<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/rss-style.xsl" type="text/xsl"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	     xmlns:dc="http://purl.org/dc/elements/1.1/"
	   xmlns:atom="http://www.w3.org/2005/Atom"
	     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
	<title>prism &#8211; Terence Eden’s Blog</title>
	<atom:link href="https://shkspr.mobi/blog/tag/prism/feed/" rel="self" type="application/rss+xml" />
	<link>https://shkspr.mobi/blog</link>
	<description>Regular nonsense about tech and its effects 🙃</description>
	<lastBuildDate>Tue, 10 Jun 2025 13:01:57 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://shkspr.mobi/blog/wp-content/uploads/2023/07/cropped-avatar-32x32.jpeg</url>
	<title>prism &#8211; Terence Eden’s Blog</title>
	<link>https://shkspr.mobi/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title><![CDATA[Cryptography and the Coventry Problem]]></title>
		<link>https://shkspr.mobi/blog/2013/07/cryptography-and-the-coventry-problem/</link>
					<comments>https://shkspr.mobi/blog/2013/07/cryptography-and-the-coventry-problem/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Tue, 09 Jul 2013 11:12:56 +0000</pubDate>
				<category><![CDATA[politics]]></category>
		<category><![CDATA[crime]]></category>
		<category><![CDATA[gchq]]></category>
		<category><![CDATA[nsa]]></category>
		<category><![CDATA[prism]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[terrorism]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=8470</guid>

					<description><![CDATA[There&#039;s an ethical conundrum which is often posed to military strategists and philosophers alike.  In 1940, the Nazi&#039;s communications encryption had been broken by the British.  Military Intelligence were able to decrypt a signal which indicated that the city of Coventry was to be bombed.  The military chiefs took this information to the Prime Minister, Winston Churchill. If he ordered the…]]></description>
										<content:encoded><![CDATA[<p>There's an ethical conundrum which is often posed to military strategists and philosophers alike.</p>

<p>In 1940, the Nazi's communications encryption had been broken by the British.  Military Intelligence were able to decrypt a signal which indicated that the city of Coventry was to be bombed.  The military chiefs took this information to the Prime Minister, Winston Churchill.
If he ordered the evacuation of the city, he would save hundreds of thousands of lives - but the enemy would know that their encryption was compromised.</p>

<p>What, gentle reader, would you do?  Is it worth sacrificing lives now in the hope of saving more in the future?  Is revealing your hidden knowledge a price worth paying if it means saving a city?</p>

<p>This utilitarianist problem was <a href="https://winstonchurchill.org/publications/finest-hour/finest-hour-141/history-detectives-coventry-what-really-happened/">probably not actually placed in front of Winston Churchill</a> - but it is an interesting thought experiment.</p>

<p>This brings us to the recent revelation that the security services of the world are tapping our communications, listening to our phone calls, and tracking our every move.</p>

<p>So why is there still crime?</p>

<p>If "Prism" (which I'll use as a shorthand for all digital surveillance) is so good and effective, why is there still any form of crime or terrorism?</p>

<p>There are, I think, several possibilities.</p>

<ul>
    <li>It doesn't work - either it can't capture the data or it's impossible to sift.</li>
    <li>Criminals don't communicate via electronic means.</li>
    <li>The Government don't want Prism revealed.</li>
</ul>

<p>To go down the conspiracy theory route, is it acceptable to allow a major criminal attack in order not to reveal how intelligence is captured?</p>

<p>Or, to look at it through a different lens, is Prism stopping 99% of crimes, and the ones which do occur are statistical outliers?</p>

<p>If Prism is as amazing as claimed - and assuming revelations don't push criminals to secure crypto and unmonitored communications - why can't it be used to ticket speeding cars, foil bank robberies, or stop traders manipulating LIBOR?</p>

<p>Are minor and major criminal acts the price that governments are prepared to pay in order to keep Prism secret?</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=8470&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2013/07/cryptography-and-the-coventry-problem/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Prism and Plausible Deniability]]></title>
		<link>https://shkspr.mobi/blog/2013/06/prism-and-plausible-deniability/</link>
					<comments>https://shkspr.mobi/blog/2013/06/prism-and-plausible-deniability/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Mon, 10 Jun 2013 16:00:13 +0000</pubDate>
				<category><![CDATA[politics]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[prism]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=8347</guid>

					<description><![CDATA[The leaders of several huge corporations have issued statements saying that their companies do not allow the US Government to illegally spy on their users.  I&#039;m sure they believe that.  I&#039;d even go so far as to say that I&#039;m sure the entire board and top management genuinely have no knowledge of any malfeasance.  Why would they?  We&#039;re talking about spies - experts in the art of subterfuge and…]]></description>
										<content:encoded><![CDATA[<p><a href="http://www.guardian.co.uk/world/prism"><img src="https://shkspr.mobi/blog/wp-content/uploads/2013/06/prism-fs8.png" alt="prism-fs8" width="600" height="187" class="aligncenter size-full wp-image-8349"></a></p>

<p>The leaders of several huge corporations have issued statements saying that their companies do not allow the US Government to illegally spy on their users.</p>

<p>I'm sure they believe that.  I'd even go so far as to say that I'm sure the entire board and top management genuinely have no knowledge of any malfeasance.</p>

<p>Why would they?  We're talking about spies - experts in the art of subterfuge and espionage.  Why would a spy agency do anything as crude as <em>ask permission</em>?</p>

<p>Consider <a href="http://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%932005">the Greek wiretapping scandal</a>.  Apparently, no one in the senior corporate structure at Vodafone Greece had authorised the tapping of hundreds of politicians' phones.  Despite the high profile nature of the victims and the <a href="https://web.archive.org/web/20130625130414/https://www.tapping.gr/">apparent suicide</a> of Vodafone Greece's Network Planning Manager, there has never been a conclusive answer to how such interception took place and who - if anyone - authorised it.</p>

<p>Someone - an employee, a vendor, an intern, a janitor, a remote hacker - under the direction of someone else - terrorists, spies, rivals - flicked a switch which enabled wholesale surveillance of the Greek political establishment.</p>

<p>That doesn't require a CEO to know anything about it.</p>

<p>Let's examine another possibility.</p>

<p>Silicon Valley companies are well known for recruiting the best and the brightest from top flight American universities.  The same students who would often <a href="https://www.cia.gov/resources/csi/static/Twenty-Years-Officers-Residence.pdf">be asked to work for the security services</a>.</p>

<p>Is it beyond belief that such "patriotic" students have recruited into Google, Facebook, Yahoo, etc? And, from there, have found ways to provide direct access to the Government?</p>

<p>It <strong>doesn't matter</strong> what a CEO or PR department says.  I'm not accusing them of lying - I'm saying that it's possible that they've been completely bypassed.  Just as the <a href="http://www.hanford.gov/files.cfm/frenchesp.pdf">French engaged in industrial espionage against American electronics companies</a>, and the <a href="https://www.darkreading.com/cyberattacks-data-breaches/google-aurora-hack-was-chinese-counterespionage-operation">Chinese apparently bypassed Google's security</a>, I don't think it is unreasonable that the <a href="http://en.wikisource.org/wiki/Eisenhower%27s_farewell_address_%28press_copy%29">American Military Industrial Complex</a> would compel employees to engage in <em>internal</em> espionage.</p>

<p><a href="http://en.wikipedia.org/wiki/Plausible_deniability">Plausible deniability</a> - it's not just for Presidents any more.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=8347&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2013/06/prism-and-plausible-deniability/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
