SlideShare a Scribd company logo
1 of 4
Bringing internet snooping to book
Source Link
Revelations that GCHQ and the NSA have tapped into the
internet on a huge scale have rightly provoked outrage.
But intelligence analysts aren't the only ones likely to be
tempted by the captured information.
The internet has transformed our relationship with
information – and with the world – in ways that continue to
surprise us. That may appear to many readers, especially
those below the age of thirty, as a statement of the
blindingly obvious but I think it can bear repetition.
The latest evidence for the transformative power of the
web comes from the explosion of outrage detonated by
Edward Snowden's revelations that the NSA and GCHQ
have been tapping into online activity on an
unprecedented scale and with little apparent
legal, congressional or parliamentary oversight.
The extent of the snooping, which has targeted friend
and foe alike, has upset many. Our allies in Germany and France
are furious; Noam Chomsky is alarmed; the founding fathers of
the "land of the free" are reportedly spinning in their graves; and
John Kampfner has sounded a grim warning about the further
erosion of the West's moral authority over more draconian
regimes. Even senior staff at MI5 think that GCHQ may have
gone too far.
Among the general population the reaction appears
more mixed. There is disquiet certainly but a significant fraction of
the population - almost half in the US – has shrugged off the
snooping. Perhaps primed by powerful fictional accounts of
electronic espionage in TV shows such as Spooks or Homeland or
the Bourne films, many of us have long presumed that we are
under surveillance and so were unsurprised at the news. I suspect
also that a generation happy to splurge the minutiae of their lives
over Facebook and Twitter is less likely to be concerned that
personal information is up for grabs by the government.
We should not be so blasé. Privacy is a precious commodity. Its
commercial value emerged clearly, if grubbily, from the
accounts of intrusive journalism unearthed by the Leveson
Inquiry. But how far does the state have the right to track our
private lives, even if it is in the pursuit of our rather ill-defined
national and economic interests? Most would agree that the
state has some business monitoring internet traffic, to sniff out
trails of criminal or terrorist activity, and there are plausible
sounding reassurances that valuable intelligence has been
obtained in this way (though it is hard to test such claims).
However, we still need to be wary of our guardians. Our police
forces have shown a cavalier disregard for the law when it
comes to gathering information on environmentalists, or the
families of murder victims or when cosying up to the press for
cash. How can we ensure that our intelligence analysts operate
to higher standards, now that we have discovered them to be
siphoning enormous torrents of information from our computers
into theirs?

More Related Content

Viewers also liked

Composiciones Bidimensionales
Composiciones BidimensionalesComposiciones Bidimensionales
Composiciones Bidimensionales
carlamescobars
 
Cpu instruction cycle report
Cpu instruction cycle reportCpu instruction cycle report
Cpu instruction cycle report
jormacatangay
 

Viewers also liked (11)

Using multiple calendars in outlook
Using multiple calendars in outlookUsing multiple calendars in outlook
Using multiple calendars in outlook
 
Composiciones Bidimensionales
Composiciones BidimensionalesComposiciones Bidimensionales
Composiciones Bidimensionales
 
席涅克作品
席涅克作品席涅克作品
席涅克作品
 
Estilo neoclásico
Estilo neoclásico Estilo neoclásico
Estilo neoclásico
 
Seia public consultation dec 2013
Seia public consultation dec 2013Seia public consultation dec 2013
Seia public consultation dec 2013
 
Cpu instruction cycle report
Cpu instruction cycle reportCpu instruction cycle report
Cpu instruction cycle report
 
+R3 forum pa call4ideas 2016
+R3 forum pa call4ideas 2016+R3 forum pa call4ideas 2016
+R3 forum pa call4ideas 2016
 
Presentation
PresentationPresentation
Presentation
 
Detalles estructurales
Detalles estructurales Detalles estructurales
Detalles estructurales
 
Diseño Estructural
Diseño Estructural Diseño Estructural
Diseño Estructural
 
Course CodeSchool - Shaping up with Angular.js
Course CodeSchool - Shaping up with Angular.jsCourse CodeSchool - Shaping up with Angular.js
Course CodeSchool - Shaping up with Angular.js
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Bringing internet snooping to book

  • 1. Bringing internet snooping to book Source Link
  • 2. Revelations that GCHQ and the NSA have tapped into the internet on a huge scale have rightly provoked outrage. But intelligence analysts aren't the only ones likely to be tempted by the captured information. The internet has transformed our relationship with information – and with the world – in ways that continue to surprise us. That may appear to many readers, especially those below the age of thirty, as a statement of the blindingly obvious but I think it can bear repetition. The latest evidence for the transformative power of the web comes from the explosion of outrage detonated by Edward Snowden's revelations that the NSA and GCHQ have been tapping into online activity on an unprecedented scale and with little apparent legal, congressional or parliamentary oversight.
  • 3. The extent of the snooping, which has targeted friend and foe alike, has upset many. Our allies in Germany and France are furious; Noam Chomsky is alarmed; the founding fathers of the "land of the free" are reportedly spinning in their graves; and John Kampfner has sounded a grim warning about the further erosion of the West's moral authority over more draconian regimes. Even senior staff at MI5 think that GCHQ may have gone too far. Among the general population the reaction appears more mixed. There is disquiet certainly but a significant fraction of the population - almost half in the US – has shrugged off the snooping. Perhaps primed by powerful fictional accounts of electronic espionage in TV shows such as Spooks or Homeland or the Bourne films, many of us have long presumed that we are under surveillance and so were unsurprised at the news. I suspect also that a generation happy to splurge the minutiae of their lives over Facebook and Twitter is less likely to be concerned that personal information is up for grabs by the government.
  • 4. We should not be so blasé. Privacy is a precious commodity. Its commercial value emerged clearly, if grubbily, from the accounts of intrusive journalism unearthed by the Leveson Inquiry. But how far does the state have the right to track our private lives, even if it is in the pursuit of our rather ill-defined national and economic interests? Most would agree that the state has some business monitoring internet traffic, to sniff out trails of criminal or terrorist activity, and there are plausible sounding reassurances that valuable intelligence has been obtained in this way (though it is hard to test such claims). However, we still need to be wary of our guardians. Our police forces have shown a cavalier disregard for the law when it comes to gathering information on environmentalists, or the families of murder victims or when cosying up to the press for cash. How can we ensure that our intelligence analysts operate to higher standards, now that we have discovered them to be siphoning enormous torrents of information from our computers into theirs?