Sie sind auf Seite 1von 4

Bibliographic Reference:

Appelbaum, J., J. Horchert, and C. Stcker (2013), "Shopping for Spy Gear: Catalog Advertises
NSA Toolbox," Spiegel Online International, available at http://www.spiegel.de/intemational/
world/catalog-reveals-nsa-has-back-doorsfor-numerous-devices-a-940994.html, accessed
03.04.2014.
Chiru, C. (2014). PRIVACY ON THE INTERNET IN THE DIGITAL ERA. Economics,
Management and Financial Markets, 9(4), 141-149. Retrieved from
http://ezproxy.liberty.edu:2048/login?url=http://search.proquest.com/docview/1650863424?
accountid=12085
Defence Update (2012), "Chinese-Built Microprocessor Includes Programmable Backdoor,"
URL:
http://defense-update.com/20120603_chinese-built-microprocessor-includesprogrammable-backdoor.html#.UOurZlKKCOO

Zeit Online (2013), Bundesbehrden sehen Risiken beim Einsatz von Windows 8, URL:
http://www.zeit.de.ezproxy.liberty.edu:2048/digital/datenschutz/2013-08/trusted-computingmicrosoft-windows-8-nsa, accessed 05.05.2014.

Objectives:

To inform the reader of how much information can be easily accessed through
ones social media page.
To inform readers that they need to actually read and research a websites privacy
clause before posting too much information.
To inform readers that computer threats are not just from outside the computer but
also from inside.
So that readers are aware that some processers have backdoors, Trojan Horses, or
allow for remote access to the computer even when turned off. Readers need to be
aware of this so that they can research their own personal computer processor to
make sure they keep it safe and secure from hackers.
So that readers know the NSA has a catalog of surveillance tools or devices that
are available and affordable. (Appelbaum, Horchert, and Stocker, 2013)
To get readers thinking about how much privacy there really is on a computer or
social media.

Summary:
In 1990 the internet started by the transmission between HTTP clients and servers. The
internet has changed societys daily habits with the advancement of technology. More and more

data is stored on the internet and the economy is in a new e dimension where everything is
online. With everything being on line, communication followed with the creation of social
media. Social media allowed relationships between people to form and also allows users to
organize and store data that is uploaded or downloaded, along with allowing emailing or
chatting. Some countries such as China regulate internet usage and block some access. This has
caused China to have the highest number of journalists in prison and cyber-dissidents in the
world.
Facebook has rapidly become the largest and most used social media network since its
start in 2004. It originally was created by Mark Zuckerberg and fellow Harvard students for their
fellow on campus students. It then grew to other campuses and eventually to the whole world.
Facebook has been used as a surveillance tool by the CIA. Christopher Satursky, a CIA deputy
direct once said they were astounded that so many people willingly published so much personal
information online. Information such as phone numbers, photos, addresses, and current locations.
Many users are not concerned with their profiles security because they feel that social networks
are a free space to express themselves, so they did not fully (if at all) read the privacy clause they
signed when joining. The privacy clause is deceiving because it says that the users personal data
is safe but it also sells its users personal data to advertising companies.
Some computers have backdoors that allow shortcuts to data without authorization.
Windows, which is widely used by many computer users, has built in trapdoors allowing for
hackers to control or access the systems data. IT experts with in the German government think
Windows computers have a backdoor which could allow the NSA to control a computer
remotely. This is because the TPM structure (Trusted Platform Models) interacts with it to reveal
private information. Core VPro Processors by Intel allow the invasion of peoples privacy and
increases risk of hacking due to the ability to access the PC remotely even while it is turned off.
One of these processors in 2013 was used by the US military. It was found to have a backdoor
that creates a Trojan Horse allowing for thousands of computer systems to be disabled.
The majority of computer security is focused on threats coming from outside the
computer such as firewalls or antivirus protection, but there is still a threat from inside that needs
to be protected as well. The NSA has a catalog of surveillance tools and devices that are
available and affordable to the public. Technology consumers need to be aware of all risks and
threats possible for their systems and have the right tools to protect their privacy.

Results:

In 1990 the internet started by the transmission between a HTTP client and a
server.
Everything is now done through the internet, such as eGovernment, ePayments,
eSchool, ect

Social media enables the formation of relationships between different people


through websites that offer tools to allow the consumer to organize data, upload
and download, chat, email, and provide storage space.
Facebook has allowed the CIA to monitor peoples lives, by viewing what they
post on line.
Facebooks privacy clause is complicated and shows them as deceptive because,
they tell users that their personal data is safe but they sell users data to advertising
companies.
A backdoor of a computer system is a shortcut to different computer resources. It
allows users to access data without needing authentication.
Windows computers have built in trapdoors.
IT experts with in the German government think Windows has a backdoor which
could allow the NSA to control a computer remotely. This is because the TPM
structure (Trusted Platform Models) interacts with it to reveal private information.
Core VPro Processors by Intel allows the invasion of peoples privacy and
increases risk of hacking due to the ability to access the PC remotely even while it
is turned off.
A microprocessor used by the US military and built by the Chinese in 2013 was
discovered by Cambridge University researchers (Defence Update, 2013) to have
a backdoor that creates a Trojan Horse; this Trojan Horse can disable thousands of
computerized systems.
The NSA has a catalog of surveillance tools or devices that are available and
affordable. (Appelbaum, Horchert, and Stocker, 2013)
Computer threats are not just from the outside but also from inside the computer.

Critique:
This article was well written but also left questions and the need for more details or
examples. The article tells reads that the internet grew from 16 million users to 3,005 million
users from 1995 to 2014. This is due to the fact that the internet has changed our habits but it
does not go into detail or give examples of how it has done this. It does tell us that now we have
epayments and egovernment.
It explains what social media is and what it allows the user to do. It goes on to say that
Facebook is the most common, but it does not list other examples. It explains a brief history of
Facebook, which is interesting to read because I did not know if they had to credit Mark
Zuckerbergs fellow students. It does tell a little about Twitter after the history of Facebook, but
only tells what Twitter is. There was availability for expansion on this topic, but it was well
written without it as well.
It was interesting to read that the Chinese put people in jail over what they write on line.
This whole section on restricted internet access was well written and informative. Politics plays a
role in everything especially in the government, it was interesting to read that some countries

fear the internet because it may affect its political stability. It could have listed some of these
countries but it was well written without it as well.
It then goes back to talking more about Facebook; explaining how it is a great tool for
information gathering. It informers the reader that the CIA is surprised how much personal
information we post on Facebook from out phone number, to current location, to home address.
This is all information someone needs to find you. The CIA used this information for its data
collection. It then goes on to inform readers of how they may think their Facebook information is
private but Facebook uses that to sell to advertisements. This is very good information to know
and changes my mind of what I will post on line.
Backdoors and processors that can be accessed when powered off is a security night
mare. It was enlightening to read about how these can be computer threats and that top name
brands may contain them. I was surprised by reading about the US military microprocessor from
China containing a backdoor. This is very scary because it can disable thousands of automated
systems. This information scares me and reassures me that I choose the right career pathway.

Questions:

It only talks about Facbook and mentions Twitter. What other social media
applications/websites have privacy clauses that are two sided or deceiving?
It only mentions China when discussing restricted internet access; I know that some
companies in the US restrict internet access as well. What are the reasons for restricting
usage?
Doesnt blocking websites go against Freedom of speech? Wouldnt writing something on
line be the same as printing thoughts in a magazine or newspaper?
Section four of the article discuss how the CIA is able to use Facebook to monitor the
public, what other social media sites or tools are used to do this?
Are Windows computers today still built with backdoors?
A microprocessor used by the US military and built by the Chinese in 2013 was
discovered by Cambridge University researchers (Defence Update, 2013) to have a
backdoor that creates a Trojan Horse; this Trojan Horse can disable thousands of
computerized systems. Is this microprocessor still in use by the military and did anyone
look into this discover? If so, what were the findings?
Core VPro Processors by Intel allows the invasion of peoples privacy and increases risk
of hacking due to the ability to access the PC remotely even while it is turned off. How
can this be safe; how can a computer be accessed while off and not be easily hacked?

Das könnte Ihnen auch gefallen