Artificial Intelligence & Math

Authors Avatar

International Baccalaureate

Information Technology in a Global Society

Portfolio

Big Brother is watching: what are the impacts on society?

(Politics and Government)

June 2003

Student No. 1

XY International School

News Item:

Mackenzie, Kate 2002, Data-spying deal between police, ISPs,  [May 2003]


Presentation of the Issue

Whilst the Internet has become a valuable resource for much of the Australian community, it has also been misused, and has led to numerous Internet assisted crimes against families and businesses alike. Dubbed ‘The Telecommunications Interception Amendment Bill’, the new law will provide the Government with greater access to Internet surveillance through the cooperation between ISPs and Australian law enforcement agencies (Mackenzie 2003). Australian ISPs are now required to aid in the interception of sensitive data and are obliged to work openly with government departments, such as federal police and ASIO (Australian Security Intelligence Organisation).

The amendment bill proposes to counter the increasingly prevalent problem of electronic criminal activity by providing more practical, widespread and efficient surveillance over the Internet’s usage. By closely monitoring Internet usage, the Government aims to intercept criminal activity before damage can be dealt. Criminals will be found and brought to justice and as a consequence, Australia will become a more pleasant environment, less likely to be under attack by Internet assisted crime.

A study by NOIE (2002) shows “52 percent of Australian households are connected to the Internet”. The bill widely impacts over the Australian community – innocent and criminals alike. It impinges the right to use the Internet relaxedly and freely, without the psychological detrimental feeling that their every move is being monitored. Also the bill will negatively affect the ISPs and the Government through the monetary cost, the time, effort and human resources to set up and maintain the surveillance technology, which might be better spent on other criminal investigations.

The issue is explained in paragraphs 2 and 3.


The IT Background of the Issue

The NSW Police (2002) claim that exploitations of the Internet have doubled from 1999. If such a trend continues the Internet will be too unsafe to be used without taking an unreasonable risk. As the Internet becomes more commonly used as a tool in criminal, terrorist and cyber terrorist activity governments around the world are beginning to re-evaluate their stance on its surveillance (Miller 2001,Kane 2002). Some trends but no developments.

The ISP, provider of direct access to the Internet backbone, is essential in the surveillance. All Australian use of the Internet will be continually monitored by automated ISP computer mainframes for specific security flags. Flags include sensitive key words such as bomb, virus, plane or Allah in particular combinations, or access to sensitive Internet pages. When a security flag is raised by an ISP server, an alarm is raised and the computer begins to record the user’s keystrokes and mouse clicks, for deeper police analysis of the possible security threat. Either the possible threat is dismissed or acted upon defensively by police, leading to a decrease in successful cyber crimes. IT concepts well described and some developments; not enough detail, particularly of developments for explanation, and certainly no analysis.


The Impact of the Issue

The legislature will increase the number of arrests and decrease the amount of crime that is committed through the Internet. Hackers, cyber terrorists and white-collar criminals will be under threat by the system as their every keystroke and mouse click is monitored for clues to their criminal activities. Such electronic criminals will now not be able to communicate and work freely without being caught by the surveillance system and dealt with by the judicial system. So not only does the system deter and scare people from partaking in illegal activities but it also helps the police find, catch, and punish such offenders. This is a great benefit as the automated system saves police’s time, money, and human resources as the computer does the majority of the police’s work for them and allows police to do other work that requires human influence. Explained and analysed.

Under the Bill, ISPs are required to cover the costs of any data processing mainframe computers and staff to maintain them. Many Australian ISPs will be sent out of business as they won’t be able to afford the requirements of the Bill. This will result in loss of jobs and inter-business competition. Resultant monopoly ISPs will be able to charge higher rates, affecting the public. Despite this a small increase in charges, and a few job losses, are a small and justified price to pay for national security and wellbeing of Australia as a nation. Analysed and evaluated.

Both criminals and innocent Australians will be under continual surveillance, with no human judgement of whether their confidentiality should be violated. A large number of people will feel paranoid or uneasy about their Internet being watched. Some will be scared of using Internet freely, for fun or personal use, and this is simply wrong, unjust, and will cause huge negative psychological impact on a majority of Australians. Analysed.

Overall, there is a large cost to monitor a majority of innocent people, for a chance of tracking a handful of prospective criminals. As it is not fair to put so many blameless Australians through such stress, breaches of privacy or to send ISPs bankrupt for the capture of a few cyber criminals, I see the Bill as a disproportional response to the problem of cyber crime and should not be implemented in its current form. Evaluated. As none of the arguments have been substantiated with cited references maximum mark is 3.

Solutions to Problems Arising from the Issue

One of the most potent drawbacks of the surveillance system is its extremely high cost. A very practical solution would be to force every personal computer to do the sorting for the ISP. This could be achieved with a security feature embedded in the computer’s operating system. This security feature would be hardwired and protected from being tampered with by users. It would notify the ISP, through the Internet, if security flags were raised and, in turn, police would be notified. 

Join now!

Solution outlined. The ‘security feature’ has not been explained.

This solution would dramatically decrease the cost of computer infrastructure needed to sort through the raw data as much fewer ISP computers are needed. This effectively eliminates the problem of cost and still successfully monitors and raises warnings, as before, and it does not limit the user, ISP or Government.  

Partial evaluation - but solution is only outlined. 

Another solution would be to offset the ISP’s cost by obtaining government and corporate sponsorship so as to pay for the additional processing computers. Commercial grants could be obtained in ...

This is a preview of the whole essay