Justifiability of State Surveillance of the Internet as E-Security Mechanism
نویسنده
چکیده
The purpose of this paper is to investigate the legal justifiability of measures contained in state surveillance laws pertaining to the Internet. Prior to the terrorist attack on the United States of America (U.S.) on 11 September 2001, the concept ‘surveillance’ was nothing new and is indeed as old as human society. As far back as the sixteenth century the first central state surveillance appeared in Britain. The commercialization of the Internet and computer-related technology replaced the industrial society with an information-based society and contributed to globalization. The Internet brought about many advantages but at the same time unlocked several challenges unknown to the physical world. Internet-connected countries battle to control the flow of information across borders for the purpose of national security and law enforcement. State surveillance of the Internet is utilized in addressing the abuse of the Internet, such as the commission of organized crime and terrorism. The 9/11 terrorist attacks coupled with the effect of globalization reinforced and accelerated the use of technology-based surveillance which includes state surveillance of electronic communications in the U.S. Many countries have since followed suit and introduced legislation providing for state surveillance of Internet communications by means of interception, monitoring, data retention and decryption. The western world has always jealously guarded the protection of human rights, yet new technological and political developments often challenge the human rights culture. The exploitation of the Internet for the commission of serious crimes challenges countries to find ways of controlling cyberspace, whilst at the same time encouraging the continuous growth of the Internet, stimulating technological innovation and enjoying the benefits of the Internet.
منابع مشابه
Computer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملInternet (Information/Skill) Literacy in Iran
This study examines the associations of internet information literacy with two variables: (1) the ability to work with technical aspects of the internet (internet skill), and (2) attitudes about the need for qualitative necessities in the development of e-services. A hierarchical regressions software analyzes data from a national sample of 2134 internet users. In this paper, internet literacy i...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006