers" collect information from data packets as they traverse the Internet via several key junctions. It also uses search software to scan for web sites that may be of interest.
Furthermore, it is believed that Echelon has even used special underwater devices which tap into cables that carry phone calls across the seas. According to published reports, American divers were able to install surveillance devices on to the underwater cables. One of these taps was discovered in 1982, but other devices apparently continued to function undetected.
It is not known at this point whether Echelon has been able to tap fiber optic phone cables.
3. Describe at least three different kinds of uses of encryption that has a social value. Indicate why they are important.
The Social implication of Encryption are:
• Data Security -By transforming information to unreadable form confidential information tends to be secured to anyone.
• Knowledge -By translating of readable message to a secret code which tends other people will not understand to read and must need special knowledge to decrypt.
• Incomprehensible - People that don’t understand tends to be discouraged from reading or copying the messages.
Public key cryptography or Asymmetric key
• Based on the concept of a key pair
• The key pair is designated and associated to one, and only one, trading partner
• Each half of the pair (one key) can encrypt information that only the other half (one key) can decrypt
Secret key Cryptography or Symmetric-key algorithms
• Identical keys are used to encrypt and decrypt the message
• A message encrypted by one specific symmetric key can only be decrypted by using the same key, it can be decrypted with a different key
2. What kinds of Information do Echelon Collects?
Echelon apparently collects different data in several ways. Reports suggest it has massive ground based radio antennae to intercept satellite transmissions. In addition, some sites reputedly are tasked with tapping surface traffic
Echelon uses numerous satellites to catch "spillover" data from transmissions between cities. These satellites then beam the information down to processing centers on the ground.
Echelon also routinely intercepts Internet transmissions. The organization allegedly has installed numerous "sniffer" devices. These "sniffers" collect information from data packets as they traverse the Internet via several key junctions. It also uses search software to scan for web sites that may be of interest.
Furthermore, it is believed that Echelon has even used special underwater devices which tap into cables that carry phone calls across the seas. According to published reports, American divers were able to install surveillance devices on to the underwater cables. One of these taps was discovered in 1982, but other devices apparently continued to function undetected.
It is not known at this point whether Echelon has been able to tap fiber optic phone cables.
3. Describe at least three different kinds of uses of encryption that has a social value. Indicate why they are important.
The Social implication of Encryption are:
• Data Security -By transforming information to unreadable form confidential information tends to be secured to anyone.
• Knowledge -By translating of readable message to a secret code which tends other people will not understand to read and must need special knowledge to decrypt.
• Incomprehensible - People that don’t understand tends to be discouraged from reading or copying the messages.
Subscribe to:
Posts (Atom)