Author Archives: growm

Protection, or Paranoia?

“Some teens see privacy as a right, but many more see privacy as a matter of trust. Thus, when their parents choose to snoop or lurk or read their online posts, these teens see it as a signal of distrust.” In this quote from her book It’s Complicated, danah boyd points out the potential effects of […] Continue reading

Posted in parental surveillance, privacy, Student Posts, trust | Comments Off on Protection, or Paranoia?

The False Feeling of Security

I greatly enjoyed the class debate passages (p. 92-93, 175-182) in Little Brother. In the first debate, Marcus brings up the effects of terrorism and the problems with reactions to it. Marcus’ argument about the effects of terrorism involves the types of reactions societies have to acts of terrorism. Post-attack, his school system decides to install […] Continue reading

Posted in little brother, preventative measures, Student Posts, terrorism | Comments Off on The False Feeling of Security

Enigmatic Ingenuity

     While there are many reasons for the Allied cryptanalysts’ hard-won victory over the German cryptographers, the human factor—and German underestimation of its impact—stands foremost in my mind. Enigma machines, radios, weapons—these are all well and good, as long as people know how to use them. Clearly, the Germans were overconfident in the security […] Continue reading

Posted in Bletchley Park, enigma machine, Student Posts, World War II | Comments Off on Enigmatic Ingenuity

The Sign of Zodiac

I found Elonka Dunin’s website to be greatly interesting. Her small bits of information about the Zodiac Killer on her List of Famous Unsolved Codes and Ciphers specifically caught my eye. Before now, I had of course heard of this serial killer and his or her bold ciphers. However, I had not thought about it […] Continue reading

Posted in Elonka Dunin, practical applications, Practical Cryptography, Student Posts, Zodiac Killer | Comments Off on The Sign of Zodiac

The Road Less Traveled By

Admiral Hall’s decision not to inform the U.S. about the impending U-boat attacks was complex, to say the least. The reasons why he would share his new intelligence with President Wilson are clear–the U.S. and Britain were allies to some degree, and it might possibly bring the U.S. into the war. However, I find his reasoning […] Continue reading

Posted in ethics, Student Posts, World War I, zimmerman telegram | Comments Off on The Road Less Traveled By

Being Nosy, or Being Cautious?

Michael Morris’ article about mining student data greatly interests me. His chosen topic is one bursting with complexity. First, there are the moral implications of such actions. Is it an invasion of privacy? Or is it simply bettering the protection of the student population? These are questions which our country has struggled with since the […] Continue reading

Posted in data mining, privacy, safety concerns, Student Posts | Comments Off on Being Nosy, or Being Cautious?

Easier to Learn, or Easier to Access?

I believe that, while a high level of scholarship was required to develop the frequency analysis approach, it is not critical to the use of this approach. When the world was new to this subject–when it had just discovered ciphers and keys and cryptanalysis–all of the knowledge was completely new. It was the cutting edge, […] Continue reading

Posted in amateur cryptography, civilization, frequency analysis, Singh, Student Posts | Comments Off on Easier to Learn, or Easier to Access?