• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Make room for Big Brother.

Extracts from this document...

Introduction

Mark Treiber Hutchinson English II-H (3) 13 March 2003 Make room for Big Brother The majority of us have at least once in out lives read George Orwell's 1984. The idea of this long time classic about a man living in a society with no privacy from the leader Big Brother is closer than you think. Weather we know it or not, we are watched everyday. Most people know this but they do not know the true extent of this surveillance, or more so the limitations of their privacy. You are never the only person to know about something you do in private, there is no such a thing as privacy anymore, it have been violated by spy satellites, surveillance cameras, hidden cameras, telephone taps, audio bugs, ECHELON, or by the FBI's Carnivore program. When the local police want to search a persons house what is required? We all know the answer is a warrant. But higher branches are not required to have warrants to gather information on a person by invasion of Internet privacy, or to monitor all telecommunications ever sent. Do not get the wrong idea from these facts though, governments are not the only ones invading our privacy, it also corporations wanting the publics business or perverted camera operators. Your privacy is gone, nonetheless. What you may learn from this may shock you, scare you, and may even cause paranoia. Read at your own disturbance. Do you have any secrets that you would never want anyone to know? ...read more.

Middle

Within the last few years the FBI has started to not get information from people's computers with a warrant but rather will go directly to the suspects Internet Service Provider (ISP). This in fact can be considered a violation of ones civil liberties. This is even truer because according to the law at this time, when someone signs up for Treiber 4 an internet account they are not required to give information such as their name before they sign up for an account, and more importantly most ISP's are willing to provide an anonymous internet account to those who request it. At this point it is obvious one who signs up for such an account is concerned about their privacy and revealing their identity, but the government is now taking away that "piece of mind" that the consumer once had by having an anonymous online alias. David Banisar co-author of The Electronic Papers says, "Administration unwisely wants to make it easier to obtain people's identities, trace their movements online, and apply wiretapping to the Internet." (McCullagh, Declan "U.S. Wants to Trace Net Users") This want to take away privacy of the Internet from all to prevent the bad actions of a few has worked itself into a "Catch .22". The two options are, either take away innocent citizen's privacy on the Internet, or to continue to let criminals have the ability to remain totally anonymous, at their fingertips. This problem not only affects the consumer but the ISP as well. ...read more.

Conclusion

Identity fraud and theft is more prevalent today that it ever has been. This is a result of the technologically advanced world we live in now. I personally know someone who has been the victim of identity theft and it is far worse than it sounds. She told me that thousands of dollars of her heart earned money had been carelessly spent on pornography. Another common problem with computer security is the misuse and abuse of administration privileges in private companies. Many companies have been reported for using what's called keyloggers to record everything an employee types, enabling them to acquire bank account numbers and passwords, and passwords to personal e-mail accounts. To conclude, what is being done as safety measures for our country, and for Companies can often jeopardize the public's privacy. These security measures are indeed good, but it is their abuse and misuse that can lead to havoc. In this new age of Treiber 7 technology it is getting easier for computer hackers to gain access to these security measures used by out government. It must be taken into consideration that any power that initially is used for good can fall into the wrong hand and be used for the opposite reason it was developed. The new surveillance techniques used today need to be used more carefully; not only to prevent its misuse but also, to make sure that the privacy of the innocent is not invaded. Now knowing of the little privacy that actually exists, be careful of what is ever said over the phone, in e-mail, or in a fax. You indeed are never the only one to read it. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. Nations today, most commonly such as China, Iran, and Burma has become infamous for ...

    The website also informs readers of other related problems of internet censorship, such as the contradictions it the fight against repression. The site offers information of how many North American companies such a Microsoft and Google are aiding countries such as China to censor users of their services.

  2. Internet Security and Privacy ThreatsIntroductionIn this day and age technology plays a part in ...

    Some users log on just to check balances. A smaller number of more sophisticated users routinely jump online to transfer money between accounts, pay bills automatically and apply for loans, essentially eliminating paper from the process. Recent national surveys suggest that a clear majority of the nation's bank-account holders don't trust their banks, the Internet or their own technology acumen enough to bank online.

  1. Information Technology New and Old: James Patrick Kelly's Big Guy and E. M. Forster's ...

    One of the earliest servers on the Internet is the WELL, physically located in Sausalito, California. Users entering the WELL are greeted by the following lines: You've entered an evolving experiment in virtual community. Find out about the WELL, the community of people and ideas that inhabit it, the conferences

  2. Cyber Ethics @ Computer Ethics

    been demonstrated that these also block access to non-porno sites such as universities or news sites. There is less concern over porn sites because most of these require credit cards. More threatening are pedophiles who befriend children in chat rooms and later arrange for personal meetings.

  1. History of the Internet.

    By contrast, Internet computers in the low-end "appliance category" of a few hundred dollars per machine are still rare in the marketplace. As a result, we see the penetration of PCs far behind that of telephones in areas of the world with low per capita incomes, e.g.

  2. Moral and ethical uses in Information Technology.

    BY BRUCE BALESTIER New York Law Journal Tuesday, December 14, 1999. ... Description: AOL sues Christian Brothers for spamming. [New York Law Journal] http://www6.law.com/ny/stories/99/12/121499a3.htm CBS News | AOL Tries To Slam Spam | Tue, 11 Apr 2000 10: ... AOL Tries To Slam Spam Files Multimillion Dollar Suit Against Bulk

  1. Campaigner for Digital Privacy Rights.

    The Importance of Privacy Protection As the Internet grows as a communications and commercial medium, opportunities in electronic commerce continue to expand. Each new area of activity raises new legal issues for legislators and regulators. Surveys show that fear of losing personal privacy is keeping a large number of

  2. COICA. The Role of the US Government and Online Piracy

    The publicity of both of them is important because it will hopefully depict this as a bipartisan issue, which is very necessary as I said earlier. In a letter to constituents Sen. Leahy stated, ?Each year, online piracy and the sale of counterfeit goods cost the American economy billions of dollars.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work