{"id":31696,"date":"2017-03-13T02:43:30","date_gmt":"2017-03-13T06:43:30","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-what-are-we-to-think-columbia-daily-tribune.php"},"modified":"2017-03-13T02:43:30","modified_gmt":"2017-03-13T06:43:30","slug":"wikileaks-what-are-we-to-think-columbia-daily-tribune","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-what-are-we-to-think-columbia-daily-tribune.php","title":{"rendered":"WikiLeaks: What are we to think? &#8211; Columbia Daily Tribune"},"content":{"rendered":"<p><p>      I always have had mixed feelings about unauthorized      disclosure of U.S. government surveillance activities.      National security officials can make a good case for secrecy      as they pursue those who would do us harm, but all of us have      reason to feel somewhat uncomfortable at the prospect of Big      Brother snooping into our private lives as well.    <\/p>\n<p>      With each new electronic gadget, the stakes get higher. What      are we to think? One thing for sure: We should assume      everything we submit to cyberspace is public.    <\/p>\n<p>      Not that our every interaction via smartphone, tablet, brainy      new television and the like will be misused, but the primary      restraint stems from the mere volume of human communication      and the fact most of it is uninteresting to others. This is      sort of security by default, not because of any intentional      defense against hacking. Which means  for the time being, at      least  information of interest to others can and will be      discovered.    <\/p>\n<p>      WikiLeaks keeps proving the art of hacking is running ahead      of the art of encryption. Certainly the ability of government      agencies to know what average citizens are doing with      electronic devices is greater than anything we can do in      electronic defense. Our only real defense is attitudinal. We      should assume we are living in electronic fishbowls and act      accordingly.    <\/p>\n<p>      All of which makes a case for the Luddite life.    <\/p>\n<p>      Against todays societal norm, I have avoided the use of      smartphones altogether, not mainly because of fears of      unauthorized snooping but because of a combination of inertia      and disdain for the way smartphones take over users lives. I      do have an old-fashioned cellphone but rarely turn it on. Our      family bill consistently shows my monthly use at less than 10      minutes.    <\/p>\n<p>      People whose phones are constantly in use volunteer      astonishing amounts of information to the internet for easy      surveillance. Any government that assumes some of the      information on the internet might come from terrorists and      other enemies of the state is bound to tap in continually. To      tell the bad guys from the good guys, the good guys will      receive at least summary attention.    <\/p>\n<p>      Revelations by WikiLeaks remind us of the brave, disturbing      new world of the internet. By our eager embrace of the new      technology, we invite its abuses as well as its attributes.    <\/p>\n<p>      So, Im not ready to blame anybody, including WikiLeaks, when      new evidence of hacking shows up.    <\/p>\n<p>      Defense officials blame insiders who leak information, but      this is nothing new. Now its done more efficiently      electronically, but the acts are no more heinous than similar      thefts by yesterdays spies using yesterdays technology.      Every combatant will snoop to find the bad snoops. The new      technology guarantees ordinary citizens will be examined in      the process.    <\/p>\n<p>      Managers of the CIA and other intelligence agencies bemoan      todays massive cyber leaks as threats to the ability of      their agencies to perform their protective duties. We want      them to continue the race against hacking, but we also want      them to successfully hack enemy files, an activity that will      always imply they could be looking at information provided by      all of us.    <\/p>\n<p>      The only words that dont offend a single human being are      words delivered without a purpose.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.columbiatribune.com\/opinion\/the_tribunes_view\/wikileaks-what-are-we-to-think\/article_e5b18bf1-e2c7-5263-9849-39b250986c8a.html\" title=\"WikiLeaks: What are we to think? - Columbia Daily Tribune\">WikiLeaks: What are we to think? - Columbia Daily Tribune<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> I always have had mixed feelings about unauthorized disclosure of U.S. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-31696","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31696"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31696"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31696\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}