They then install cameras and phone taps within your home, and they tell you that they are protecting you. Would these practices make anyone feel safe, let alone actually protect anyone? The NSA utilizes similar methods, only they work in the field of cybersecurity. They deliberately weaken the security of tech products, installing what they call “backdoors”. This makes it easier for the NSA to spy on U.S. citizens, but it does not stop others from getting in. Holes in security created by the NSA give criminal hackers a figurative backdoor into people’s data and information.(Nicks) An issue in the security of Windows allowed Russian hackers to access the information of Ukrainian leaders. Non affiliated hackers potentially could have exploited the flaw for the time it was available. (Yardon) Similar events can happen when the NSA installs backdoors. A cryptography writer and technologist, Bruce Schneier, spoke on the subject: “We have examples of the NSA going in and deliberately weakening security of things that we use so they can eavesdrop on particular targets.” He also posed the question: “Should we compromise the security of everybody in order to access the data of the few?” It was reported that 90 percent of the people that are effected by the NSA’s methods and are caught in their dragnet of surveillance are innocent citizens.
They then install cameras and phone taps within your home, and they tell you that they are protecting you. Would these practices make anyone feel safe, let alone actually protect anyone? The NSA utilizes similar methods, only they work in the field of cybersecurity. They deliberately weaken the security of tech products, installing what they call “backdoors”. This makes it easier for the NSA to spy on U.S. citizens, but it does not stop others from getting in. Holes in security created by the NSA give criminal hackers a figurative backdoor into people’s data and information.(Nicks) An issue in the security of Windows allowed Russian hackers to access the information of Ukrainian leaders. Non affiliated hackers potentially could have exploited the flaw for the time it was available. (Yardon) Similar events can happen when the NSA installs backdoors. A cryptography writer and technologist, Bruce Schneier, spoke on the subject: “We have examples of the NSA going in and deliberately weakening security of things that we use so they can eavesdrop on particular targets.” He also posed the question: “Should we compromise the security of everybody in order to access the data of the few?” It was reported that 90 percent of the people that are effected by the NSA’s methods and are caught in their dragnet of surveillance are innocent citizens.