5/12/2017 7 Comments May 12th, 2017Blog 15
https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security This article discusses the NSA’s operations that target the circumvention of encrypted internet communication. One of the main topics that caught my attention in this article is the statement that the NSA actively works with leading technology companies in the attempt to set encryption standards which are ultimately adopted by the technology industry at large due to the powerful companies leading the trend. The NSA influences technology companies to use encryption protocols that the NSA either has the underlying keys to unlock or has the necessary information to brute force its way into decrypting the message. The ethical dilemma that I noticed in this situation is that of the technology companies. They are in an interesting position where a lot of care should be taken due to the amount of unknown consequences that come into play and the widespread use of technology in the day to day life of most people. If the technology companies do not work with the NSA they, in a way, are providing a safe haven for criminals that happen to use their platforms or services to communicate. But, if the technology companies do follow the instructions of the NSA they are not protecting the interests or the privacy of their law abiding customers. No matter the action taken by the technology companies they would be making some amount of compromise between the services they are providing in the area of security and the prevention of misuse of their services. I think that there should be some sort of system where the technology company has some sort of ability to decrypt any messages sent using their services if they are presented with a search warrant by the NSA. With the current system the NSA can simply decrypt any message they want without a warrant, which does not respect the rights of the customers involved.
7 Comments
Fernando Madrigal
5/13/2017 03:16:10 pm
Hello Pearce,
Reply
Salvador Ramirez
5/13/2017 09:23:30 pm
Hello Pearce, I found it interesting that you mentioned how the NSA and big companies are working together to set encryption standards. I feel like this isn't fair because weaker companies are basically being forced to follow along. Definitely unethical.
Reply
Mariel Calande
5/14/2017 01:11:32 pm
I think that the NSA forcing companies to follow their standards is a little problematic. I don't hear of the NSA doing much to actually protect people from criminal activities, so I feel that they are invading the privacy of law abiding citizens more often. I agree that their actions to do respect rights to privacy.
Reply
Cristina Cachux
5/15/2017 10:06:48 pm
for the NSA and large scale companies to be working hand and hand on encryption standards seems very unethical. I do not see how smaller scale companies could have a chance to get their information out there if there are so many hoops to jump through. Seems very monopolized and therefore insanely unfair. Good Post.
Reply
Ian Kindall
5/17/2017 12:23:14 am
So the NSA and large companies get to set the rules that smaller companies have to follow? Sucks to be the little guy in this situation, good luck getting your name out there when the big guys get to dictate how the game is played.
Reply
Samuel
5/17/2017 05:36:22 pm
From my understanding, SHA*, the standard for hashing, was developed and released to the public by the NSA. Moreover, many encryption and hashing functions are developed by the open source community. For me, transparency makes the technology more trustworthy. In practically every other situation, I believe that there should not be a system to access private data the way you had explained.
Reply
Alan Garcia
5/18/2017 12:48:46 pm
It funny to see that the NSA is implying the companies to use certain level in encryption. When them themselves constantly get hacked by other countries. I notice it in an VICE News where they got hacked and only notice months later. Either way, I feel that if one holds the key to security, aimed by hackers, then everything is exposed anyway.
Reply
Leave a Reply. |
AuthorPearce : CS-SE student Archives
May 2017
Categories |