The abandoned bases of the Afghan National Army, complete with skeletal vehicles, scatter the land. The wreckage of war in this region displays the history of this country like dinosaur bones caught in layers of black sediment. He smiles and adds that he has never seen a foreigner without a weapon, despite his decades. “This is the first time in memory that our children can run around outside,” says Noural Haik, a 53-year-old man from the village of Gul Norkhil, in the Maidan Wardak province of central Afghanistan. UK arms exports to countries of concern.Killing in the Shadows: UKSF extra-judicial murders.Civilian deaths from British military action.Air strikes and terror attacks examined.Anatomies of Manufactured Explosive Weapons.Maybe we need the first law of data: no one can hold data that could threaten lives if it gets into the wrong hands.A hidden war: the lingering effects of US airstrikes in Afghanistan - AOAV The more data you control, the greater the vulnerability.Īsimov’s created the three laws of robotics - in fiction. But the big problem here is that the security services themselves can be hacked.ĭata is a double-edged weapon - it can be used to support security but can be used against you. You may or may not feel comfortable with security services holding data on private citizens for their use. The vulnerability, called EternalBlue, was leaked to The Shadow Brokers. Remember the WannaCry virus that created havoc amongst health services across the world in 2017? The US National Security Agency knew about the vulnerabilities to a version of Microsoft Windows, but they kept the knowledge for future use. It argued that hackers could also use the technology.Īnd let’s face it, authorities have previous. When the FBI requested that Apple create a backdoor to iPhones to access data on two attackers who died in a terrorist incident, Apple declined. The likes of Apple have in the past resisted calls to create a backdoor to its devices. If the purpose is to identify terrorists, don’t use it to identify people who support you. Only store the data you have to store to fulfill the task for which it was collected in the first place. The devices, which can be used to identify people from biometric data, such as iris scans and fingerprints, were apparently used in the hunt for Osama bin Laden.īut a crucial part of privacy considerations is what they call data minimisation. They were also used to identify Afghans who assisted the US. The other problem is that the HIIDE devices weren’t exclusively used to identify potential enemies. There are two problems with this not every country in the world is on the same side as the US, and some non-allied nations have sophisticated technology. In any case, they may find it hard to hack into the devices and decrypt the data. The Taliban already know who their sympathisers are they know who the terrorists are that work for them. The Taliban have apparently seized US military biometric devices known as HIIDE, or Handheld Interagency Identity Detection Equipment, to identify Taliban sympathisers and possible terrorists easily. Possible privacy breach in Afghanistan shows how data can be a double-edged sword “I don’t think anyone ever thought about data privacy or what to do in the event the system fell into the wrong hands,” one expert told The Intercept.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |