Research Blog #8

The Truth About the WikiLeaks CIA Cache

WikiLeaks released a large amount of information on March 7, 2017. They stated that the CIA has the software to hack into apps that we previously assumed were safe. The apps mentioned specifically were Signal and WhatsApp. However, in closer looks at the documents this proves to be slightly misleading. In the uncovered documents it never lists these apps by name or the specific ability to bypass such encrypted tools.

WikiLeaks is not a completely trustworthy source because some of their claims have come from misinterpretation of the documents in haste to out them to the public. Another critique for this group is that it doesn’t take into consideration material that may be dangerous for the public to know.

This article was written by Zeynep Tufekci on March 9, 2017. The basis of the article was on the new information released by WikiLeaks on the CIA’s ability to hack into our communication networks. It was written for the purpose of exposing and analyzing closely the information that has been uncovered. This brings me to question whether WikiLeaks is more of a threat than a help in these types of situations. This is also why it is interesting because it comes across the point that there are reasons for certain things to be kept secret in order to keep individuals safe.


State of Surveillance

This is a documentary made in 2016 and takes place in Russia. The host is Shane Smith from VICE and his guest is Edward Snowden. It mentions San Bernadino which involved the government struggling to get access to the terrorists phone and then resorted to hacking into it.

San Bernadino was the incident that gave proof to the boundaries the government is willing to overstep in the name of “safety”. Snowden claims that they have been capable of this for some time now. Snowden also performs in the video a dissection of the modern cell phone. During this he shows exactly how the government can hack into your own personal phone.

Drones are also now being used on home soil, recently for civilian protests. The main argument is that these uses of technology are a breach on our constitutional right and must be stopped.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s