Tuesday, October 10, 2023
A.I.'s Displacement of Human Jobs
Whistleblowers
Keeping the government honest is a job of the public and government honesty is maintained in a significant way thanks to whistleblowers. A whistleblower is a person who reports wrongdoing misconduct, or unethical behavior within a government institution or agency. They serve as watchdogs who reveal corruptions, power abuse, and demand accountability.
Tuesday, October 3, 2023
The Five Eyes
The Five Eyes?
The Five Eyes is an Intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UK-USA Agreement, a treaty for joint cooperation in signals intelligence, but what does that actually mean? Let's start by breaking it down bit by bit.
"An intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UK-USA Agreement, a treaty for joint cooperation in signals intelligence."
Breaking it down piece by piece, I'll start from the beginning:
- Intelligence Alliance: An alliance where the participating members engage in intelligence gathering and security.
- Multilateral: "Agreed upon or participated in by three or more parties, especially the governments of different countries."
- UK-USA Agreement: Multilateral agreement for cooperation in signals intelligence between AU, CA, NZ, UK, & US. The 7 page agreement that is recognized as one of the most important documents from the Cold War.
- Signals Intelligence: Intelligence gathering by interception of signals, whether communications through people or from electronic signals not directly used in communication.
Often referred to as the world’s most significant intelligence alliance. The original group of 5 English speaking countries and their security agencies (Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, and the National Security Agency of the USA) was formed in the year that followed WW2 in an “effort to share intelligence in the interest of National Security.” After WW2 the UK-USA Agreement was signed between what would become the NSA and the GCHQ (National Security Agency and Britain's Government Communications Headquarters). Eventually as it grew, specifically during the Cold War, British and U.S. intelligence agencies banded together to share signals intelligence.
The agreement initially confined to the UK and the US, but expanded to include Canada, Australia, and New Zealand by 1956. The agreement did not become public knowledge until 2005, and then it took another 5 years until the full text of the UK-USA Agreement was released by the British and American governments, this is also when it was first recognized. The Five Eyes collaborates with Third Party countries like Denmark, France, Norway, and the Netherlands, becoming known as the Nine Eyes, and then later on the Fourteen Eyes, including Belgium, Germany, Italy, Spain, and Sweden. All information was available to the Five Eyes from the Nine and Fourteen Eyes and partners. The Nine eyes had access to all information from the Fourteen eyes and partners, but not vice versa. There was a lot of gatekeeping of information that happened.
The Five Eyes alliance is a powerful intelligence network that upholds national security and tackles global threats, contributing to public safety. However, this power comes with a price: the blurred line between surveillance for safety and invasion of privacy. Edward Snowden's 2013 revelations highlighted the precarious balance between security and individual privacy rights. Our digital footprints, such as emails, phone calls, online shopping, and social media activity, could be open books, potentially read without our knowledge or consent. This reality fuels ongoing debates about privacy, state power, and civil liberties. The Five Eyes alliance's activities highlight the need for a delicate balance between security and individual rights, as privacy forms a cornerstone of democratic societies.
https://en.wikipedia.org/wiki/Five_Eyes
https://www.techtarget.com/whatis/definition/Five-Eyes-Alliance
https://www.forbes.com/advisor/business/what-is-five-eyes/#:~:text=Five%2C%20Nine%20and%2014%20Eyes%20Alliances&text=The%20Nine%20Eyes%20alliance%20includes,%2C%20Italy%2C%20Spain%20and%20Sweden
Our Privacy
Privacy is a subject that I didn't know much about, nor did I want to learn more about it, specifically the security of our privacy. I knew it was important, but didn't want to bother with it and just thought it wasn't something that would pertain to me. "With so many people in the world, why would my data be target." was probably my thought process. Taking this class and listening to a handful of interviews, TED Talks, and documentaries has taught me about the importance of protecting our privacy.
A great case that involves a breach in the privacy of myself, my family and my friends' is that of our cell phones. Cell phones are essential communication tools in modern life, but they can also infringe on individual privacy. Knowing where a person's phone is located can reveal sensitive information, such as medical appointments, political activities, and sleep patterns. Law enforcement agencies can obtain this information without a warrant, and the federal government can use surveillance authorities to collect call records, contact lists, and text messages. This can compromise individual privacy and the security of personal information.
Government organizations are lagging in setting cybersecurity guidelines for mobile devices, with 45% of the public sector lacking an acceptable-use policy. This lack of proper security measures can be harmful, particularly if dealing with confidential information. The Federal Mobility Group (FMG), chartered by the Federal CIO Council, has released a mobile management ecosystem that includes four strategic pillars: Unified Endpoint Management, Mobile Threat Defense, Native Mobile OS Security Functionality, and Mobile App Vetting. The government must evolve their policies and take proper precautions to counter potential threats and ensure the safety of all mobile devices. By implementing these measures, the government can better protect its citizens and ensure the security of mobile devices.
To avoid constant surveillance, it's crucial to pay attention to your online activities and use a reliable proxy service to change your IP address. Encrypt your systems and store backups to protect your data. It's essential to consider how much information you should share on the web, as everything you say can be tracked and collated in a digital file. This privacy invasion is a complete invasion, and it's essential to protect yourself and your data.
It's essential to stay aware of potential threats and take steps to protect your privacy.
https://www.egovreview.com/article/cybersecurity/64/how-do-governments-deal-mobile-security
https://www.uscybersecurity.net/protect-yourself-from-privacy-invasion/
My Relationship with Technology ~ Final Blog Post
Technology is a subject that has slowly become fully integrated within my life. It wasn't something I had a particular interest in (whe...
-
Going into the article about the Supreme Court I have very little knowledge of them other than that they are the highest federal court in th...
-
I don’t usually go out of my way for news about anything I’m interested in, but there are several places that I do get some of my informati...
-
Let's rewind about 21,940 days or about 60 years. Its the early 1960s and up until then, the most widespread way of listening to music w...