“Texas house Bill No. 912 makes it a misdemeanor for a drone operator to capture images of private property from an unmanned aircraft without the property owner’s ‘express consent’. At the federal level, the proposed Preserving American Privacy Act of 2013 would prohibit law enforcement from conducting drone-based surveillance without warrant and would outlaw the use of armed drones by law enforcement or private citizens over the U.S '' [1]. In the beginning the movie Adam is being chased by a time jet but in order to intercept any future damage, he decides to act, hack and steal a jet. The intentions being that he would travel through a wormhole to reach his destination. By having access to the jet is a feat of its own but to have the ability to hack a jet take a great amount of planning and timing to figure when is the correct moment o interject. Hacking laws are generally strict but especially strict when trying to access government equipments and files.
"Well qualified local civil servants are, one should never rely on their data. the growth of any indicator depends on the person who seats in the courtyard of his collective farm and counts." [2]. This quote remain pertinent as later in the movie, Adam comes to discover that Sorian has altered the time jets user log making it evident that she did not want anyone to know she has been traveling back to 2018. Proving the point that information is easily accessible but there are always a loop hop preventing any data to be completely erased. In this day and age, data is constantly being collected whether we are aware of it or not so the act of data protection is limited to the capabilities of the programmers who built the system. In this case since Sorian happened to work hand in hand with Adam's father, Louis on the Particle Accelerator, she by any means alter the truth to fit her goal. She happened travel twice to 2018, to make sure that the younger version of herself fulfill the older Sorian's goals. A person should never solely rely on data when the data itself can be altered to create a false interpretation of the data.
“DNA association is driven by a combination of van der Waals and hydrogen bonding interactions…This modality established its high accuracy and it is standardized. It has medical, military, and agricultural applications. Its limitations come from being very expensive and extremely intrusive, in addition to requiring a long time for verification.”[3]. After Big Adam shocked Young Adam in his house, he needs Young Adam's DNA to have the jet repair itself since Big Adam is injured. The interesting aspect of this scene is that regardless the year, since its essentially the same person accessing the same device. This could create some breach of security since only one of the two Adam is suppose to have access to jet but in the movie it is portrayed that it is acceptable for two different versions of the same person has access to the jet. Given in present-day the interaction would be DNA authentication, which is suppose the be the last line fo defense for maximum security since it very difficult to hack a DNA sequence. However like any other technology there are ways to bypass the verification process through manipulation.
As quoted in the movie Louis exclaims "Infinitely Shifting Plasma Containing Algorithm which I designed to stabilize wormholes. That is the mathematical equation that will make time travel possible... I've never written the algorithm down or demonstrated i to another human being , so it lives here in the old bean"[1:17:24-1:17:35]. To show that technology may never the safest place to keep confidential information in fear of a potential leak. There are some things that are valuable where it turns anyone into a skeptic. Therefore relying to a non-technological devices to protect the security of confidential information. The only way to remove the hard drive is to be physically pulled out of the accelerator to prevent damages. However at the same time it could have caused a complete meltdown which would have created utter decimation. At the end of the day that is the price to pay to prevent the future to gain access to time travel before chaos erupts.
[1] Wesson, Kyle, and Todd Humphreys. “Hacking Drones.” Scientific American, vol. 309, no. 5, 2013, pp. 54–59, http://www.jstor.org/stable/26018149. Accessed 25 Apr. 2022.
[2] “Implementation of Performance Management in Regional Government in Russia: Evidence of Data Manipulation.” Taylor & Francis, Public Management Review, www.tandfonline.com/doi/full/10.1080/14719037.2014.965271?casa_token=iMRgKIpKIqgAAAAA%3A4UAL4pqt8WT3FLLsNENch-Hu3F_caWtmHKC5oRW0ke0QiDtWGgQhM8XOg1_p0kQG0_ZNeLpDtqY. Accessed 27 Apr. 2022
[3] D. R. Ibrahim, A. A. Tamimi and A. M. Abdalla, "Performance analysis of biometric recognition modalities," 2017 8th International Conference on Information Technology (ICIT), 2017, pp. 980-984, doi: 10.1109/ICITECH.2017.8079977. Accessed 27 Apr. 2022.