User:Ashleighuoit/sandbox

From Wikipedia, the free encyclopedia


Government Surveillance on the Internet[edit]

The Internet poses as a form of surveillance for governments to monitor individuals among societies to ensure safety and security. The term surveillance refers to efforts that are made by governments to gather information regarding individuals from a distance. Surveillance can be performed covertly as well as without entering the personal space of individuals. [1] In most places around the world, democratic or not, communication infrastructures are for the most part government owned and operated. Content surveillance can be found in these parts of the world as well as the monitoring of Internet based traffic. This can be performed by one or more government intelligence or law enforcement agencies. It usually occurs without any notice of entry and without the requirement for anticipated cause and reasonable belief to be reviewing the substance of the communication. In undemocratic societies, all citizens are being watched all the time. This is because all dissent is a threat to the system of government in power. By having control over everyone in a society, the governments can ensure that they will be staying in power and also maintaining power. In the past, surveillance was executed by using networks of spies and informants. In modern day society, surveillance is now completed by total Internet supervision. [2] The capabilities that technology provides to societies today has taken surveillance to a whole new level. Governments now have the ability and the materials available that enable them to observe the behaviour of all individuals without the need for a physical spy to be present. Advanced technology provides acute impact in regard to ethics and surveillance. All actions performed by individuals are observable, recordable, searchable, and traceable in modern day society. This can lead to many intrusive measures and methods of surveillance. [3] Internet surveillance performed by government's works to create a sense of willfulness among individuals who are most opposed to systems of government. This is performed by creating a sense of anxiety about whether changing online political occurrences will make individuals the focus of inspection. [4] Citizens are more frequent in terms of usage of the Internet and technology because it is rapidly evolving. The advancement of technology creates the issue and the possibility for security threats and dangers of strategic surprises. This issue has prompted governments to create a variety of online security monitoring strategies and tools. Among these tools and strategies are plans for movements and transactions, impeding communications, and examining and comprehending data. [5] The vast network of computers has expanded worldwide which is providing computer infrastructure. This infrastructure makes the mass activity of widespread surveillance feasible. Jeremy Bentham, a British philosopher, created the idea of the Panopticon. This consisted of a central observation tower in the center of a circular prison. The observation tower blinded prisoners from seeing the guards, therefore leaving them unaware of surveillance. Government surveillance has conformed to some aspects of Bentham's panopticon because of the availability and use of the Internet in surveillance. [6] A critical component of powerful regulation of the Internet requires that the few watch the many and prevent the many from watching the few, similar to Benthams theory. The distinct instruments of the power that is provided by surveillance can best be demonstrated through the organization of the panopticon. [7]

Government Surveillance Techniques[edit]

1. FBI Aerial Surveillance: This includes FBI airplanes equipped with high tech cameras and state of the art surveillance technology that are capable of tracking thousands of cellphones below. The planes fly large circles daily around large cities to track targets and gather information. [8]
2.Domestic Interception Stations: intercepting stations have been installed by NSA technicians at key junction points, or switches throughout the country. The switches are located in large window-less buildings that are owned by major telecommunication companies. They control the domestic Internet traffic flow across the nation. [9]
3. The PRISM Program: Partners at the FBI and DITU gather information from the servers of nine major American Internet companies including Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple inc. This partnership provides direct access to audio, video, photographs, emails, documents, and connection logs for each of the systems. [10]
4.Cellphone Tracking: The cellphone location tracking program gathers 5 billion records a day which feeds into a large 27 terabyte database where information is stored about the locations of thousands of devices. [11]
5. Undersea Cable Tapping Program: Tapping into the worldwide network of undersea cables can process data as it flows through the Internet. The systems used are responsible for different types of intercepted data. [12]

Transaction Surveillance[edit]

Transaction surveillance is a way of entry to recorded information about communications, proceedings, and transactions. [13] Technology has enabled transaction surveillance to be a particularly powerful tool for law enforcement. Computers and the Internet are used by Commercial Data Brokers (CDB), to find unrefined information from public records. [14] Detailed electronic footprints are generated by the transactions that are regulated and conducted in Cyberspace. These footprints have the ability to expose the preferences, characteristics, interests, and behaviours of individuals. The Internet provides revolutionary methods to unobtrusively observe the interactions about individuals. This information provides a copious amount of content for governments about an individual and their transactions. [15] Computer databases allow for transaction surveillance to take place by allowing access to already existing records. These records may include phone logs, electronic mail logs, credit card histories, other financial transactional data, and air, train, and bus travel booking. [16]

Physical Surveillance[edit]

Physical surveillance refers to the real-time observation or detection of movements, activities, and conditions. [17] Before the revolution of technology, the examination of physical activities was dependable on the naked eye with devices as simple as telescopes and binoculars. As technology advances, physical surveillance can be performed with advanced technological tools included but not limited to, night scopes, thermal images, sophisticated telescopic and magnification devices, tracking tools, and see through detection technology. [18]

Communication Surveillance[edit]

Communication surveillance includes the real time interception of oral, written, and electronic communication by using electronic or other surveillance means. [19] Communication surveillance allows governments to monitor, intercept, collect, and preserve information that has been communicated, relayed, or generated over communication networks to a group of recipients. It does not require that a human reads or intercepts communication. It can take place on a mass scale, such as UKs Tempora system, or on more intrusive scales such as installing Malware on computers. Communication plays a major role in the lives of individuals therefore, it is important as it enables individuals to build relationships, share experiences, and develop individuals throughout society. Because of this, communication surveillance is significant for the fundamental need for communication in society. [20]

References[edit]

  1. ^ Slobogin, Christopher (2007). Privacy at Risk. Chicago and London: The University of Chicago Press. Retrieved October 12, 2015.
  2. ^ Gallington, Daniel. [most of the rest of the world, there is content surveillance and monitoring of Internet based traffic by one or more government intelligence or law enforcement agencies – and usually without any threshold showing or requirement for probable cause or reasonable belief to look at the substance of the communication. "The Case for Internet Surveillance"]. World Report. Retrieved October 15, 2015. {{cite news}}: Check |url= value (help)
  3. ^ "The Ethics (or not) of Massive Government Surveillance". Introduction Legal Issues Ethics. Retrieved October 13, 2015.
  4. ^ Krueger, Brian (2005). "Government Surveillance and Political Participation on the Internet". Social Science Computer Review. 23 (4). Retrieved October 10, 2015.
  5. ^ Bekkers,, Victor; Edwards, Arthur; de Kool, Dennis (2013). "Social media monitoring: Responsive governance in the shadow of surveillance?". Government Information Quarterly. 30 (4). Retrieved October 10/2015. {{cite journal}}: Check date values in: |accessdate= (help)CS1 maint: extra punctuation (link)
  6. ^ Krueger, Brian (2005). "Government Surveillance and Political Participation on the Internet". Social Science Computer Review. 23 (4). Retrieved October 12, 2015.
  7. ^ Krueger, Brian (2005). "Government Surveillance and Political Participation on the Internet". Social Science Computer Review. 23 (4). Retrieved October 12, 2015.
  8. ^ "Domestic Surveillance Techniques: Our Data Collection Program". Domestic Surveillance Directorate. Retrieved October 16, 2015.
  9. ^ "Domestic Surveillance Techniques: Our Data Collection Program". Domestic Surveillance Directorate. Retrieved October 16, 2015.
  10. ^ "Domestic Surveillance Techniques: Our Data Collection Program". Domestic Surveillance Directorate. Retrieved October 16, 2015.
  11. ^ "Domestic Surveillance Techniques: Our Data Collection Program". Domestic Surveillance Directorate. Retrieved October 16, 2015.
  12. ^ "Domestic Surveillance Techniques: Our Data Collection Program". Domestic Surveillance Directorate. Retrieved October 16, 2015.
  13. ^ Slobogin, Christopher (2007). Privacy at Risk: The New Government Surveillance and the Fourth Amendment. Chicago and London: The University of Chicago Press. Retrieved October 12, 2015.
  14. ^ Slobogin, Christopher (2005). "Transaction Surveillance by the Government". The Mississippi Law Journal. Retrieved October 13, 2015.
  15. ^ Dinev, Tamara; Massimo, Bellotto; Hart, Paul; Christian, Colautti; Vincenzo, Russo (2005). "Internet Users, Privacy Concerns and Attitudes towards Government Surveillance- An Exploratory Study of Cross-Cultural Differences between Italy and the United States". Association for Information Systems. {{cite journal}}: |access-date= requires |url= (help)
  16. ^ Slobogin, Christopher (1997). "Technology Assisted Physical Surveillance: The American Bar Associations Tentative Draft Standards" (PDF). Harvard Journal of Law and Technology. 10 (3). Retrieved October 13, 2015.
  17. ^ Slobogin, Christopher (1997). "Technology-Assisted Physical Surveillance: The American Bar Association's Tentative Draft Standards" (PDF). Harvard Journal of Law and Technology. 10 (3). Retrieved October 13, 2015.
  18. ^ Slobogin, Christopher (2007). Privacy at Risk: The New Government Surveillance and the Fourth Amedment. Chicago and London: The University of Chicago Press. Retrieved October 14, 2015.
  19. ^ Slobogin, Christopher (1997). "Technology Assisted Physical Surveillance: The American Bar Association's Tentative Draft Standards" (PDF). Harvard Journal of Law and Technology. 10 (3). Retrieved October 13, 2015.
  20. ^ "Communications Surveillance". Privacy International. Retrieved October, 14, 2015. {{cite web}}: Check date values in: |accessdate= (help)