Preview

Digital Fortress

Satisfactory Essays
Open Document
Open Document
278 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Fortress
"As a precaution, every file entering TRANSLTR had to pass through what was known as Gauntlet- a series of powerful circuit-level gateways, packet filters, and disinfectant programs that scanned inbound files for computer viruses and potentially dangerous subroutines." Chapter 9 (Page 60) This passage confirms my previous prediction of the book having a technology based theme. This passage is a great example because of the fact it contains much information about the Gauntlet, the program built to protect the super computer TRANSLTR. "Susan's eyes locked on the screen. Her mind searched desperately for some other explanation, but there was none. It was proof- sudden and inescapable: Tankado had used mutation strings to create a rotating cleartext function, and Hale had conspired with him to bring down the NSA" Chapter 36 (page 191) This passage gives us a clear indication of the conspiracy theory that I predicted earlier. However in this case it is two people conspiring against the NSA, instead of a government conspiracy. Also in this passage we learn more about the program Digital Fortress, the unbreakable algorithm. "Strathmore's vision had been bold - a world encryption standard with a back door for the NSA" Chapter 96 (page 412) This passage shows the government conspiracy aspect of the book. Strathmore is the head of cryptography section of the NSA, and he had planned to put a back door in the computer program Digital Fortress. His back door key would allow him access to decrypt anything that was out on the internet without the public or the EFF, the leading civil liberties group defending rights in the digital world, knowing what he was

You May Also Find These Documents Helpful

  • Better Essays

    Along with this new approach to spying, a new approach to the system of passing messages was introduced as well. The punishment for accused spies, especially spies with evidence, was unavoidable. Suspected spies were hung without question, spies with evidence were walking death traps. New measures needed to be taken in order to protect the spies. Advances in anything from coded messages and fake identities to invisible ink were now being utilized to insure the spy’s safety.…

    • 1287 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The main argument this book explores is not between humanists and scientists, but between technology and everybody else. Most people believe that technology is a friend. It is a friend that asks for trust and obedience, which most give because its gifts are bountiful. The dark side it that it creates a culture without moral foundation, undermines certain mental processes and social relations that make human life worth living. Technology is both a friend and enemy. The book tries to explain when, how and why technology became a particularly dangerous enemy.…

    • 1066 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The argument being presented in the given piece is the FBI asking permission from Apple to have the ability to access people’s private messages in their apple products. This argument came into conversation after the terrorist attack in San Bernardino, California. The author’s claim towards the argument is that the FBI should not be able to have the ability to tap into people’s individual cell phones. Although the FBI’s idea of decoding Apple’s encryption code in order to gain access to tapping into all iPhones under service, it seems that the cons outweigh the pros of this certain situation. However, there has to be a completely different way the FBI can develop a better way to combat terrorism without interfering with all of Apple’s customers.…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Better Essays

    The Act, aimed at updating both the Foreign Intelligence Surveillance Act of 1978 and the Electronics Communications Privacy Act of 1986 is composed of 10 titles all of which were hurried through Congress on October 24th, 2001 and passed the senate the following day, “…with little deliberation. Unlike a typical statute, neither the House of Representatives nor the Senate issued a report on the PATRIOT act.” (Standler, 2007-2008, p. 4) To this day, the Patriot Act remains controversial; its supporters uphold it as a requirement for The War on Terrorism and for the enforcement of modern electronic communications law. The Act’s critics cite its numerous infringements on civil and individual rights. Title II, considered the most controversial, deals directly with surveillance, wiretapping, and computer fraud. Title II also details sanctions placed on trade with the Taliban, Syria and North Korea. The Patriot Act’s Title II, Enhanced Surveillance Procedures is a breach of privacy and infringes upon the tenants of our Fourth Amendment rights.…

    • 1280 Words
    • 6 Pages
    Better Essays
  • Good Essays

    America is known as the land of the free. We go to bed at night thinking we are completely safe but is that 100% true? The NSA is short for the National Security Agency and is responsible for global monitoring, collection, decoding, translation and analysis of information and data for foreign intelligence and counterintelligence purposes. Bamford effectively appeals to reason, authority, and emotion to aid his argument that the NSA has been corrupt in keeping us safe by leaking confidential information with an Israeli military organization.…

    • 578 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Technology proceeds to progress at such a fast pace that the idea of our technology matching the novel's is not at all impossible. In Fahrenheit 451, Bradbury describes…

    • 608 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Throughout the story, technology is viewed as a very dangerous subject. A subject that requires ten or more men to come up with something…

    • 604 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Indivdual Assignment

    • 358 Words
    • 2 Pages

    “Does the massive use of Big Brother surveillance technologies make you feel safer because it can protect you from crime, or less safe because of possible violations of your civil liberties? Will you be more careful now using communication technologies, knowing that anything you type or send electronically could be reconstructed and used to judge your lawfulness or your character?”…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Technology has magnificent impact on human lives. When it benefits, creates many positive effects in our lives, but when misuse of technology occurs it can destroy the lives. Author Ray Bradbury in “Fahrenheit 451” describes such a phenomenon use of technology, and its impact on Montag’s town is an incredible experience to go through by reading. Bradbury uses appropriate symbols such as Mechanical Hound in order to control society as physically, Television walls broadcasting commercial, and Seashell Radio which gives instructions to influence people mentally, and firemen who use technology in contrast to present firemen’s use of devices.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The History of COINTELPRO begins almost at the time of the FBI’s inception in 1948.…

    • 943 Words
    • 4 Pages
    Better Essays
  • Good Essays

    The writer has focussed on exclusive language to strengthen his argument by directly involving the reader in the issue in the phrase “we adore technology and so we are its slaves”. The phrase would make the reader feel that he or she is also affected by the use of “technology”. The writer has developed his argument by saying that technology has changed the way people communicate, exercise and live and also she use imaginary image of cartoon to make the reader realize how technology waste our precious time . In contrast the writer has uses generalization in the phrase “in the 19th century,…

    • 753 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Role of Federal Agencies

    • 802 Words
    • 4 Pages

    References: Snow G M 20120412 TestimonySnow, G. M. (2012, April 12). Testimony. Retrieved August 21, 2012, from http://www.fbi.gov…

    • 802 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Mysterious Conspiracies

    • 1521 Words
    • 7 Pages

    For years and even centuries, there has been a long conflict about Conspiracies; whether it 's the strange tragedy with Princess Diana or the horrific assassinations of Abraham Lincoln and JFK. These peculiar tales have been arousing over the years and have been given strong attention to the public eye. They have raised questions that have not yet been completely answered, gave rise to conspiracy theories that in some cases have not yet been disproven, and brought about myths and rumors that have not yet been completely put to rest.…

    • 1521 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    digital literacy by josie

    • 959 Words
    • 4 Pages

    6. “Not just at the level of the very basics of operating a computer but actually understanding how the code and mechanics behind it work. In the same way that if all you had was oral communication and you didn’t have writing, you really wouldn’t understand the logic of our society.”…

    • 959 Words
    • 4 Pages
    Satisfactory Essays