SlideShare a Scribd company logo
Bringing internet snooping to book
Source Link
Revelations that GCHQ and the NSA have tapped into the
internet on a huge scale have rightly provoked outrage.
But intelligence analysts aren't the only ones likely to be
tempted by the captured information.
The internet has transformed our relationship with
information – and with the world – in ways that continue to
surprise us. That may appear to many readers, especially
those below the age of thirty, as a statement of the
blindingly obvious but I think it can bear repetition.
The latest evidence for the transformative power of the
web comes from the explosion of outrage detonated by
Edward Snowden's revelations that the NSA and GCHQ
have been tapping into online activity on an
unprecedented scale and with little apparent
legal, congressional or parliamentary oversight.
The extent of the snooping, which has targeted friend
and foe alike, has upset many. Our allies in Germany and France
are furious; Noam Chomsky is alarmed; the founding fathers of
the "land of the free" are reportedly spinning in their graves; and
John Kampfner has sounded a grim warning about the further
erosion of the West's moral authority over more draconian
regimes. Even senior staff at MI5 think that GCHQ may have
gone too far.
Among the general population the reaction appears
more mixed. There is disquiet certainly but a significant fraction of
the population - almost half in the US – has shrugged off the
snooping. Perhaps primed by powerful fictional accounts of
electronic espionage in TV shows such as Spooks or Homeland or
the Bourne films, many of us have long presumed that we are
under surveillance and so were unsurprised at the news. I suspect
also that a generation happy to splurge the minutiae of their lives
over Facebook and Twitter is less likely to be concerned that
personal information is up for grabs by the government.
We should not be so blasé. Privacy is a precious commodity. Its
commercial value emerged clearly, if grubbily, from the
accounts of intrusive journalism unearthed by the Leveson
Inquiry. But how far does the state have the right to track our
private lives, even if it is in the pursuit of our rather ill-defined
national and economic interests? Most would agree that the
state has some business monitoring internet traffic, to sniff out
trails of criminal or terrorist activity, and there are plausible
sounding reassurances that valuable intelligence has been
obtained in this way (though it is hard to test such claims).
However, we still need to be wary of our guardians. Our police
forces have shown a cavalier disregard for the law when it
comes to gathering information on environmentalists, or the
families of murder victims or when cosying up to the press for
cash. How can we ensure that our intelligence analysts operate
to higher standards, now that we have discovered them to be
siphoning enormous torrents of information from our computers
into theirs?

More Related Content

Viewers also liked

Composiciones Bidimensionales
Composiciones BidimensionalesComposiciones Bidimensionales
Composiciones Bidimensionales
carlamescobars
 
Cpu instruction cycle report
Cpu instruction cycle reportCpu instruction cycle report
Cpu instruction cycle report
jormacatangay
 

Viewers also liked (11)

Using multiple calendars in outlook
Using multiple calendars in outlookUsing multiple calendars in outlook
Using multiple calendars in outlook
 
Composiciones Bidimensionales
Composiciones BidimensionalesComposiciones Bidimensionales
Composiciones Bidimensionales
 
席涅克作品
席涅克作品席涅克作品
席涅克作品
 
Estilo neoclásico
Estilo neoclásico Estilo neoclásico
Estilo neoclásico
 
Seia public consultation dec 2013
Seia public consultation dec 2013Seia public consultation dec 2013
Seia public consultation dec 2013
 
Cpu instruction cycle report
Cpu instruction cycle reportCpu instruction cycle report
Cpu instruction cycle report
 
+R3 forum pa call4ideas 2016
+R3 forum pa call4ideas 2016+R3 forum pa call4ideas 2016
+R3 forum pa call4ideas 2016
 
Presentation
PresentationPresentation
Presentation
 
Detalles estructurales
Detalles estructurales Detalles estructurales
Detalles estructurales
 
Diseño Estructural
Diseño Estructural Diseño Estructural
Diseño Estructural
 
Course CodeSchool - Shaping up with Angular.js
Course CodeSchool - Shaping up with Angular.jsCourse CodeSchool - Shaping up with Angular.js
Course CodeSchool - Shaping up with Angular.js
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

Bringing internet snooping to book

  • 1. Bringing internet snooping to book Source Link
  • 2. Revelations that GCHQ and the NSA have tapped into the internet on a huge scale have rightly provoked outrage. But intelligence analysts aren't the only ones likely to be tempted by the captured information. The internet has transformed our relationship with information – and with the world – in ways that continue to surprise us. That may appear to many readers, especially those below the age of thirty, as a statement of the blindingly obvious but I think it can bear repetition. The latest evidence for the transformative power of the web comes from the explosion of outrage detonated by Edward Snowden's revelations that the NSA and GCHQ have been tapping into online activity on an unprecedented scale and with little apparent legal, congressional or parliamentary oversight.
  • 3. The extent of the snooping, which has targeted friend and foe alike, has upset many. Our allies in Germany and France are furious; Noam Chomsky is alarmed; the founding fathers of the "land of the free" are reportedly spinning in their graves; and John Kampfner has sounded a grim warning about the further erosion of the West's moral authority over more draconian regimes. Even senior staff at MI5 think that GCHQ may have gone too far. Among the general population the reaction appears more mixed. There is disquiet certainly but a significant fraction of the population - almost half in the US – has shrugged off the snooping. Perhaps primed by powerful fictional accounts of electronic espionage in TV shows such as Spooks or Homeland or the Bourne films, many of us have long presumed that we are under surveillance and so were unsurprised at the news. I suspect also that a generation happy to splurge the minutiae of their lives over Facebook and Twitter is less likely to be concerned that personal information is up for grabs by the government.
  • 4. We should not be so blasé. Privacy is a precious commodity. Its commercial value emerged clearly, if grubbily, from the accounts of intrusive journalism unearthed by the Leveson Inquiry. But how far does the state have the right to track our private lives, even if it is in the pursuit of our rather ill-defined national and economic interests? Most would agree that the state has some business monitoring internet traffic, to sniff out trails of criminal or terrorist activity, and there are plausible sounding reassurances that valuable intelligence has been obtained in this way (though it is hard to test such claims). However, we still need to be wary of our guardians. Our police forces have shown a cavalier disregard for the law when it comes to gathering information on environmentalists, or the families of murder victims or when cosying up to the press for cash. How can we ensure that our intelligence analysts operate to higher standards, now that we have discovered them to be siphoning enormous torrents of information from our computers into theirs?