Ghost In The Machine Chapter 3 Analysis

Improved Essays
Hidden Information Chapter three of Blown to Bits was very eye opening. The chapter, titled “Ghosts in the Machine”, was about how information may be stored in our computer. All the information stored in a computer is not always totally visible to us. The authors, Hal Abelson, Ken Ledeen, and Harry Lewis also discuss how information can be hidden in the form of images. They also discussed the terrifying prospect that information that you believe to have been erased may in fact be lurking somewhere on your disk. We cannot possibly see all the information stored on our computers. In fact, normally we don’t need to know all the hidden information. However, when sending redacted messages it is important to make sure that the information that …show more content…
They gave an example of students at MIT who bought used disk drives on Ebay and, using fairly simple methods, were able to recover all sorts of information off the drives. The sellers of the drives had probably thought that they had cleared it before sending it, however the students were able to recover names, addresses, credit card information, and other personal information on the previous owners of the disks. “There are upsides and downsides to the persistence of bits” (104). This is a very true statement! It is incredibly difficult to ensure that your personal information from getting into the wrong hands after you get rid of your old machines. The authors of the book suggest physical means of making sure that your personal information does not get into the wrong hands. So what will it be: hammer or axe?
` In conclusion, the third chapter of Blown to Bits was very informative. “Ghosts in the Machine” was a chapter about how information can be hidden within computers. It is important to be careful when sending sensitive information. Images can be used to hide information from programmers. And finally, be careful when getting rid of old machines. These three things are important to note when trying to keep your personal information

Related Documents

  • Superior Essays

    Log files created by the web browser also store web browsing history information such as web pages visited and accessed along with dates and times of those visits (Ravi, 2007). The registry can provide evidentiary value to the digital forensic investigator as well in relation to web browser artifacts. Items such as passwords, default search provider and search engine, and the URLs typed into the web browser address bar are stored in the NTUSER.DAT file located within the NTUSER.DAT hive in the registry. Twenty five URLs can be stored at one time in the NTUSER.DAT file and they are cycled out as new URLs are typed into the web browser.…

    • 661 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Technology and media play a significant role in most people 's lives in today 's society. Digital devices are starting to rule over people 's lives. In Fahrenheit 451, Ray Bradbury illustrates a fictional society that revolves around electronics. The people living in Bradbury 's creation are brainwashed by the government, almost programmed to be the same, with a world in which reading books is illegal. The novel sends a clear warning to the real world showing how electronics can destroy freedom and independence.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The issues relating to the discerning use of technology has continually caused the attitude and perceptions to the social and ethical considerations of the use of technology. Stereotypically shown in the movie Die Hard 4.0, the unethical use of technology (Hacking/cracking) and other techniques was frequently used to achieve and set the tone of the movie. Unethically used by the main antagonist of the film “Thomas Gabriel” Used these techniques to create a “fire sale” which is broken down into 3 stages. To take out the transport networks, then utilities such as electricity and the water grid. Finally, to infiltrate secure financial records to gain a monetary boost to the attacker from the so called “fire sale” This example demonstrates how…

    • 208 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Title In “The Man in the Dead Machine” By Donald Hall a WWII pilot is in a battle over New Guinea, the poem is split into two different outcomes. One outcome is negative and one outcome is positive. The pilot fate is determined by his choices. The author Donald Hall uses Allusion, and Imagery to create this poem.…

    • 308 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In Alexandra Alter’s expository editorial the subject of privacy, and especially its relation to data collection is a controversial topic that has the power to polarize people. This article highlights how a previously solitary act of reading is evolving into something that can be tracked and analysed. The author’s thesis focuses on reading, when done electronically, has become an invasion of privacy. This article also presents the idea that reader-user data and it’s analysis is very profitable for publishers and e-book companies.…

    • 94 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    In the novel Getting Ghost by Luke Bergmann, the street drug trade in Detroit is one of the most important social institutions for young African American people. Detroit was one of the most prosperous cities in the 1950s and 1960s where many people flocked to find better jobs and a better future for their family. Unfortunately, the economic wealth and prosperity of the city dramatically declined as the jobs in the automobile and manufacturing industries were being outsourced. There were many other various factors that escalated the deterioration of the city which includes various discriminatory practices and racism, which ultimately lead to the great white flight phenomenon. These factors made a huge impact on the lives of everyday African…

    • 1766 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    (I am side 2: "Military Women in Combat: Why Making It Official Matters") "The Under Cover Parent" by Harlan Coben Coben begins his essay with an explanation of his personal experience and initial thoughts on spyware. In the second paragraph, Coben describes consumer-level spyware, and he explains how it works.…

    • 826 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Blown To Bits Analysis

    • 346 Words
    • 2 Pages

    Blown to Bits Chapter 2 showed us how private the digital world is. Headline spoke upon different types about privacy around the globe. The main topic was Radio Frequency Identification Tags (RFID). The topic entirely went into detail about how it knows almost everything about a person or company. This Chapter reveled benefits, effects of technology being in our private lives and the change it has had on our society as a whole.…

    • 346 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Technology has improved in todays society, so much that it has become a reliable source of communication, and storage for very important files and documents. Ones own memory however is very important to stimulate for their own good, and for times that technology cannot be accessible. As stated by Sophie McBain author of “Head In The Cloud”. “ Apart from the few occasions when my phone has run out of battery at a crucial moment, or the day I was accidentally plunged it into hot tea, or the evening my handbag was stolen, it hasn 't seemed to matter that I have downloaded most of my working memory on electronic devices.” This is a perfect example of why one should rely on their own memory instead of technology.…

    • 1188 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The main idea in this book is to watch what you do online because it can affect you in the long run. As teens we make mistakes so we can later learn from them, but the ones online could be the worst you will ever make in your life. “The idea of a “permanent record” used to be a myth used by school teaches to scare children into behaving, lest their bad deeds be written down in some alleged file that would haunt them forever. Now though, for better or worse, the permanent record is real, and has arrived in the form of the Internet” (2). What the author is basically saying is after you post on the internet it stays forever regardless of the delete button.…

    • 518 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Technology is an important factor in today’s society especially in our healthcare system. The advancement in technology is on the rise and it is always changing and updating. The healthcare system is making their way to convert all their medical records electronically; although this can be a good transition, it can also pose a problem. Electronic health records have not been perfected and there are still risks for breaches and potentially a big possibility of disclosing patient’s important medical and personal records. On September 8, 2011, Nemours, a Children’s Health System reported missing three unencrypted computer backup tapes that were locked and stored in a cabinet in the Nemours Health System facility in Delaware.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Basically the internet rerouting our memory and we can remember where we got the information from, but not necessarily what it is. Nowadays we don't attempt nor try to restore the information we find off the internet. Our brain rely on Google for most of our memory than anything. ‘’A study suggests that 90 percent of us are suffering from digital amnesia’’. Most likely half of us can't even remember our friends’ number because our phone memorize it for us.…

    • 1100 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays