meta data for this page

Critically thought up page

Task for 29.1

search and select three (3) documents (web pages, articles, videos, …) of the topic of your course (Data & Privacy in Critical thinking and Sustainability in Green IT course) and explain why those documents are relevant for the course.

This article is about how the local police at California USA is using a device attached to drones to eavesdrop on thousands of calls without the target noticing it. The device has the capability to intercept phone calls, emails, and text messages. It it used to track and investigate suspects, but at the same time they're violating the privacy of innocent citizens. This can be seen as the same kind of mass surveillance the course book is about. Also the article states that it can force the user out of 3G/4G network by jamming 3G/4G connection. All of this sounds very alarming and illegal.

This article is about the general insecurity of IoT. It mentions a website called shodan, where one can search a database for different kind of devices connected to the internet. Shodan has page where one can see webcam feed from places where they're not supposed to see it. This is very relevant to the course: manufacturers do not want to use money and therefore do not care about the privacy and security issues of their products. The customers simply don't care about their privacy enough to question the security of the devices they buy. Now we have two parties that just don't care. It's simply exhausting…

The US Federal State Commission is trying to fight against the insecure manufacturing. The article states that: “The FTC takes action against companies engaged in deceptive or unfair business practices, she explained. That includes IoT manufacturers who fail to take reasonable measures to secure their devices.”

The news is about another vulnerability found from encryption algorithms. Now that it's well aware what kind of surveillance is being conducted by different authorities, people have started using better end-to-end encryption. But we must remember we are humans, humans make mistakes, and the software is made by humans. I think it's crucial to remember that no software can be totally secure and protect the user from eavesdropping or some other kind of misdoing.