1. Where is the list of all IP addresses coming from
2. Who is supposed to manage the white list, or the now very large ruleset in your large organization
3. Who is supposed to whitelist EVERY SINGLE ip address your computer talks to? Track the connections in your ASA, and you will discover that with phones, tablets, and regular users, a 50 man organization will connect to literally tens of thousands of IPs a day. Its unrealistic to whitelist IPs, especially when you can not guarantee targets will not update their DNS records when they obtain new IP addresses.
4. Forget about any P2P application.. not just file-sharing but chat and messaging programs that communicate directly to the client.
not trying to blame the victim, but I wonder if antivirus or anti-malware software will detect these ransomware programs? Just asking. I guess firewalls might be able to detect the Tor server/connections.
All a firewall will see is encrypted traffic from the computer in the LAN (inside) initiate a connection to a random computer (IP address) on the Internet (outside interface). Its not able to see what is being sent/received, which is the entire reason for TORs existence.. protecting you from Man in the Middle attacks, which in this case, the firewall would be.
The fact that our digital culture has mechanized mass-surveilance, the likes of which were surely unimaginable when the founding laws were laid down, does not change the intent of the law. The government has to show just cause before it can search your effects or your person. Mass surveillance is specifically counter to that intent. There is no just cause for searching people at random, and that again is specifically what the law is written to keep from occurring.
However, if you post on FB, thats information you are choosing to share with a corporate entity. If they in turn share that data, its either in accordance with their policies, the law, or in violation of them, which means you have cause to lay a claim. Just like you can not kiss someone in public and expect privacy, you can not expect to post information to FB and expect privacy. If your friends can see it, they too can share it, which is not in violation of any contract or law.
The chance now is for people to rise up and assert when the information intended to be secure (such as encrypted data to another person), is syphoned and decrypted en masse; the government is in violation of both the "spirit" and the letter of the law.
The main driver for this project was not the cost of the technology vs. the cost of the payroll, it was the ancillary benefits that come with automation that humans just can not match. Thats my point (in response to the point of the article).
Again. I understand it increases the bottom line, but it does so in a way that doubling the payroll could not have achieved. There is a diminishing return on the number of employees you can have driving around a warehouse in a propane truck, and yes there is a limit on the number of these forklifts you can hire, but the objective was to maximize shipping capacity of the warehouse. These units were better than the humans at that.
And unless you live in a dictatorship, you are not allowed to "demand" anything for any price, just as I am not allowed to "demand" you purchase any particular good or servi... oh wait. I forgot we passed the ACA.
What you are forgetting to take into account is that you get significantly more production, at a higher rate of accuracy with machines. In some cases (not all), the accuracy and production increase is simply unfeasible with a human workforce.
Its like asking how many postmen would it take to deliver all the world's email. There simply wouldn't be enough resources to do the job, regardless of cost.