The Dangers Of Internet Surveillance

Improved Essays
“Setting people to spy on one another are not the way to protect freedom.” (Tommy Douglas) As of June 14, 2014, there are approximately 3 billion Internet users globally and most users have never heard of or aware of the group known as the “Surveillance Society”. Welcome to the century where everything you do is composed, accumulated, investigated and sold to strangers. Internet surveillance doesn’t occur by a user surfing the internet or accessing different websites, it occurs as soon as the user connects to the internet through the ISP (Internet Service Provider). The ISP assigns an IP (Internet Protocol) address to all users accessing the internet, which allows the users to be located. It is believed that within …show more content…
Privacy is extinct and people are tolerable with it. In fact, they are accepting for the government to monitored citizens. The majority inhabitants are conscious that practically everything done on the internet is followed. For example, the internet is accessed by users in many different ways such as mobile devices, wireless networks, Bluetooth, etc., which is all traceable. If you connect to the internet via smartphones; the telecommunication providers (T-Mobile, Verizon, AT&T, etc.) can locate you by triangulating your signals through the cell phone towers, located in most cities in the United States. Simply registering for an email service, writing a blog or opening an account on a social network website are other examples of how a user might be tracked through internet surveillance. All data collected through surveillance is analyzed and …show more content…
Let’s begin, Google tracks us by using its pages and having direct access to their servers. The entire information people search on the web is being saved forever. Google knows people better than their partners. Yes, Google knows what people like, dislike and even know where they are from the internet of their phones. Everything we do is being watched because we send texts, emails and have social media account. But when does Google cross the line with our privacy? Google purchased Nest; smart smoke detectors for watchful residence to their customers. Have in mind these smoke detectors observe everything you do. Keep in mind, internet information is passed without a person’s consent, it’s a money making

Related Documents

  • Improved Essays

    9/11 Improvements

    • 632 Words
    • 3 Pages

    When the shocking attack on 9/11 occurred civilians was frightened and scared from the attack. From that led the USA Patriot Act was passed on October 26,2001 to keep everyone safe and ease the fear that the american people had from the attack. As a result of 9/11, there has been many improvements of surveillance for the purpose of helping civilians safe. There are many improvements of surveillance to keep civilians safe. As stated the USA Patriot Act passed on October 6, 2001 was to ease the fear for american people.…

    • 632 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    These services look into our habits and actions to attempt to assemble a profile about their users. Primarily, this information is provided to advertising firms to learn best how to increase consumerism and ensure that the populace purchases products. Furthermore, it has influenced the populace to follow their conditioning by always presenting them with the concern that they are being watched. This is especially accurate following the revelations by whistleblowers, such as Edward Snowden, which have been able to prove that national agencies often partner with these services through sharing of information to track citizens.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology, the American people 's privacy has shrunk, we are monitored at all times. Cameras at every street corner, cell phones being tracked to the exact foot, every website and Google search seen stored and collected. All of this is done in the name of our safety, but how much of this data is about our safety and more about controlling us? In Adam Penenberg’s essay The Surveillance Society, readers are informed of these measures and are lead to believe the invasion of our privacy is necessary. Some form of surveillance is a necessity in the world we live in today, crimes and terror attacks have been prevented because of it.…

    • 1425 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Domestic surveillance is the government gathering information from people in various ways such as camera video, phone calls, text messages, social media, and more. The surveillance is used to prevent attacks and protect the people or the president. “The NSA’s domestic spying program, known in official government documents as the “President’s Surveillance Program” (Electronic Frontier Foundation para. 1). This is an example of how the domestic surveillance program is used today.…

    • 773 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Because online activities are treated like any other communications, the rules of privacy should apply. When people engage in online activities they have a legitimate expectation of privacy and this privacy is violated when the government accesses online activities without a warrant. The government should therefore not be allowed to access your online activities without a warrant. Moreover, there are situations where the government does not need a warrant but a court order to access this information. Despite the lesser evidence required for court orders, they nevertheless involve some adjudication on whether it is proper to infringe on the individual’s right to privacy.…

    • 1234 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    As supported by Harris’s experiments, the loss of privacy that we perceive when we use the Internet occurs in part because, like Michael Foucault claims, being under constant surveillance in a panoptic environment causes people to constantly feel watched and in part because, like Saadi Lahlou claims, people are forced to reveal information and act in a setting in which they normally would…

    • 1183 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    The Importance Of The National Security Agency

    • 1199 Words
    • 5 Pages
    • 1 Works Cited

    This procedure can be quite noticeable because once you visit a site for example, Nike.com, and go to a site like Facebook, an ad for a Nike product will consistently appear. Though the method is used for website owners to monitor the vigor of their site, government has taken it to another level by using it as a highway into our thoughts. We use the internet every day, with blogs, vlogs (video blogs), and the highly trending use of social media. We put our positions, feelings, and thoughts online to share with the world. This makes us conscious of what we write and aware of whom reads it, but unconscious of the fact that everyone interprets things in different ways, and that someone can be a person watching for suspicious things said.…

    • 1199 Words
    • 5 Pages
    • 1 Works Cited
    Superior Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    To support this we look at Nicholas Thompson’s article “Bigger Brother: The Exponential Law of Privacy Loss.” Thompson argues that the internet is designed to collect information from people therefore, even with privacy laws in place, owners of sites will continue to find creative ways to socially connect people (Thompson 284). He continues by referencing software designed by carrier IQ that is specifically created to track searches, locations, and purchases. Thompson states that the purpose of this software is to better enhance the network as well as peoples average everyday lives (285). Nicholas later goes into detail explaining the exponential law of privacy loss.…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Right to Privacy In the world today privacy is a big problem people are having to deal with. The government has abused their power and in some cases, broken the law. Not just once, but a number of times and has lied about it and tried to sweep it under the rug as if no one was around. Government and politics are two wild animals who are related.…

    • 1450 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    As one of its largest revenue streams, earing $43.7 billion, selling user data is a cornerstone of Google’s business model. The company is able to offer services like Gmail and YouTube for free because instead of profiting off of membership fees, they utilize customized advertisements, which allow companies to better reach target consumers and for consumers to receive more relevant advertisements. These advertisements reach the user after consumer data flows through complex algorithms and sorting system that create a general outline for the user’s demographics, interests, and lifestyle choices. While this system optimizes user experience, many consumers view the practice as an invasion of privacy. Information such as search terms, phone locations, and personal communication are all stored on Google servers.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Difference Between Facebook And Brand Policy

    • 998 Words
    • 4 Pages
    • 7 Works Cited

    That being said Google still has access to your information; they just have a few better policies to protect your identity from being made publicly available. “Google hasn’t won many accolades, either. Eric Schmidt, when he was CEO of Google, famously said that “Google policy is to get right up to the creepy line and not cross it.” He was talking about chip implants, but his statement has been widely interpreted as describing Google’s general approach to balancing its interest with users’ privacy.” (Mui, 2011)…

    • 998 Words
    • 4 Pages
    • 7 Works Cited
    Superior Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Surveillance has presented numerous challenges to the right of privacy. There is a need to develop a high technology surveillance system that will come with great benefits without intrusion. With new advances in technology each day, it is becoming easier to communicate with each other. Yet with all these new forms of communication there have been unpleasant side effects, since this new advanced technology is not only for harmless interactions between one another it is also used to plot against governments and countries. Governments have found themselves under attack a countless number of times and have had no other choice but to resort to monitoring their citizen’s online and phone activities.…

    • 729 Words
    • 3 Pages
    Improved Essays