Blown To Bits Book Report

Great Essays
The book Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis has often given me the impression that this book was intended to warn its audience of the many dangers of technology, and that the benefits of using technology are not worth the risks. The book’s third chapter, “Ghosts in the Machine,” however, was different, because I noticed that the authors were just giving information about things that computers do that people may not realize, but not necessarily implying that all of these abilities are dangerous or harmful. For this reason, and for many other reasons, I enjoyed reading this chapter of Blown to Bits more than I have enjoyed reading any other chapter so far. The first topic discussed in this chapter left me with feelings of both concern and relief. The chapter opened by discussing how digital information that people may think is hidden, or even destroyed, is often still accessible to the public. The authors described how the bits that store a given piece of information are never destroyed, but simply overwritten by other data when files are replaced or “deleted.” The descriptions of the people who sold their devices to people, only to have the people who bought their devices to discover personal identification information, “deleted” documents, and even credit card account …show more content…
The idea that a file can exist on a computer even after the user thought they had deleted it gives the reader the idea that the file behaves like a ghost. I was glad to read the information presented in this chapter, especially since I felt this chapter had more of an informative, unbiased tone than previous chapters did. Every time I read a new chapter from Blown to Bits, I learn more about today’s computers, and, as with each previous chapter, I am glad I read this chapter. From now on, I will be more careful when attempting to remove a file from my computer or

Related Documents

  • Improved Essays

    Blown To Bits Summary

    • 749 Words
    • 3 Pages

    Hal Abelson, Ken Ledeen, and Harry Lewis use their fourth chapter of their book Blown to Bits to discuss search engines. They describe how search engines work, and the possible problems that they could have. As was the case with the third chapter of Blown to Bits, I enjoyed reading this chapter. I felt that this chapter was not written to condemn technology, but rather to inform people about something that has become a vital element of human society. I was intrigued by the authors’ discussion of all of their topics.…

    • 749 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The Machine Stops Analysis

    • 1516 Words
    • 7 Pages

    While the people described in “The Machine Stops” and the people today can be compared through a discussion of technology to each- both civilizations share the potential danger of being technology controlled. I. Communication A. The Machine Stops 1. Video Chat 2.…

    • 1516 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The authors of the book suggest physical means of making sure that your personal information does not get into the wrong hands. So what will it be: hammer or axe? ` In conclusion, the third chapter of Blown to Bits was very informative. “Ghosts in the Machine” was a chapter about how information can be hidden within computers. It is important to be careful when sending sensitive information.…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Blown To Bits Analysis

    • 346 Words
    • 2 Pages

    Blown to Bits Chapter 2 showed us how private the digital world is. Headline spoke upon different types about privacy around the globe. The main topic was Radio Frequency Identification Tags (RFID). The topic entirely went into detail about how it knows almost everything about a person or company. This Chapter reveled benefits, effects of technology being in our private lives and the change it has had on our society as a whole.…

    • 346 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Viktor Mayer-Schönberger expresses his concern for the future of society with the increasing prevalence of media forums and surveillance systems in the chapter, “Failing to Forget the Drunken Pirate,” from his book, Delete: The Virtue of Forgetting in the Digital Age, which was published in 2009. Specifically, his main concern is with society’s changing nature of forgetting information and remembering exceptions to remembering becoming a default as forgetting becomes an exception. With companies like Google and Yahoo! documenting the search histories of all of its users and keeping these pieces of information for years, which can inevitably be traced back to the individual, it's difficult for digital actions to be kept private. Nearly every…

    • 1121 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    George Orwell based the Thought Police off the NKVD or Narodnyi Komissariat Vnutrennikh Del who arrested citizens of the Soviet Union who had rebellious actions or statements. Similarly, George Orwell prophesied the use of horrific techniques to implement governmental control in his novel, 1984, regarding a totalitarian government that prohibits any ideas outside their own, through the use of the Thought Police’s constant surveillance, audio detection software, and predictive analytic technology. The two governments of Oceana and the United States, both utilize technology and authorizing figures to constantly surveillance their citizens. In The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom?…

    • 1645 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    With the new technology we spew each year, promising us new ways to keep us secure. The everyday user usually does not realize how unprotected their newly purchased appliances really are. More people are getting attacked, scammed, and are being robbed everyday due to the lack of knowledge people have about their appliances. So eventually with people placing their personal info into these accessible and yet vulnerable phones and computers, those same people will get riled up with the amounts of times they have been hacked into and would declare that their government should do something about their unfortunate situation. The real issue isn’t about the accessibility of our private information, but whether or not society is willing to sacrifice…

    • 860 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Losing Ourselves in Technology “We have too many cell phones. We’ve got too many Internets. We have got to get rid of those machines. We have too many machines now” Not many people would agree with these words from author Ray Bradbury, especially since 68% of adults in the United States own smartphones.…

    • 1428 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Introduction This article, Building A “Backdoor” To The iPhone: An Ethical Dilemma, discusses Tim Cook, CEO of Apple, ethical dilemma to safeguard its customer’s trust and digital privacy or assist the U.S. government and the Federal Bureau of Investigation (FBI) to gain access to an iPhone device used by a terrorist to commit a heinous crime against society in the city of San Bernardino, California. In addition, evaluate methods in which managers with power and responsibilities characterized by Badaracco, an ethics professor at Harvard University, as the “dirty-hands problem” and the “right-versus-right” difficulties where “the moral dilemmas of management are, at bottom, clashes among different, conflicting moralities, among very different…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays