Cybersecurity & the Government

Following on from last week’s lecture on hackers, lulz, and whistle-blowers, I wanted to approach this week’s topic from a different angle than my previous blog post. After researching countless resources on cybersecurity, I stumbled across cybersecurity expert Eva Galperin, who shared a video via WIRED debunking cybersecurity myths. What really caught my attention, though, was her discussion around the myth ‘the government is watching me through my camera’.

“It is possible to remotely trigger somebody’s camera if you install a remote access tool on their device. That is something that hackers do. That is something that criminals do. That’s something governments do, but in order for the government to install the software that they need in order to track you through your camera, they need a warrant from a judge. It is more likely that you will be watched by hackers, or if you’re a student, by your school, than it is that you are going to be watched by the government.”

Eva Galperin

While the risk of someone watching you through your camera is extremely slim, Eva recommends placing a sticker over your camera to eliminate the possibility entirely, especially since these digital ‘backdoors’ used by hackers and the government alike can trigger your camera while preventing the recording light from turning on. If you’re still concerned about the government monitoring you, just remember that a teenager on the internet probably isn’t the biggest government concern at the moment, so you’re unlikely to be a target of these operations. Hackers are also much more likely to target bigger companies and reputable individuals who can afford to pay a ransom for the return of their valuable content. In light of this, my Week 10 remediation is inspired by the ‘FBI man’ meme.

6 thoughts on “Cybersecurity & the Government

  1. Hey Taylor! I like the take you took for this week as it’s actually quite relatable. When I was younger I used to cover my camera with stickers all the time in case someone was watching me. Occasionally, I still do if my computer is acting sus or something has triggered me to think the worst. It’s crazy to think that our minds instantly go to’ hackers’ when as teenagers we are least likely to be the ones being watched. I think a lot of people can relate to this, and your remediation reiterates that we have nothing to worry about.. for the most part. Your blog actually reminded me of a documentary series I posted about on my Twitter. It’s a 2 season-long series called ‘cyberwar’ that dives deep into the complexities of haking and follows real-life events and stories around the world. It would be interesting to see how hackers work, as there’s still so much we don’t understand. Here’s the link anyway if it’s something that interests you: https://www.sbs.com.au/ondemand/program/cyberwar
    I really enjoyed this blog as you made it relatable and easy to understand!

    Liked by 1 person

  2. Taylor, this post was super insightful. Let me just start by saying your remediation was super clever and unique, I haven’t seen one like this all semester, I really love it!!!! I found your blog post really expanded my knowledge of topic areas in the lecture, considering I focussed on such a small portion in my blog post. You conversation surrounding the government and their ability to know our every move was kind of scary, but fascinating. I also like how you used the quote to break up the post and create an informative, yet aesthetic environment. Keep up the amazing work ๐Ÿ™‚

    Like

  3. Hey Taylor, this is a really good blog ๐Ÿ™‚ It was very engaging and easy to read. And honestly, it puts up a very good point! No government or hacker will rarely be interested in hacking to some rando teenagers camera to capture footage for money or anything. Even if they were, they might as well aim for the big dogs such as a celebrity who can actually pay them out instead of a broke ass uni student. Overall, i really enjoyed reading your blog and you connected to the lecture’s content very well this week

    Like

  4. Hi Taylor,
    I found your blog post to be very insightful and engaging. I found you helped me to understand the lecture content a bit better. I too used to cover my cameras with paper and sticky-tape as I was scared that I was being watched too lol. Also great remediation for this week ๐Ÿ™‚

    Like

  5. Hey Taylor! Your blog this week was so interesting to read and it was really helpful in understanding the topic further. ! I found it interesting reading about the discussion you mentioned from Eva Galperin and I definitely have put a sticker over my camera as I felt that pressure and expectation that I was being watched over the years.
    Your remediation this week were great too!! I went down the road of talking about botnets and how they remind me of the game Pacman because of how we can control them. If you wanted, check out this link for some more information https://www.pandasecurity.com/en/mediacenter/security/what-is-a-botnet/
    But great work, it was a fun blog to read!! ๐Ÿ™‚

    Like

  6. Cybersecurity & the Government is a very profound topic, and I believe that you’ve discussed it well within this blog post. You demonstrate a fantastic depth of knowledge on how this concept relates to others in the communications and media field. I particularly enjoyed your remediation, which reflects this in a light-hearted but insightful way.

    If I were to make a recommendation, it would be to further investigate the electronic surveillance tool: PRISM. This relates directly to your topic and would be a useful discussion point to broaden your analysis. I’ve linked a relevant article that is super informative for deconstructing PRISM’s creation, history and the ramifications of its existence.

    You can also find further content around this topic on my own blog post, which you can access at https://caseyscreativepursuits.wordpress.com/ if you’re interested!

    I really enjoyed this work, and can’t wait to see what you come out with in the future!

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s