• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Make room for Big Brother.

Extracts from this document...

Introduction

Mark Treiber Hutchinson English II-H (3) 13 March 2003 Make room for Big Brother The majority of us have at least once in out lives read George Orwell's 1984. The idea of this long time classic about a man living in a society with no privacy from the leader Big Brother is closer than you think. Weather we know it or not, we are watched everyday. Most people know this but they do not know the true extent of this surveillance, or more so the limitations of their privacy. You are never the only person to know about something you do in private, there is no such a thing as privacy anymore, it have been violated by spy satellites, surveillance cameras, hidden cameras, telephone taps, audio bugs, ECHELON, or by the FBI's Carnivore program. When the local police want to search a persons house what is required? We all know the answer is a warrant. But higher branches are not required to have warrants to gather information on a person by invasion of Internet privacy, or to monitor all telecommunications ever sent. Do not get the wrong idea from these facts though, governments are not the only ones invading our privacy, it also corporations wanting the publics business or perverted camera operators. Your privacy is gone, nonetheless. What you may learn from this may shock you, scare you, and may even cause paranoia. Read at your own disturbance. Do you have any secrets that you would never want anyone to know? ...read more.

Middle

Within the last few years the FBI has started to not get information from people's computers with a warrant but rather will go directly to the suspects Internet Service Provider (ISP). This in fact can be considered a violation of ones civil liberties. This is even truer because according to the law at this time, when someone signs up for Treiber 4 an internet account they are not required to give information such as their name before they sign up for an account, and more importantly most ISP's are willing to provide an anonymous internet account to those who request it. At this point it is obvious one who signs up for such an account is concerned about their privacy and revealing their identity, but the government is now taking away that "piece of mind" that the consumer once had by having an anonymous online alias. David Banisar co-author of The Electronic Papers says, "Administration unwisely wants to make it easier to obtain people's identities, trace their movements online, and apply wiretapping to the Internet." (McCullagh, Declan "U.S. Wants to Trace Net Users") This want to take away privacy of the Internet from all to prevent the bad actions of a few has worked itself into a "Catch .22". The two options are, either take away innocent citizen's privacy on the Internet, or to continue to let criminals have the ability to remain totally anonymous, at their fingertips. This problem not only affects the consumer but the ISP as well. ...read more.

Conclusion

Identity fraud and theft is more prevalent today that it ever has been. This is a result of the technologically advanced world we live in now. I personally know someone who has been the victim of identity theft and it is far worse than it sounds. She told me that thousands of dollars of her heart earned money had been carelessly spent on pornography. Another common problem with computer security is the misuse and abuse of administration privileges in private companies. Many companies have been reported for using what's called keyloggers to record everything an employee types, enabling them to acquire bank account numbers and passwords, and passwords to personal e-mail accounts. To conclude, what is being done as safety measures for our country, and for Companies can often jeopardize the public's privacy. These security measures are indeed good, but it is their abuse and misuse that can lead to havoc. In this new age of Treiber 7 technology it is getting easier for computer hackers to gain access to these security measures used by out government. It must be taken into consideration that any power that initially is used for good can fall into the wrong hand and be used for the opposite reason it was developed. The new surveillance techniques used today need to be used more carefully; not only to prevent its misuse but also, to make sure that the privacy of the innocent is not invaded. Now knowing of the little privacy that actually exists, be careful of what is ever said over the phone, in e-mail, or in a fax. You indeed are never the only one to read it. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. Nations today, most commonly such as China, Iran, and Burma has become infamous for ...

    Wall'), sending private messages viewed by only the account holder, while giving users the options of other online activities such as sending intangible gifts through the website which can be prominently displayed on the user's personal web page. With more than 64 million users worldwide, members of the innovation group

  2. Cyber Ethics @ Computer Ethics

    without authorisation, it could be considered an illegal dilution of the distinctive trademark. If someone uses a trademark in such a way as to dilute the distinctive quality of the mark or trade on the owner's reputation, the trademark owner may seek damages.

  1. History of the Internet.

    These ISPs give customers free Internet access in exchange for the collection of demographic information and/or the distribution of targeted advertising. Where phone density rates are relatively high and local phone calls relatively inexpensive, free Internet access could enable many new users to connect to the Internet.

  2. Internet Security and Privacy ThreatsIntroductionIn this day and age technology plays a part in ...

    Pharming attacks trick users into being redirected to a look-alike Web site. Pharming is very much akin to domain spoofing. Unlike phishing attacks, pharming victims do not have to click on a link in an e-mail message to activate the attack.

  1. Information Technology New and Old: James Patrick Kelly's Big Guy and E. M. Forster's ...

    In Gibson's near future scenario, humans and computers can interface directly. A socket implanted in the brain allows the user to jack in computers and thereby entering the worldwide network. It is then conceived by the person as an actual landscape with blinking lights of data in the dark, populated by human minds and intelligent software creatures - cyberspace.

  2. Moral and ethical uses in Information Technology.

    This company has to pay $180 a month extra just for the privilege of receiving junk mail. Translated into rupees, that comes to six thousand rupees a month (is quite a reasonable amount). For what it's worth, that's about thirty percent of an Indian's average monthly salary.

  1. Campaigner for Digital Privacy Rights.

    In other words, it is information that serves to identify a person and could include his or her name, address, telephone number, date of birth, race and family status. It could also include an identifying number that the government has assigned to an individual in exchange for receiving benefits, a person's e-mail address, and a person's medical or financial history.

  2. COICA. The Role of the US Government and Online Piracy

    Due to the influence of the Tea Party (and other such groups) Republicans have become increasingly more anti-Democrat. If Republicans decide to unanimously appose the bill, Hatch may be deemed a traitor? as Hollywood might as well. What we truly do not want is for the movie industry to be associated with liberals and socialists.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work