Thursday, June 6, 2019

Weak Arguments Against Strong Encryption Essay Example for Free

Weak Arguments Against Strong Encryption EssayIn her article empower Weak Arguments Against Strong Encryption, Deborah Pierce, in taking an unequivocal position in the current debate about the use of encryption, tells the ratifier that under no component whatsoever should unbreakable encryption be banned. She decl ares that trying to ban strong encryption is non only futile and wrong, it is destructive as well. In an move to persuade the reader to take her side, Pierce endeavors to achieve what is called the rhetorical trigon or the use of ethical appeal, logical appeal, and emotional appeal in equal proportion. (Uga musical composition Center, n. d. ) Although Pierce employs the three types of appeals, the intended rhetorical triangle is not evident. She commits certain miscalculations which leave the reader either unbelieving or annoyed. Pierce starts her test to persuade by establishing her ethical appeal. This she does by describing to the reader in an authoritative way what encryption is and how it departs, effectively exhibiting her knowledge about the subject.She explains that the system is invaluable in that the secure communication that it guarantees protects trade secrets, safeguards sensitive information such as medical records, financial information and transactions, and protects classified government information that we would not want to pin tumbler into enemy hands. Rather effective because aside from showing that she knows her topic well, she also informs the reader that she only wants what the reader also requires.The author, however, commits her first miscalculation when she attempts to persuade the reader through his or her emotions. When she said that Human rights organizations use encryption to communicate by email with people who would surely be tortured or killed if their communication theory were made known, the reader is left rather dumbfounded. Many Americans realize that the sacrifices and the risks being taken by the se activists as well as those who help them in their work are in defense of human rights.For this reason, Americans sympathize with them and certainly do not wish them any harm. However, to say that they or their contacts are in hazard of being tortured or killed if their electronic mails are publicized or supplied to government authorities is stretching it a bit too far. Everybody knows that human rights activists are protesters and demonstrators, but they are not anarchists or communist revolutionaries who are out to overthrow the government. These people have no secrets which could be fatal for them or electronegative to the government.This is almost certainly a scare tactic, or an appeal to fear. In other words, the authors use of the second side of the rhetorical triangle emotional appeal is a dismal failure. This leaves the third side of the rhetorical triangle logical appeal. Pierce tries to use this tool again, to no avail to show against the key escrow system being p ushed by Republican Senator Judd Gregg from New Hampshire. Under this system, a third party will be authorized to hold copies of the users face-to-face encryption keys. These keys will be made available to law enforcement officers as the need arises and on a case to case basis, provided they can obtain the halal warrant from the court. Since rhetorical appeal is supposed to contain statements of authorities, Pierce has chosen to quote Craig Nathan who said that Key escrow is the equivalent of allowing the government to install a vane cam in your bedroom, which they could turn on without your permission or notification at any time they thought it might help combat terrorism. This statement is super hyperbolic, an extravagant exaggeration. Giving government access to a personal encryption key does not mean that it can take hold of it anytime. As discover has shown us, there are always guidelines and legal procedures established for such purposes. Terrorism should not be employed as a catchall term either because it could not be used to justify everything that government is doing. Pierce should do better than use terrorists as a red herring and blame them for everything bad occurring in the country today.After failing to employ the rhetorical triangle successfully, Pierce, therefore, fails to persuade the reader to adopt her view. References Pierce, D. (2007). Weak Arguments Against Strong Encryption. Seattle Press on Line. Retrieved July 21, 2007, from http//archive. seattlepressonline. com/article-9276. html Uga Writing Center. (n. d. ). The Rhetorical Triangle. Retrieved July 21, 2007, from http//www. english. uga. edu/writingcenter/writing/triangle. html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.