Author: Wyatt Lucas

  • The Labor Movement’s Resurgence during the Great Depression

    (Written in September 2017)

    The Labor movement’s explosive growth in the 1930s was a direct result of the National Industrial Recovery Act’s Section 7a putting protections in place for organized labor, but this growth would not have occurred at the same magnitude if the working class had not been largely homogenous at the time. Workers were able to organize in large numbers during the Great Depression because many of the divisions inside of the working class had disintegrated by this point. The high unemployment rate led workers to value their jobs more than ever; they sought to improve their quality of life through demanding better treatment from employers and they slowly won this fight, one battle at a time.

    (more…)

  • Cryptography and the Internet

    (Written in October 2017)

    Cryptography is an essential part of the internet, allowing the secure transmission of private data through public networks. The field of cryptography is focused on the encryption and decryption of data. Encrypted data should ideally not be able to be decrypted by anyone other than the intended recipient (Savu). While ciphers for accomplishing this started out as simple substitution algorithms, they evolved along with technology to eventually become the complex ciphers found today like AES. The RSA standard marked the beginning of the popularity of public-key encryption (Savu). In this schema, the client and server have both public and private keys which can be used to encrypt and decrypt private communications as well as sign documents to verify one’s identity (Olzak).

    Public key certificates provide a method for verification of identity. The most common and important use of public key certificates on the internet is SSL on websites—i.e. HTTPS-enabled sites (Savu). SSL provides security to both clients and servers; without it, data sent between a client and server can be intercepted in plaintext. Without SSL, user accounts on websites would be completely insecure; any important internet activities like financial transactions would be unfeasible. Through this technology, public key certificates allowed the internet to progress past the web 1.0 era into the extended user interaction of the current era.

    Encryption alone is not enough to ensure the total security of a system. In order to ensure the most security possible, vulnerability to interception must be minimized and implementation of the encryption process itself must be flawless (Olzak). Enterprises should be wary of relying solely on encryption for security and should look into tightening measures surrounding the encrypted data (Olzak).

    Cryptography is a large part of the internet’s backbone, providing a means for secure transmission of data. Without encryption, the internet in its current form would be unable to exist. Not only do user-interactive sites rely on it, but so does the backend of all servers. If all data were transmitted in plaintext, cyber attacks would be easy and constant. A strong encryption standard as well as implementation is necessary if total security and privacy is to be achieved.

    Works Cited

    Olzak, Tom. “Chapter 7: The Role of Cryptography in Information Security.” InfoSec Resources, InfoSec Institute, 11 June 2012, resources.infosecinstitute.com/role-of-cryptography/.

    Savu, Laura. “Cryptography Role in Information Security.” Recent Researches in Communications and IT , www.wseas.us/e-library/conferences/2011/Corfu/CITCOM/CITCOM-04.pdf.

  • Trotsky’s Terrible Tuesday

    (Written in April 2019)

    It’s the tail end of a gorgeous summer day in Coyoacán. It’s August 20, 1940; the Communist revolutionary Leon Trotsky and his wife Natalia Sedova are drinking mint tea in the garden of their villa in this rural borough of Mexico City. They’re sitting on a stone bench under the shade of many tall royal palmetto trees, facing the garden of tropical flowers and rare cacti which Trotsky has meticulously cultivated these past few years. Thoroughly-needled tubes of mammillaria glochidiata cacti are backed by a shrub of pink dahlias with thousands of small tongue-like petals. Clucking comes from their nearby enclosure of chickens and the resonant plucking of a guitarrón is heard in the distance.

    The stress from years of exile has aged the pair. Both of their hairs have faded to gray and Trotsky has put on a few pounds. The quiet lifestyle of this Mexican villa suits them, however, and it shows in their relaxed apparel. He is wearing a sleek white button-down and gray trousers (having ditched the suit jacket in this climate) and Natalia is in only a thin striped blouse and a long black skirt.

    (more…)

  • Faraday

    (Written in April 2019)

    March 30, 2011. My first big item, a Nintendo 3DS. At this point, I’d been stealing on a near-daily basis. It started with that bag of chips in the school cafeteria but it quickly progressed to retail. At first I’d justify it to myself as stealing things that I wanted so I didn’t have to pay for them, but I knew that I was really doing it for the rush. The rush you get from the weight of your full pockets, and that rush you get when the automatic door opens and your thieving ass is safe.

    I got Trey roped into this early on, and I’ve not since experienced a bond at all similar to the kind that I formed with this partner in crime. Video games were our treasure of choice since we didn’t need to sell games to get value out of them. You just had to locate the security camera, get your buddy to cover you, and slip that game in your pocket. Then you had the choice of walking out nonchalantly or buying some cheap item as a decoy if anyone gave you a funny look. Of course, we would steal anything if we felt like it; even something as monotonous as a pack of batteries. Trey and I thought of ourselves as redistributors of wealth, not villains.

    (more…)

  • Positive

    (Written in April 2019)

    It’s a hot August day on Rikers Island. Of course, I can only tell that it’s daytime from the rays of light shining between the bars of this cell’s tiny window. No one’s been around to enforce bedtime in days, nor let anyone out for a meal, shower, or recreation in the yard. That fucker down the hall is moaning again. Does he think anyone hears him? Nobody’s coming to help you, buddy! Can’t you smell the death stinking up this shithole, begging for the sweet escape of an open window, a door, anything​? The stench of the diarrhea and vomit that soaks the clothes of my criminal neighbors had gone from an infuriating olfactory presence to my new normal.

    My name’s Eric Porter, and I guess I’m a survivor. Oops, that sounded like a hokey line from an NA meeting. Well, it’s true. Every night last week, the whole block would huddle around the big wall-mounted CRT TV over in the rec room to get the latest updates on the superflu. It popped up in Montana and spread hundreds of miles in a flash. 100% lethality and seemingly airborne transmission. Of course there was a riot in here when the news came that it was in New York, but what could we do when they brought out the tear gas and tasers? Into your cell you go and into your cell you die.

    Except me. And that other guy. That was 5 days ago so I’m starting to get hungry in spite of the stench. All I’ve had to eat is some of the skin above my fingernails, but I’ve been doing that since I had to kick meth on account of my imprisonment. I’m not too far above moany guy, I just express myself differently. Right after the cell block got real quiet, my favorite pasttime was to poke my nose through my cell door and shake the thick white bars hoping that someone would come rescue us. Now I’ve given up and await impending doom. I lay in my hard, white cot and stare at the hard, gritty ceiling to conserve energy, only getting up to relieve myself in the stainless steel toilet or drink water from the tap above it.

    (more…)