This article is about surreptitious monitoring of computer activity. For information on methods of preventing unauthorized access to computer data, see computer security.Computer surveillance is the act of performing surveillance of computer activity, and of data stored on a hard drive or being transferred over the Internet.
Computer surveillance programs are widespread today, and almost all internet traffic is closely monitored for clues of illegal activity.
Supporters say that watching all internet traffic is important, because by knowing everything that everyone is reading and writing, they can identify terrorists and criminals, and protect society from them.
Critics cite concerns over privacy and the possibility of a totalitarian state where political dissent is impossible and opponents of state policy are removed in COINTELPRO-like purges. Such a state may be referred to as an Electronic Police State, in which the government aggressively uses electronic technologies to record, organize, search and distribute forensic evidence against its citizens.
References
^ Diffie, Whitfield; Susan Landau (August, 2008). "Internet Eavesdropping: A Brave New World of Wiretapping". Scientific American. http://www.sciam.com/article.cfm?id=internet-eavesdropping. Retrieved 2009-03-13. ^ "CALEA Archive -- Electronic Frontier Foundation". Electronic Frontier Foundation (website). http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html. Retrieved 2009-03-14. ^ "CALEA: The Perils of Wiretapping the Internet". Electronic Frontier Foundation (website). http://www.eff.org/issues/calea. Retrieved 2009-03-14. ^ "CALEA: Frequently Asked Questions". Electronic Frontier Foundation (website). ^ Hill, Michael (October 11, 2004). "Government funds chat room surveillance research". Associated Press (USA Today). http://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm. Retrieved 2009-03-19. ^ McCullagh, Declan (January 30, 2007). "FBI turns to broad new wiretap method". ZDNet News. http://news.zdnet.com/2100-9595_22-151059.html. Retrieved 2009-03-13. ^ First round in Internet war goes to Iranian intelligence by Debka.com ^ Story, Louise (November 1, 2007). "F.T.C. to Review Online Ads and Privacy". New York Times. http://www.nytimes.com/2007/11/01/technology/01Privacy.html?_r=1. Retrieved 2009-03-17. ^ a b Butler, Don (February 24, 2009). "Surveillance in society". The Star Phoenix (CanWest). http://www.thestarphoenix.com/Technology/Surveillance+society/1322333/story.html. Retrieved 2009-03-17. ^ Soghoian, Chris (September 11, 2008). "Debunking Google's log anonymization propaganda". CNET News. http://news.cnet.com/8301-13739_3-10038963-46.html. Retrieved 2009-03-21. ^ a b Joshi, Priyanki (March 21, 2009). "Every move you make, Google will be watching you". Business Standard. http://www.business-standard.com/india/news/every-move-you-make-google-will-be-watching-you/57071/on. Retrieved 2009-03-21. ^ "Advertising and Privacy". Google (company page). 2009. http://www.google.com/privacy_ads.html. Retrieved 2009-03-21. ^ Keefe, Patrick (March 12, 2006). ", Can Network Theory Thwart Terrorists?". New York Times. ^ Albrechtslund, Anders (March 3, 2008). "Online Social Networking as Participatory Surveillance". First Monday 13 (3). http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2142/1949. Retrieved March 14, 2009. ^ Fuchs, Christian (2009). Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance. Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. ISBN 978-3-200-01428-2. http://www.google.com/url?sa=t&source=web&ct=res&cd=3&url=http%3A%2F%2Ffuchs.icts.sbg.ac.at%2FSNS_Surveillance_Fuchs.pdf&ei=2XG7SY6PI4GEsQP2v9VI&usg=AFQjCNGKqGRfx90BvrQgdCZbfLfSLCqE5A&sig2=1THunpIf4nMT4MV79FGufQ. Retrieved March 14, 2009. ^ a b c Ethier, Jason. "Current Research in Social Network Theory". Northeastern University College of Computer and Information Science. http://www.ccs.neu.edu/home/perrolle/archive/Ethier-SocialNetworks.html. Retrieved 2009-03-15.
Source : www.wikipedia.com
This Laptop Has EVERYTHING You Want For Gaming!
6 years ago
No comments:
Post a Comment