Government Surveillance Of Internet Activity Essay

3543 words - 14 pages

Government Surveillance of Internet Activity

1. Background

Back to late 1980s in China, some young people in college or research institute had a chance to surf the Internet through a fairly low speed, roughly routed World Wide Web connection. But a big surprise for them was that the Internet was a real freeway, a freeway escaping from strict government control, a freeway for people who wanted to see but couldn’t see and who wanted to say but couldn’t say.

Stepping into the 21st century after more than a decade, the Internet service in China has already been almost the latest generation in the world. However, a new surprise for those “old” surfers and new comers is that the traffic on the Internet freeway is jammed or totally blocked. Some internet writers, even anonymous ones, have been monitored and arrested. Chinese people realized that what could be seen and reached through the Internet becomes less and less, and what could be spoken on the web now leads to a huge threaten to individuals as the consequence.

Why is that? Someone blames the advanced software technology which is now available to the Chinese government. It is argued that new technologies enabled the government to turn on red lights in the Internet freeway and use “web polices” to intercept violators who were chasing the freedom. Indeed, not only in China, such an observation becomes globally prominent. At a recent internet technology conference sponsored by the Internet Society in Montreal Canada (INET '96), a new discussion emerged which is focused on the increasing number of governments intent on erecting barriers to free speech on the Internet [1].

1.1 Government surveillance exists in many countries and in a variety of forms.

Normally, people wouldn’t be really surprised when someone reminds the existence of government surveillance in their everyday life. There are true stories covering a wide span of time and continents, from the secret police in East Germany last century [2], to the intelligence gathering activities in some campuses today controlled by CIA [3]. As a solid example, wiretapping is conducted in nearly every country in the world and is frequently abused. The US Department of State, in its annual Country Reports on Human Rights Practices for 1994, reports widespread, illegal or uncontrolled use of wiretaps by both government and private groups in over 70 countries [4]. Government surveillances are generally targeted to human rights groups, reporters and political opponents. In some countries, the state owned telecommunications companies were active participants in helping the security services of their government to monitor human rights advocates. In other countries, multiple forms of surveillance are used. For instance, hidden microphones were found in the offices of the Mexican Human Rights Commission in 1991 [5].

1.2 Communication through the Internet is no longer a freeway as what people might imagine.

Internet has the capability...

Find Another Essay On Government Surveillance of Internet Activity

Surveillance Techniques of New Technologies Demand Rethinking of Online Behaviour

1217 words - 5 pages fully aware of what happens until our data are saved at the desired location, neither do we know what happens with our data. Usage of new media technologies in a careless and unaware fashion is equal to giving away the power over informations about ourselves and therefore makes us an easy subject to surveillance through higher instances like the government or companies, but will not lead to a total controlled internet and rather forces us to revise

Mass Electronic Surveillance and Social Order

3156 words - 13 pages The internet has added another dimension to the existing mass surveillance done by the government and the corporate. Recent development in the way in which internet has digitized our life has heightened the discussion of mass surveillance amongst the scholars. And today with the Snowden leak this issue has found a space in the public discussion. The mass surveillance has been in discussion amongst these groups because it contributes to some sort

NSA and DHS Surveillance Programs

2460 words - 10 pages able to legally tap telephone lines in certain cases, as well as intercept Internet messages through its “Carnivore” program. Basically, the government has the ability to intercept all messages that are "relevant to an ongoing criminal investigation.” The Act allows the guidelines to apply to all surveillance cases, not just those of suspected terrorists. In addition to the surveillance provisions, the Act includes sections related to money

The Effectiveness and Ethicality of Mass Surveillance

2366 words - 10 pages PRISM, that obtain large amounts of user data from American companies in the form of telephone numbers, emails, private documents, and videos, all in the name of preventing terrorist activity ("The Surveillance State..."). The existence of such data mining without the users' knowledge or consent catalyzes enormous controversy among U.S. citizens and global leaders, in spite of assurances from American government authorities that the usage of

Government Surveillance in the Digital Age

2344 words - 9 pages cameras are used in public places, they still represent a large violation of privacy. Also a violation of our privacy is the government's usage of the Carnivore Internet surveillance system that can track all of a person's online activity. The FBI not only has the capability to do so, but in many cases it can lawfully enter a person's home and alter or even steal information form his or her computer, all without the knowledge of the owner of the

The People, the Nation, and the NSA

1593 words - 6 pages , information was revealed that proved the NSA was analyzing telecommunication companies’ metadata. Data about data, or metadata, gathered from different companies includes domestic phone and internet data (NSA Surveillance Programs; Snowden Gains Refuge Special Report (Special Report)). Many people can attest their beliefs that the government has gone too far in their surveillance. A recent survey indicated that in 2013, fifty-two percent of politically

Big Brother: An American Reality

3618 words - 14 pages the thoughts we have are seamlessly uploaded to the internet. In order to protect ourselves from unjust surveillance we must first take responsibility and manage what we put on the internet. We have to show government surveillance agencies we are not afraid to taking control and administer of our digital footprint. "If there is no right to privacy, there can be no true freedom of expression and opinion, and therefore, there can be no effective

Government Surveillance Creates an Orwellian Society

876 words - 4 pages , and Internet service providers - to turn in information on their clients (“Surveillance Under the USA PATRIOT Act”). In addition, according to NBC News, the government has expansively interpreted the Patriot Act as allowing it to gather records on not just a particular person, but on millions of Americans with no suspicious actions. And it shows that the Foreign Intelligence Surveillance Court agreed on that interpretation of the law. Also, the

The NSA Surveillance Constitutionality: Edward Snowden

1197 words - 5 pages On June 6, 2013 the details of the National Security Agency’s (NSA) surveillance activities where given by Edward Snowden to the public; raising concerns of Americans about their privacy. Edward Snowden, a former employee of the NSA, gave the alarming details of surveillance programs in his interview on how the NSA accesses our emails, calls, internet activity, and anything else that is related to technology. In this system of surveillance the


616 words - 3 pages Surveillance and Counter-surveillance in Terrorist Operations Terrorist groups are well organized organizations that employ adequate structures that increase the chances of successful operations. Terrorist attacks do not just happen. They are well planned whereby most of the attackers have a good understanding of their targets. Terrorist groups employ intelligence tactics such as surveillance and counter-surveillance to collect information on

Surveillance: What Price Security?

559 words - 2 pages Surveillance: What Price Security? Attorney General John Ashcroft stated that the United States will "use every legal means at our disposal to prevent further terrorist activity." This concept is both reassuring and frightening. I think that it shows that our country is in fact motivated to stop terrorist attacks, which is undeniably a good thing. If the government can tap phones and monitor Internet communications to learn about planned

Similar Essays

Internet Regulation, Government Intervention Of The Internet

2608 words - 10 pages ), everything is bound to offend someone. The newest wave of laws floating through law making bodies around the world threatens to stifle this area of spontaneity. Recently, Congress has been considering passing laws that will make it a crime punishable by jail to send 'vulgar' language over the net, and to export encryption software. No matter how small, any attempt at government intervention in the Internet will stifle the greatest communication

In Praise Of Big Brother: Why We Should Learn To Stop Worrying And Love Government Surveillance

1897 words - 8 pages Part I: James Stacey Taylor's article, "In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance" begins reviewing the concept of "Big Brother" as it was originally presented in George Orwell's 1984. The Big Brother started off as a fictional character in 1984-- a dictator of Oceania within a totalitarian state. Set within a society in which everyone is under complete surveillance by the authorities

Persuasive Essay On Cenrorship Of The Internet And The Tyrrany Of Our Government

1244 words - 5 pages 'To curtail free expression strikes twice at intellectual freedom, for whoever deprives another of the right to state unpopular views also deprives others of the right to listen to those views,' said Oliver Wendell Holmes, Jr(Censorship and the U.S. Government 1). I completely agree with Mr. Holmes, and when the question of censoring the Internet arises, I cringe. Governing the Internet dominates many debates, censorship leading the fight. The

My Internet Post: A Sumary Of The Current Chinese Government

588 words - 2 pages party. These guys just have a different kind of leverage than the civilians. The National Peoples Congress is pretty worthless. While it was meant to be one of the more powerful organs in the Chinese government body, all it is is a bunch of yes-men that pass pre-approved decisions. Like a really wimpy version of the House of Lords, but without the cool name. The Congress has 3000 members, 70% of which are CCP members, with 5 year terms. A