Blown to Bits: Chapter 2, 5, 7, 8 Summary
Chapter 2
The second chapter of Blown to Bits, entitled Naked in the Sunlight brings forth the alarming fact that in a world of bits, none of one’s information can be protected. The author opens up the chapter with a comparison to George Orwell’s novel 1984, where the characters are always being watched by a government force called Big Brother. In the novel, the ruling party has complete surveillance over all the people, and the author compares this to modern day London. The author cites the Subway bombers of 2005 to prove his point. During the time of the bombings, London was under heightened security, and by using the footage from surveillance cameras, they had no problem getting images of the bombers and their trip before detonating the bombs. Finally the author draws the conclusion that “1984 is here, and we like it”.
Chapter 5
In chapter five of Blown to Bits, the author explores the complex world of data encryption, and how to protect data from others who are snooping on your sent data on the internet. The chapter starts out with an example of legislation that was being drafted after the events of September 11th, 2001. Senator Judd Gregg proposed the idea that all encryption agencies had to provide a back door to their encryptions so the United States could quickly access all information. The legislation was soon forgotten about after the passage of the Patriot Act , and all legislation following never mentioned decryption ever again.
Chapter 7
Chapter 7 of Blown to Bits focuses on protecting people on the internet, while navigating United States law. At the beginning of the chapter, the authors introduce the story of Katharine Lester who ran away to the Middle East after meeting a young Palestinian man whom she met on MySpace. The case concerned a lot of lawmakers who decided to pass legislation to protect youth online, but it eventually failed after the law had to be modified, making it unclear and very broad. This also opened up the window for many about cyber predators and since 2006 the FBI has arrested over 2000 “cyber-enticers”.
Chapter 8
During the dawn of tel-communication, the FCC could easily control what was distributed to the public because both television and radio were unique and easily regulated. The supreme court concluded in 1978 that the government had special intresting protecting the public from radio and TV
because of its objectionable nature. Thirty-Five years later the internet is available to the “defenseless” public in many more ways than TV and radio ever were.The authors of blown to bits make it clearly known that they do not want to see the internet regulated so there is not a limit on what can be shared and distributed on the internet.
The second chapter of Blown to Bits, entitled Naked in the Sunlight brings forth the alarming fact that in a world of bits, none of one’s information can be protected. The author opens up the chapter with a comparison to George Orwell’s novel 1984, where the characters are always being watched by a government force called Big Brother. In the novel, the ruling party has complete surveillance over all the people, and the author compares this to modern day London. The author cites the Subway bombers of 2005 to prove his point. During the time of the bombings, London was under heightened security, and by using the footage from surveillance cameras, they had no problem getting images of the bombers and their trip before detonating the bombs. Finally the author draws the conclusion that “1984 is here, and we like it”.
Chapter 5
In chapter five of Blown to Bits, the author explores the complex world of data encryption, and how to protect data from others who are snooping on your sent data on the internet. The chapter starts out with an example of legislation that was being drafted after the events of September 11th, 2001. Senator Judd Gregg proposed the idea that all encryption agencies had to provide a back door to their encryptions so the United States could quickly access all information. The legislation was soon forgotten about after the passage of the Patriot Act , and all legislation following never mentioned decryption ever again.
Chapter 7
Chapter 7 of Blown to Bits focuses on protecting people on the internet, while navigating United States law. At the beginning of the chapter, the authors introduce the story of Katharine Lester who ran away to the Middle East after meeting a young Palestinian man whom she met on MySpace. The case concerned a lot of lawmakers who decided to pass legislation to protect youth online, but it eventually failed after the law had to be modified, making it unclear and very broad. This also opened up the window for many about cyber predators and since 2006 the FBI has arrested over 2000 “cyber-enticers”.
Chapter 8
During the dawn of tel-communication, the FCC could easily control what was distributed to the public because both television and radio were unique and easily regulated. The supreme court concluded in 1978 that the government had special intresting protecting the public from radio and TV
because of its objectionable nature. Thirty-Five years later the internet is available to the “defenseless” public in many more ways than TV and radio ever were.The authors of blown to bits make it clearly known that they do not want to see the internet regulated so there is not a limit on what can be shared and distributed on the internet.
Comments
Post a Comment