Our Privacy Is In Danger

  • Length: 1150 words (3.3 double-spaced pages)
  • Rating: Excellent
Open Document

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

Continue reading...

Open Document

Protecting your personal information, both on your personal computer and in other places such as your bank or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers or phreakers. Whatever they choose to call themselves, they are theives, plain and simple. Some people still question whether or not hacking should be illegal. I think it's obvious that what hackers do is illegal. A personal computer is personal and the information on it is private. When a hacker invades that privacy, he/she is trespassing and when they take your personal information they're committing a form of thievery (Ludlow). In addition to hackers, we now have marketers invading our privacy through the use of cookies (Rodger).

Cyberterrorism costs companies, goverments and everday people billions of dollars each year. "Cyberwar may be to the 21st century what blitzkrieg was to the 20th (Arquilla)." In 1994, a Russian hacker broke into CitiBanks funds transfer system and transferred
over $10 million to his own accounts. A 16 year old English hacker penetrated a highly sensitive military research facility in Rome, New York. Just last year hackers shut down several 911 systems in Florida (Smith). So not only are they costing us money but they're also putting people's lives in danger.

Even though the theft of money is a growing problem, there are other things for hackers to steal. For instance, hospitals have very elaborate network security setups. Why? Many hackers attempt to gain access to people's personal medical files in order to blackmail them, or to avenge some injustice by spreading the person's health problems around. Other possibilities might go as far as to include looking up a patient's current location, in order for gang members to finish off the survivor of a drive-by shooting or other attempted murder. It is for these reasons that medical facilities computer security procedures are second only to the government's (Shoben).

There are even more forms of hacking to go into. One type, called phreaking, is often a side-effect of a computer hacker's work. Phreaking is the manipulation of phone lines and phone services. Over the space of a few years in the early eighties, hackers learned how to make free phone calls, bounce their line around to other places to avoid traces, even damage equipment at the other end of the line.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

How to Cite this Page

MLA Citation:
"Our Privacy Is In Danger." 123HelpMe.com. 21 Jun 2018
Title Length Color Rating  
Social Networking Sites and Privacy Essay - Introduction What do about ninety percent of us have in common. It’s the social networking sites that everyone is a part of these days, whether it’s your twelve year old nephew or your grandmother. Spending hours and hours connecting with your old friends and making new friends over the social networking sites has become a part of everyone’s daily routine. Nonetheless, recently privacy concerns over the social networking sites have taken its peak. Background It all started several decades back, when information technology developments succeeded but had put personal privacy into danger....   [tags: Information Technology Developments, Privacy]
:: 5 Works Cited
1144 words
(3.3 pages)
Strong Essays [preview]
Privacy and Security Issues on Facebook Essay - Executive Summary Problem Statement: In this white paper we will address how privacy and security can be improved on Facebook. Important Points: · Background of Facebook · Privacy Problems with Facebook · Possible Security and Privacy Solutions · Summary · Works Cited Background of Facebook Facebook allows people to connect with friends across the seas with different cultures. Originally, Facebook was started in 2003 by a man named Mark Zuckerburg in his college dorm room at Harvard University....   [tags: Social Networking, Online Privacy]
:: 2 Works Cited
2055 words
(5.9 pages)
Term Papers [preview]
The Internet, Technology, and Privacy Essay - ... For example, most of the information required to steal someones identity can be found on social networking sites that users are a part of. According to the RCMP, some of the information required for identity theft includes full name, date of birth, and address. [4] With the amount of private information being collected and shared across networks and their services, a need for protection of information begins to rise. About 68% of internet users' in America believe that the current laws that are in place are not good enough in protecting people's online privacy, according to a report on Anonymity, Privacy, and Security Online....   [tags: privacy on the web, growing concern]
:: 12 Works Cited
960 words
(2.7 pages)
Strong Essays [preview]
Essay about Is Personal Privacy Dead? - Have you ever felt violated. Like somebody knew too much about you that they didn’t need to know. Or have you ever felt like someone was watching you. As if somebody knew your every move. Most people don’t normally feel this way; most people feel safe in their general surroundings. Although with the constant use of technology in today’s era, it’s time to ask: Should we, as American citizens, feel as safe as we do. Personal privacy is such a simple phrase for such a complex idea. The definition given in the Merriam-Webster’s dictionary of privacy is, “the quality or state of being apart from company or observation.” And “personal” meaning, “Relating to the person or body.” In other words: set...   [tags: technology, privacy, hacking, computer] 1024 words
(2.9 pages)
Strong Essays [preview]
Online Privacy and the Internet Essay - More people can reach one another today than in years past because of social networking sites. The world has become a lot smaller because of sites like Facebook, MySpace, LinkedIn, and many others. There are certainly many advantages to using these resourceful social networks, such as keeping up with friends and family, sharing photos, and staying up to date with current events. Nonetheless, there is a growing concern about privacy, or the lack thereof, because of these sites. The ability to determine your privacy settings is at times confusing, and at other times, simply misleading....   [tags: Social Network Sites, Privacy, Internet]
:: 3 Works Cited
987 words
(2.8 pages)
Better Essays [preview]
Biome in Danger Essay - Image if you will, a world will no trees. If you can’t then image a world filled with smog, unnecessary and undeveloped abandoned buildings like in a metro/futuristic movie, and uncontrollable diseases that are rampant and may have be curable from plants we haven’t researched yet. The failing biome I want to introduce is the tropical rainforest and one of its major concerns which is deforestation. Without the forests, the previous images I gave would most likely happen and will be permanent because whether we notice them or not, trees, big and small are everywhere and they’re most likely not there for privacy or decoration....   [tags: the Amazon tropical rainforest] 735 words
(2.1 pages)
Better Essays [preview]
Facebook and the Threats to Privacy Essays - Social Networks are tools that let us communicate with friends and family, share our lives with them, learn about theirs, and sometimes even to establish new relationships. Social Networks sites are being broadly used by young and adults all over the world, being the formers, the main target market of the largest Social Network of the world, Facebook. According to recent statistics which can be found in Facebook’s home page, the site has 500 million active users around the globe, who have an average of 130 friends in their contact’s lists....   [tags: Social Networking, Social Network]
:: 5 Works Cited
1034 words
(3 pages)
Strong Essays [preview]
The Unacceptable Privacy Infrigment Essay - The Unacceptable Privacy Infringement When we mention the word ‘privacy’, we mean that there is something very personal about ourselves. Something that we think others are not supposed to know, or, we do not want them to. Nevertheless, why is it so. Why are people so reluctant to let others know about them entirely. This is because either they are afraid of people doing them harm or they are scared that people may treat them differently after their secrets are known. Without privacy, the democratic system that we know would not exist....   [tags: networking sites, facebooks, websites]
:: 4 Works Cited
1185 words
(3.4 pages)
Strong Essays [preview]
Essay on Internet Privacy - Invasion of Privacy on the Internet - Invasion of Privacy on the Internet     Invasion of privacy is a serious issue concerning the Internet, as e-mails can be read if not encrypted, and cookies can track a user and store personal information. Lack of privacy policies and employee monitoring threatens security also. Individuals should have the right to protect themselves as much as possible from privacy invasion and shouldn't have to give in to lowered standards of safety being pursued by the government.   Encryption is the best and most convenient way to ensure that e-mails and other files transferred via the Internet are kept private during transfer....   [tags: Exploratory Essays Research Papers]
:: 3 Works Cited
966 words
(2.8 pages)
Strong Essays [preview]
Essay on Internet Privacy - Carnivore is an Invasion to Privacy - Carnivore is an Invasion to Privacy Carnivore is the FBI's latest toy. All the time we hear about how it is an invasion to privacy, and while I do agree it does have serious problems it also has some moral dilemmas. For example who is subject to Carnivore and where is it located. How much and What kind of information is the FBI interested in getting. Lets start by looking at just what exactly Carnivore is. Carnivore is an actual piece of hardware that the FBI connects to an internet backbone....   [tags: Argumentative Persuasive Topics] 709 words
(2 pages)
Strong Essays [preview]

Related Searches

Using the process of phreaking, hackers can anonymously and untraceably link themselves to remote systems, no matter how far away, without incurring long distance charges. Combating hackers is a very expensive process. It is estimated that in 1997 a total of $6.3 billion dollars will be spent on computer security. A great deal of this will go to protect against computer viruses. A computer virus is a very small program that can clone itself at will, over disks and phone lines, and usually causes some devastating impact on the target, such as deleting files, or even damaging the computer. Just like human viruses, such as AIDS, which changes form constantly to avoid destruction, some computer viruses, called polymorphic viruses, change slightly so that any previous anti-virus software will no longer detect it. This is why there are constantly new virus protection tools and utilities. Viruses aren't the only threat, though.

When a company or organization starts a web page, they must have a wall of some type to keep people on the Internet from accessing parts of their computer system they want to keep private. Such programs are called firewalls, and allow only specified access. A firewall is the main obstacle for a hacker to get through when he is trying to hack in from a remote location. Unfortunately, inept use of the network can leave the firewall inactive or disabled, and once a hacker gets past, he can create hidden ways for himself to access again even if the firewall is restored. Computer security isn't just sitting in a room tapping away on a keyboard, though. Some hackers who are doing this for a living will go out and search for information that will allow them to break into a system. Remember the hospital with excellent computer security? One firm, which will break into your system, and report its weaknesses (how they did it) back to you, was hired to investigate a certain hospital. The firm found unbreakable computer security, so they put on expensive business suits and walked into the hospital. Because of the suits, potentially troublesome questioners were easily brushed aside as the men freely wandered the hospital. It seemed impossible to access someone's computerized medical history by the terminals, but why bother to try when the laser printer in an empty lounge was spitting out dozens of them? Right next to it, a receptionists desk had a stack of medical files laying on it. As the men pocketed a few of these, they made their way to the network operations room, where the technician on duty unlocked the door for them when they said they wanted to "Look around" They wandered freely around backup tapes containing the medical files of every patient the hospital had record of, collecting some of them to show to hospital officials. The actual physical security of a building cannot be neglected. If either physical or computer security are lacking, determined hackers can make quick work of the system. Perhaps the most dangerous form of hacking is to break into a system to acquire information. The most common use of this practice would be industrial espionage, one company hiring hackers to obtain advance information on a competitor's product, but worst of all, foreign governments breaking into other governments systems to obtain military strengths, statistics, and troop deployments for a surprise attack. For this reason, the U.S. computer network utilizes the most costly, complex security available. Even this is not enough, though. A few years ago, a hacker organization broke the CIA and FBI web sites simultaneously and replaced the normal web pages with pornographic materials. The intrusion was detected immediately and within thirty minutes, the site had been restored to normal. To this day, the identity of the group has not been discovered. Hackers represent a clear and present danger to the security of the United States of America. Not only do they cost our nation billions a year, but hackers also contribute to a serious espionage problem. Hacking, no matter its form, is an act of thievery, piracy, or blackmail, and cannot be tolerated (Ludlow).

Arquilla, John J. & Ronfeldt, David F. Cyberwar and Netwar: New Modes, Old Concepts, of Conflict Rand Research Review Fall 1995. Vol XIX, No. 2.
Ludlow, Peter How should we respond to exploratory hacking/cracking/phreaking?
Rodger, Will Activists charge DoubleClick double cross USA Today 7 June 2000.
Shoben, Ann That Wild, Wild Cyberspace Frontier Rand Research Review Fall 1995. Vol XIX, No. 2.
Smith, Gena Cyberterrorists Lurk ABCNews.com

Return to 123HelpMe.com