Last week, General David Petraeus, the resignation of CIA Director, what has been proven to be a bigger scandal than it first appeared.
We have a complaint from a woman, Jill Kelly, harassment of anonymous e-mail sent mail to the FBI, it turned out, by another woman, Paul Broadwell (who, of all things, Petraeus biographer) Petraeus exposed it had with the latter, and has been involved in another senior military man, General John Allen, because the e-mail sent to a woman.
I be tempted interactive business intelligence classification maps provide a certain interpretation of this mess, but I did not have my head around who is who is not yet fully.
Blog post: Petraeus smart Gmail skills in extramarital affairs
The only reasonable explanation of the behavior of these people is that they must have a shelter recently escaped from the CNN article (see "Timeline", along with a ridiculous cutting sidebar, and Petraeus events).
The case is interesting, FBI check mail Kelly's account, find out who is harassing her, they found the e-mail between Kelley and Alan, and then how to prove that they are anonymous messages from Broadwell.
Federal Bureau of Investigation (FBI) dependence of the Electronic Communications Privacy Act "(ECPA), the legalization of investigation, according to the Electronic Frontier Foundation released" If our email betray us? Email privacy protection the primer He light Bureau of cross-references the IP address to use Wi-Fi hotspots Broadwell Travel "on the list of guests from other cities and hotels, looking for common names. "The Broadwell If you wish to remain anonymous, a new e-mail account the combination of open Wi-Fi wireless network connection is not enough."
I suggest to carefully read the EFF article profiling a very complex topic, clearly shows how weak our protection unnecessary government search private message.
In any case, all this, because it is possible, I would avoid any further attention outside the residential dirty very interesting details, all of these people have been caught scandal swept through reason, is due to two things: their immorality behavior and their e-mail use.
The strange thing is that the moral decay, the e-mail often go hand in hand ... in fact, it is commonplace, there are two reasons for unethical behavior in all forms of Internet communication.
First of all, this is very easy to do things is immoral, when you're dealing with a computer interface, rather than a person. Lack of connection makes it very easy to forget or ignore the virtues of a considerate person, such as courtesy, integrity, tolerance, fair. Secondly, the media is new, neither is a good social foundation, computer-mediated communication, such a thing has not been built yet, nor is the education system.
This makes the whole idea of computer ethics education. My old friend temperature Schwartau, also called pen a solemn organ or two, tell me a story about his wife, Sherra, who also were in the computer security business contact, a woman looking for a computer ethics course.
Woman's seventh grade son at school shared computer hackers and change the grade in trouble. Penalties set by the school, and when they found that a part of him to do is to complete a computer ethics course. The problem is, the mother said she did not know such a thing.
Sherra conversation, temperature, and when they could not find anything, either they attack creative, and decided to update the temperature created more than a decade ago, a book entitled "Internet and Computer Ethics children (teachers and parents did not clue). "as early as in 2001, the help of corporate sponsors, the temperature distribution similar to the 125,000 copies of the book.
Temperature of thinking becomes more ambitious: He wants to give up more than 100 million copies of a new book!
No comments:
Post a Comment