Militia Groups Band Together

2212 Words5 Pages

Militia Groups Band Together

The FBI has evidence that communication between Militia Groups has steadily increased and is currently at a record high. An inside resource reported that the Groups are forming a coalition to take over the United States. They plan to seize all communication networks so they can control any information given to the general public. They will take control over food distribution, power supply, and water supply. Everything will be rationed according to the Militias' predetermined specifications. Nobody seems to know when, where, or how this is going to happen for all communications between the Militia groups are encrypted with a 60-bit key. Government Officials are trying to crack the code, but due to the sophistication of the encryption algorithm, it could take months. If the government had access to the encryption key, the Militia Groups' plan of action could be intercepted—before it is too late.

Story B: The Government Has The "Key" To Your "Back Door"

Remember that e-mail you sent your best-friend about your deepest darkest secret? You thought you were being safe when you used that encryption program didn't you? Your secret is no longer a secret. The government read that message. They wanted to make sure you were not a threat to society. They know what movie you watched on your digital TV last night too—I hope an adult watching Rug Rats isn't considered inappropriate. Don't bother using an encryption program when you call your wife to confess to eating the Oreos. They have it covered. The Cookie Police are on their way to your house right now. You have no privacy. The Government can read any communication you attempt to transmit over any network. They are watching you.

These st...

... middle of paper ...

...are going to have more control than the other. Once a compromise is reached, a suitable standard can be implemented and the world can move on to bigger and better problems.

Bibliography:

Works Cited

Electronic Privacy Information Center (EPIC). "The Clipper Chip." (13 April 2000).

EPIC. "Computer Security Act (CSA)." (13 April 2000).

American Civil Liberties Union (ACLU). "Big Brother in the Wires." 1998. (13 April 2000).

Huffman, John L., Jan H. Samoriski, and Denise M. Trauth. "Encryption and the First Amendment." 1997. (13 April 2000).

National Institute for Standards and Technology (NIST). "US Cryptography Policy: Why We Are Taking the Current Approach." 1996. (13 April 2000).

Stefanick, Jennifer L., Edware M. Pinter, and John J. Witmeyer III. "Coded Communications On the Internet: Who Should Hold The Key?" 1996. (13 April 2000).

    More about Militia Groups Band Together

      Open Document