Author Archives: ragieleg

Having Something to Hide in the Social Media Age

“she has started creating a ‘light version’ of her life that she’ll regularly share on Facebook just so that her friends don’t pester her about what’s actually happening. Much to her frustration, she finds that sharing at least a little bit affords her more privacy than sharing nothing at all.” (Boyd 74). In this social-media […] Continue reading

Posted in "social media, boyd, privacy, Student Posts | Comments Off on Having Something to Hide in the Social Media Age

What Singh Couldn’t Have Predicted

Simon Singh makes many predictions about evident trends in the increasingly digital world. 20 years later, he got a lot of things right, although from our digitally oversaturated viewpoint, they seem obvious now.  Singh was definitely correct in his prediction that soon email would overtake normal mail, and this rang true for the early 2000s […] Continue reading

Posted in email, gps, Singh, Student Posts | Comments Off on What Singh Couldn’t Have Predicted

Alice, Bob, and Impressive Dedication

As we’ve discussed at length in this course—the history of cryptography is riddled with instances of problems that at first glance seem immutable. The issue of key distribution was one of these supposedly immutable doctrines of secret writing. However, as we have also seen—the history of cryptography is also riddled with people so determined to […] Continue reading

Posted in Alice Bob and Eve, key distribution, Student Posts, Whitfield Diffie | Comments Off on Alice, Bob, and Impressive Dedication

The Secret Struggles of WWII’s Female Codebreakers

Although female codebreakers were completing some of the most important work on the intelligence front during World War II, the necessary secrecy of their work as well as their gender led these women to not always receive the treatment that they deserved. In the 1940s women in general were seen as subordinate to men, and […] Continue reading

Posted in Code Girls, Louise Pearsall, Student Posts, WWII | Comments Off on The Secret Struggles of WWII’s Female Codebreakers

Podcast Building: Substance and Style

  In the Zodiac Killer episode from the One Time Pod, the podcast creator kept her audience engaged both through stylistic aspects and an interesting topic. I particularly enjoyed the use of ominous background music that changed as the speaker told the story to build the mood—it was also just the perfect sound level so […] Continue reading

Posted in One-Time Pod, podcast, Student Posts, Zodiac | Comments Off on Podcast Building: Substance and Style

All is Fair in Love and War

In The Code Book, Simon Singh details the codebreaking successes of the British military during World War I–successes that often needed to be kept secret and prevented the spread of some important, yet sensitive information during the war. One such piece of critical information was the Zimmerman telegram. While some may think it completely unethical […] Continue reading

Posted in Room 40, Student Posts, World War I, zimmerman telegram | Comments Off on All is Fair in Love and War

Too Many Eyes to Fit in the Panopticon’s Tower

I would agree with Walker’s claim that the Panopticon is not an accurate metaphor for the average human’s interaction with surveillance today. While it could be argued that the government does watch over us and large corporations do silently collect our data, most people are not aware of this and thus it does not enact […] Continue reading

Posted in Benjamen Walker, Panopticon, Student Posts, surveillance | Comments Off on Too Many Eyes to Fit in the Panopticon’s Tower

Prying Telephone Operators and Free Radio Waves: Implications of New Tech on Secure Messages

Because the onset of the telegraph inserted a middleman in the communication of a sender and receiver, messages not meant for prying eyes understandably needed to be encrypted with a more secure cipher like the Vigenère cipher. Since the invention of the telegraph in the 19thcentury, several other inventions or innovations in the world of […] Continue reading

Posted in privacy, radio, Student Posts, telephone, Vigenere Cipher | Comments Off on Prying Telephone Operators and Free Radio Waves: Implications of New Tech on Secure Messages

Little Brother’s Marcus and The Doctrines of Terrorism

Before Marcus holds the first alternative/video-game-generated/XNet run press conference the world has ever seen after the gross media bias taking place in response to the Don’t Trust “riot,” Ange gives him this pep talk—“If you want to really screw the DHS, you have to embarrass them…your only weapon is your ability is to make them […] Continue reading

Posted in little brother, Student Posts, terrorism, war on terror | Comments Off on Little Brother’s Marcus and The Doctrines of Terrorism

The Role of Data Privacy in Campus Safety

In his essay “Mining Student Data Could Save Lives,” Michael Morris urges universities to act upon their unique ability to prevent possible acts of mass violence by screening student’s data footprints. Morris explains that the use of university email addresses and campus wireless networks permits most college IT departments the ability to mine the data […] Continue reading

Posted in data mining, privacy, Student Posts, university | Comments Off on The Role of Data Privacy in Campus Safety