Introduction to Security: Chapter 8
Summary: The security services of Britain acknowledged they can bypass the use of encryptions by hacking computers themselves. This is reflected in the speech of David Cameron, wherein he insists that “there was no safe space for terrorists or serious criminals which could not be monitored online by the security services” (Travis, 2015, p.1). This makes use of the “power of intelligence” services, which would gather the content of the computer, or heed phone calls and track the locations of the device users. It can also record conversations, snap pictures, or switch on the cameras and/or microphones within the Continue reading...