Preview

Digital Fortress

Satisfactory Essays
Open Document
Open Document
278 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Fortress
"As a precaution, every file entering TRANSLTR had to pass through what was known as Gauntlet- a series of powerful circuit-level gateways, packet filters, and disinfectant programs that scanned inbound files for computer viruses and potentially dangerous subroutines." Chapter 9 (Page 60) This passage confirms my previous prediction of the book having a technology based theme. This passage is a great example because of the fact it contains much information about the Gauntlet, the program built to protect the super computer TRANSLTR. "Susan's eyes locked on the screen. Her mind searched desperately for some other explanation, but there was none. It was proof- sudden and inescapable: Tankado had used mutation strings to create a rotating cleartext function, and Hale had conspired with him to bring down the NSA" Chapter 36 (page 191) This passage gives us a clear indication of the conspiracy theory that I predicted earlier. However in this case it is two people conspiring against the NSA, instead of a government conspiracy. Also in this passage we learn more about the program Digital Fortress, the unbreakable algorithm. "Strathmore's vision had been bold - a world encryption standard with a back door for the NSA" Chapter 96 (page 412) This passage shows the government conspiracy aspect of the book. Strathmore is the head of cryptography section of the NSA, and he had planned to put a back door in the computer program Digital Fortress. His back door key would allow him access to decrypt anything that was out on the internet without the public or the EFF, the leading civil liberties group defending rights in the digital world, knowing what he was

You May Also Find These Documents Helpful

  • Better Essays

    Along with this new approach to spying, a new approach to the system of passing messages was introduced as well. The punishment for accused spies, especially spies with evidence, was unavoidable. Suspected spies were hung without question, spies with evidence were walking death traps. New measures needed to be taken in order to protect the spies. Advances in anything from coded messages and fake identities to invisible ink were now being utilized to insure the spy’s safety.…

    • 1287 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Better Essays

    The Act, aimed at updating both the Foreign Intelligence Surveillance Act of 1978 and the Electronics Communications Privacy Act of 1986 is composed of 10 titles all of which were hurried through Congress on October 24th, 2001 and passed the senate the following day, “…with little deliberation. Unlike a typical statute, neither the House of Representatives nor the Senate issued a report on the PATRIOT act.” (Standler, 2007-2008, p. 4) To this day, the Patriot Act remains controversial; its supporters uphold it as a requirement for The War on Terrorism and for the enforcement of modern electronic communications law. The Act’s critics cite its numerous infringements on civil and individual rights. Title II, considered the most controversial, deals directly with surveillance, wiretapping, and computer fraud. Title II also details sanctions placed on trade with the Taliban, Syria and North Korea. The Patriot Act’s Title II, Enhanced Surveillance Procedures is a breach of privacy and infringes upon the tenants of our Fourth Amendment rights.…

    • 1280 Words
    • 6 Pages
    Better Essays
  • Good Essays

    However, he only appeals to emotion twice throughout his article. First, he explains how “Mr. Snoden told [him] that the document reminded him of the F.B.I.’s overreach during the days of J. Edgar Hoover, when the bureau abused its powers to monitor and harass political activists” (Bamford), which suggests the government has been corrupt in the past. Bamford then appeals to emotion by explaining that what the NSA is doing “[is] much like how the F.B.I. tried to use Martin Luther King’s infidelity to talk him into killing himself”(Bamford 1), which should make any American think twice about who we put in charge to keep us…

    • 578 Words
    • 3 Pages
    Good Essays
  • Good Essays

    George Orwell’s 1984 is connected to The Patriot Act because both governments operate in a…

    • 601 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    "Espionage Act Has Been Used To Silence Dissent In The Past." Mike Church. N.p., 21 May…

    • 2121 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Throughout the story, technology is viewed as a very dangerous subject. A subject that requires ten or more men to come up with something…

    • 604 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Indivdual Assignment

    • 358 Words
    • 2 Pages

    “Does the massive use of Big Brother surveillance technologies make you feel safer because it can protect you from crime, or less safe because of possible violations of your civil liberties? Will you be more careful now using communication technologies, knowing that anything you type or send electronically could be reconstructed and used to judge your lawfulness or your character?”…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Technology has magnificent impact on human lives. When it benefits, creates many positive effects in our lives, but when misuse of technology occurs it can destroy the lives. Author Ray Bradbury in “Fahrenheit 451” describes such a phenomenon use of technology, and its impact on Montag’s town is an incredible experience to go through by reading. Bradbury uses appropriate symbols such as Mechanical Hound in order to control society as physically, Television walls broadcasting commercial, and Seashell Radio which gives instructions to influence people mentally, and firemen who use technology in contrast to present firemen’s use of devices.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The History of COINTELPRO begins almost at the time of the FBI’s inception in 1948.…

    • 943 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Role of Federal Agencies

    • 802 Words
    • 4 Pages

    References: Snow G M 20120412 TestimonySnow, G. M. (2012, April 12). Testimony. Retrieved August 21, 2012, from http://www.fbi.gov…

    • 802 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The writer has focussed on exclusive language to strengthen his argument by directly involving the reader in the issue in the phrase “we adore technology and so we are its slaves”. The phrase would make the reader feel that he or she is also affected by the use of “technology”. The writer has developed his argument by saying that technology has changed the way people communicate, exercise and live and also she use imaginary image of cartoon to make the reader realize how technology waste our precious time . In contrast the writer has uses generalization in the phrase “in the 19th century,…

    • 753 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Mysterious Conspiracies

    • 1521 Words
    • 7 Pages

    For years and even centuries, there has been a long conflict about Conspiracies; whether it 's the strange tragedy with Princess Diana or the horrific assassinations of Abraham Lincoln and JFK. These peculiar tales have been arousing over the years and have been given strong attention to the public eye. They have raised questions that have not yet been completely answered, gave rise to conspiracy theories that in some cases have not yet been disproven, and brought about myths and rumors that have not yet been completely put to rest.…

    • 1521 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Chapter 3 begins with Susan passing through many security checkpoints at the NSA. While she is entering the Crypto dome, she thinks about David. She gives detailed descriptions of David's achievements, assets, and appearance. "Becker was dark--rugged, youthful thirty-five with sharp green eyes and a wit to match." [pg 8] She recalls how the two of them met, when David was at the NSA earning extra money by translating some work. After he completed his assigned task, the head Cryptographer decided to have a word with him. Soon afterwards, the two were caught in a long conversation. "Their courtship was slow and romantic-stolen escapes whenever their schedules permitted, long walks through the Georgetown campus, late-nite cappuccinos at Merlutti's, occasional lectures and concerts." [pg 12] The two lovers developed their relationship slowly and engaged in many deep conversations. Susan describes how David was always so eager…

    • 8147 Words
    • 32 Pages
    Powerful Essays
  • Satisfactory Essays

    digital literacy by josie

    • 959 Words
    • 4 Pages

    6. “Not just at the level of the very basics of operating a computer but actually understanding how the code and mechanics behind it work. In the same way that if all you had was oral communication and you didn’t have writing, you really wouldn’t understand the logic of our society.”…

    • 959 Words
    • 4 Pages
    Satisfactory Essays