Wednesday, June 5, 2019

Investigating mass surveillance

Investigating mass surveillance(How) Is Big Brother Watching Us?Big Brother is a fictional character in George Orwells dystopian novel Nineteen Eighty-Four, which tells the story of one mans attempt to rebel against the totalitarian state in which he lives. In the society that Orwell describes, everybody lives under eff twenty-four hour surveillance by the g overning authorities. Since the publication of Nineteen Eighty-Four, the phrase Big Brother has entered the English language, to describe any attempts by governments to drop mass surveillance.1The main surveillance tool described in Orwells novel is the imaginary telescreen, a cross between a television and a aegis camera2, and in the past decade growing comparisons have been drawn between the imaginary telescreen and the Internet-connected personal computer that is in many modern homes.The purpose of this show is to investigate the mass surveillance of Internet communication theory carried out by western governments today, and the technologies used to carry out that surveillance. The essay will first visualize at the current privacy landscape in the USA, the European Union, and the UK, in terms of policies and statute law. Then it will discuss some of the most interesting technical foul methods used to carry out mass Internet communications surveillance.The terrorist attacks on New Yorks World Trade Centre, of September 11th 2001, heralded the dawn of a new global political era. Following those atrocities and subsequent attacks in Egypt, the United Kingdom, Spain, Bali, Russia, Morocco, and Saudi Arabia, governments around the world have responded by tightening existing legislation and creating new anti-terror laws. Many of the countries that changed their laws to combat terrorist threats also increased the powers of their law enforcement and national security organisations to perform communications surveillance and carry out electronic info search and seizure.The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct terrorism Act of 2001, more commonly known as The Patriot Act, was signed into law less than seven weeks after the Twin Towers attacks. The Act is organised into ten titles, including patronage II Enhanced watchfulness Procedures, and Title IX Improved intelligence. The Patriot Act, which was Americas legislative response to the September 11th attacks, hugely increased American law enforcement and national security services pledge both in the USA and abroad. The Patriot Act strengthened immigration, banking, and money laundering laws. The Patriot Act also amended the Foreign Intelligence Surveillance Act (FISA) of 1978, which includes subchapters covering electronic surveillance and trap and trace devices (used to capture non-content information regarding electronic communication). FISA was also expanded by the Intelligence Reform and Terrorism Prevention Act of 2004.3In July of 2002 the European Union passed the Directive on Privacy and Electronic Communications4. This directive was amended in 2005 by the Electronic communications personal data protection rules and availability of traffic data for anti-terrorism purposes directive.5 These directives will lead to European telecom firms being required to store data regarding the cadence and duration of all fixed line, internet, and mobile telephone calls, the location of mobile telephone calls, and details of all internet connections and e-mail messages (although e-mail content is non recorded). The UK government was the prime mover in lobbying for this directive, stating that data was the golden thread in terrorist investigations.6We have seen then that current privacy landscape has been heavily influenced by the changing global political situation with specific reference to global terrorism. We know that legislation exists that allows western governments to carry out mass surveillance, but what do they actually do and how do they do it? M ass surveillance can take many forms, including physical surveillance in the form of identity systems, audio, video, RFID and artificial satellite surveillance. Data surveillance can also be used in the atomic number 18as of electronic commerce and public records.7 For the purpose of this essay we will look specifically at some of the most interesting technologies (allegedly) used by government organisations to carry out mass surveillance of Internet communications.One of the most ill-famed alleged mass electronic communication surveillance technologies is ECHELON, a top-secret Anglo-American collaboration tasked with gathering signals intelligence around the world. Although its existence is still officially denied the European Parliament commissioned a report in 2001 entitled on the existence of a global system for the interception of private and commercial communications (ECHELON interception system)8. They were sufficiently convinced of ECHELONs capabilities to recommend that European citizens and businesses should routinely encrypt their communications in order to maintain privacy9.The idea of the ECHELON network was supposedly agreed between capital of the United Kingdom and Washington as far back as 1948, although its existence was not brought to public attention until the publication of New Statesman article in 1988. ECHELONs capabilities are the subject of much debate some estimates report that it can sift through 90% of Internet traffic, though the European Union found that the technical capabilities of the system are probably not nearly as extensive. The hardware used to collect the information also remains something of a mystery, with some sources claiming that ECHELON controls over one hundred satellites and dozens of ground based listening stations. Others point out that very little (

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.