Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Role of security policies
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Role of security policies
During a conversation last year with a Houston-based network administrator, I asked, “Is wire sniffing at some random public WiFi hotspot illegal?” “No, not at all. It’s just passive…and besides, anyone stupid enough to pass their sensitive information over an unsecure network gets what they deserve.” As it turns out, he was wrong, but he’s not alone in his confusion.
A quick search shows that many other people are curious about the legality of packet sniffing, but that the advice they get is contradictory. According to Ohm, Sicker, and Grunwald (2007), some of the top justifications for sniffing without consent include:
• “It’s my network, so I can do whatever I want.”
• “The network wiretapping laws have an exception for academic research.”
• “Packet sniffing is legal so long as you filter out data after the 48th (or 96th or 128th byte)”
• “Capturing content may be illegal, but capturing non-content is fine”
• “We’re not breaking the law because we’ve anonymized the data”
• “Data sent over a wireless network is available to the public, so capturing it is legal.” (Ohm, 2007 p. 1)
Ultimately, the court of law, not the court of public opinion, is the deciding factor in legality. So why isn’t the issue clear cut and widely known? The laws that govern packet sniffing, the Federal Wiretap Act and the Pen Register and Trap and Trace Act, were written more than 50 years ago and were meant to apply to the wire tapping of phones. Later, in 1986, packet transmissions were added to the list of covered communications. The Patriot Act of 2001 also amended the body of law. Between this patchwork of jury rigged laws and the legitimate exceptions to the law, it is often unclear what restrictions apply to which activities.
I...
... middle of paper ...
...nishments (ranging from a maximum of 5 years in jail to a civil judgment of over $10,000) may not be enough to deter would-be thieves. As IT professionals, it is our job to not only operate within the boundaries of all laws and ethical obligations, but to do our best to protect the transmissions that people entrust us with by making our applications secure.
Works Cited
Ohm, Paul, Douglas Sicker, and Dirk Grunwald. 2007. Legal Issues Surrounding Monitoring During Network Research. Internet Measurement Conference. [Online] October 2007. http://www.imconf.net/imc-2007/papers/imc152.pdf.
Singer, Abe. Conference Password Sniffing. Usenix. [Online] http://www.usenix.org/publications/login/2005-08/pdfs/singer.pdf.
Spangler, Ryan. 2003. Packet Sniffer Detection with AntiSniff. [Online] May 2003. http://www.packetwatch.net/documents/papers/snifferdetection.pdf.
To better understand the topic at hand it is important to understand what electronic surveillance is pertaining to Foreign Intelligence. The definition of “electronic surveillance”, as written is FISA, can be summarized best as acquisition of data from wire or radio communications using “an electronic, mechanical, or other surveillance device”. There are four specific criteria that further define electronic surveillance in more detail also included in FISA under Title 1, Section 101. This section also included definitions for those groups that surveillance may be authorized against. [2]
According to a recent article by Scott Shane, “The U.S. is pushing to make sure that cyber programs comply with international law and international standards.” This quote shows that the government wants to make sure that cyber programs protect the citizens to the same degree as other international laws. The government wants cyber programs to have the same standards as international law and international standards to give citizens the sense of security that they are being protected. According to a recent article by David Francis “...Congress retroactively immunized the nation’s telecom giants for their participation in the illegal Bush spying programs, Klein’s claims (by design) were prevented from being adjudicated in court.” This quote means that telecom giants such as Verizon and AT&T participated in Domestic Surveillance in order to help protect citizens. Telecom giants play a role in giving US citizens a sense of security by helping the National Security Agency. Others may believe that the tracking of our phone calls does not give US citizens a sense of security; however, according to a recent article by Marshall Honorof, “Counterterrorism is not the only function of the NSA's widespread surveillance. Although it cannot report exact numbers, Lewis theorizes that the data-mining has allowed the NSA to put a stop to a number of international espionage plots.”
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
"NSA Surveillance Programs." Issues & Controversies. Facts On File News Services, 14 Oct. 2013. Web. 20 Nov. 2013. .
Williams, Carol J. "Telecom Customers May Sue Government over Wiretapping, Court Says." Los Angeles Times. Los Angeles Times, 29 Dec. 2011. Web. 28 May 2012. .
Current advancements in technology has given the government more tools for surveillance and thus leads to growing concerns for privacy. The two main categories of surveillance technologies are the ones that allow the government to gather information where previously unavailable or harder to obtain, and the ones that allow the government to process public information more quickly and efficiently (Simmons, 2007). The first category includes technologies like eavesdropping devices and hidden cameras. These are clear offenders of privacy because they are capable of gathering information while being largely unnoticed. The second category would include technologies that are used in a public space, like cameras in a public park. While these devices
Dagar, Anil. “Internet, Economy and Privacy.” Fung Institute for Engineering Leadership. 16 April 2013. Web.
Part of the allure of the Internet has always been the anonymity it offers its users. As the Internet has grown however, causing capitalists and governments to enter the picture, the old rules are changing fast. E-commerce firms employ the latest technologies to track minute details on customer behavior. The FBI's Carnivore email-tracking system is being increasingly used to infringe on the privacy of netizens. Corporations now monitor their employees' web and email usage. In addition to these privacy infringements, Internet users are also having their use censored, as governments, corporations, and other institutions block access to certain sites. However, as technology can be used to wage war on personal freedoms, it can also be employed in the fight against censorship and invasion of privacy.
Print Lazar, Wendi S. “Limitations to Workplace Privacy: Electronic Investigations and Monitoring” Computer and Internet Lawyer (2012): SIRS. Web. The Web. The Web.
Subramanian, R. (2011). The growth of global Internet censorship and circumvention: A survey. Communications of the IIMA, 11(2), 69-90. Retrieved from http://search.proquest.com.ezproxy.rit.edu/docview/1350959847?accountid=1082011
Nearly every major international agreement on human rights protects the right of individuals to be free from unwarranted surveillance. This guarantee has trickled down into national constitutional or legal provisions, protecting the privacy of communications.
Privacy is considered to be subjective and can be defined by people in various ways however most will agree that privacy is an extremely important core value. Privacy is a way of protecting the personal information of someone. With advancements in technology and people using the internet, more than ever, society has been force to change their views on privacy to deal with the changing technology. One innovative piece of technology that has recently been causing people to rethink their privacy is Google View and how it was being used to conduct Wi-Fi vacuuming. This paper explores the ethical and legal issues associated Google’s Wi-Fi vacuuming and its impact on privacy. Included is an explanation of the technology and a discussion of the primary legal and ethical issues involved.
As can be seen, from the information presented, the need for laws and restrictions concerning internet data collection is greatly needed. Moreover, the government can search private citizens data without warrant or cause. Also, companies are not only collecting internet user data but also selling it. The companies and agencies who commit such crimes should be fined or either closed down. In closing, the privacy and security of individuals on the internet should be upheld by the United States government.
Unknown Author. An Overview of the Communications Decency Act (CDA). Center for Democracy & Technology. Retrieved 26 April 2004.
The downside of this technology is the potential for security problems. Intruders can see packets traveling on a network and can perhaps interpret them to obtain confidential information.