-
Essay / Internet and Internet Surveillance in Government
The Internet is a global structure of interconnected networks that serves several billion people simultaneously around the world. It is a network system made up of millions of public and private networks ranging from local to global scale. These complexes are connected by a range of electronic and wireless technologies. The Internet carries a wide range of information resources and services, including electronic mail systems and web pages. Computer, network, and Internet monitoring involves observing a computer's activity and data. This is often done secretly and furtively. This surveillance could be carried out by governments, corporations, criminal organizations or individual users. Computer, Internet and network monitoring programs are widespread today and almost all Internet traffic is monitored. Surveillance “is understood as systematic attention to personal details, with a view to managing or influencing the people or groups concerned” (Lyon, 2003: 16). Internet monitoring is particularly useful to governments and law enforcement to maintain social control, recognize threats, and prevent and investigate criminal activities. With the advent of programs like the Total Information Awareness Program and laws like the Communications Assistance for Law Enforcement Act, governments now have unprecedented access to monitor online activities of their citizens. While internet monitoring is a useful tool for governments and law enforcement agencies. Many civil rights and privacy groups, such as the Open Rights Group, Big Brother Watch, and Privacy International, are expressing concerns about ever-increasing surveillance. They share the anxiety of finding themselves in collective hysteria in the middle of a paper…easily evaluated today. Storage is cheap enough to keep the data forever, and the models by which it will be analyzed a decade from now cannot be reasonably predicted. Counter-surveillance involves avoiding surveillance or making it difficult. Developments in the late 20th century have led to a dramatic growth in counter-surveillance in terms of scope and complexity, such as the Internet, the increasing prevalence of electronic security systems, and large corporate and government computer databases. Counter-surveillance tools such as encryption and scrambling help counter surveillance, where data must be reconstructed using decryption methods for it to be useful. Reitinger (in Thomas & Loader, 2000: 132) refers to encryption methods – defined as “the scrambling of information to prevent unauthorized people from reading it’