66666666666666666666666666666666666666666666666666666666666666666666666666666
case study questions for Computers and Society
Order Description
Read the instructions and the chapter provided and answer the following questions. Instructions: 1- Each question should be answered in a short paragraph. 2- Note that I am particularly picky in how you use sources for your answers to case studies. I
Case Study 7 — Mass Surveillance and Security

Bruce Schneier’s book Data and Goliath discusses the effects of mass surveillance in a digital world. In Chapter 11 of that book he examines the effect of the NSA’s mass surveillance on our security, based on what we now know after the Snowden revelations. The government performs this mass surveillance in the name of keeping us safe. Schneier makes a case that it does the opposite. Read Chapter 11 and answer the following questions:
1. Schneier says that using mass surveillance to find terrorists would have so many false alarms that it would not be useful. But what if we were to come up with a technique that was extremely accurate — would we still get too many false alarms? Lets say we get accuracy of 99.99%, almost perfect, and that 1 in every million people scanned was really a terrorist. Would that be enough to bring the false alarms down? Could we use this technique to reliably find the terrorist? Explain why or why not.
2. The NSA, CIA and others have been gathering mass surveillance since 9/11 (and even before.) Schneier points out it did not help find the Boston bombers, the underwear bomber, or the liquid bombers. What did he say was a more effective technique, and why is it better than mass surveillance? Explain.
3. What is the difference between mass surveillance and targeted surveillance? Explain.
4. An 80 bit encryption key (roughly the length of a 10 character password) is twice as hard to use as a 40 bit key (similar length to a 5 character password.) How much harder is it to crack it? By harder, I mean how much longer would it take to crack. I’m not asking in absolute time, just compare it to breaking the 40 bit key.
5. If encryption is so good, how do the NSA and similar agencies get access to encrypted information? Explain.v