Home
Random
Recent changes
Special pages
Community portal
Preferences
About Commons
Disclaimers
Commons
Search
User menu
Talk
Contributions
Create account
Log in
Editing
Security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
Ok, this is really too big a topic for one article, but we gotta start somewhere. Hopefully we can split it up and sort it out in DA FUCHA. The debate surrounding cyber security is a fierce one, growing ever fiercer as this internet beast develops. On the one hand, the threat of cyber war and cyber terrorism is a real and urgent issue. It's led to new legislation (and amendments to older laws like the notorious FISA from 1978) giving government the power to monitor and record internet activity, as well as use it as evidence in prosecution. OH GOOD WE'RE SAFE. ... . On the other hand, this surveillance is unconstitutional and an invasion of privacy. There are huge potential consequences, short-term and long-term, of giving the government too much power in cyberspace. (I kind of think of the internet as a little fetus right now. For one, Ted Stevens' "series of tubes" image works for both in my head, umbilical cords and shit. But also, the internet is in the gestation phase. It's developing rapidly, but still incredibly vulnerable to external forces that can cause long-lasting birth defects... ya know?) A few clicks into the website for the [[Electronic Frontier Foundation]] that [[user:Isaac| Isaac]] posted recently brought me to [https://ssd.eff.org/foreign this quote] about why we should be thinking about cyber security and all that comes with it: "All of the government surveillance tactics and standards discussed in previous sections relate to law enforcement investigations β that is, investigations for the purpose of gathering evidence for criminal prosecution. However, the government also engages in surveillance in order to combat foreign threats to national security. When it comes to foreign spies and terrorists, the government uses essentially the same tools β searches, wiretaps, pen/traps, subpoenas β but operates under much lower legal standards and in much greater secrecy. It's important that you understand these foreign intelligence surveillance authorities such as the government's access to records using National Security Letters and its wiretapping powers under the Foreign Intelligence Surveillance Act (FISA) so that you can evaluate the risk of such surveillance to you or your organization and defend against it." SECRECY. Surprised? Alright, now I'm going to think a little more about how to organize this. - [[user:armstron2| Anna]]
Summary:
Please note that all contributions to Commons may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Commons:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)