Академический Документы
Профессиональный Документы
Культура Документы
Seigfred P. Cortan
The internet started as a way to share information between government researchers in the
1960s. During that time, computers were big and immobile, so researchers either had to go to the
site personally or send computer tapes through the postal system. Another factor that led to the
development of the internet was the launching of the Sputnik satellite by the Soviet Union. The
U.S. Defense Department wanted to create a way for information to be shared even after a nuclear
attack, hence, the establishment of ARPANET (Advanced Research Projects Agency Network)
which we now call the “internet”. Today, the internet has found more uses other than just
information exchanges. People can now talk to their friends from the other part of the world in real
time, stream and download files, order food and items without waiting in line, the internet has
A raw piece of metal is considered junk, harmless, but one cannot ignore it possible uses
once cultivated. Give it to a gun manufacturer, and that piece of metal becomes a rifle. The rifle
then becomes a dangerous weapon. This concept is no different from the case of the internet as a
The invention of the internet was indeed a game changer; its modern applications have
made a plethora of uses, most of which has made life more comfortable and efficient. However,
this new technology also gave birth to a new breed of weapon and a new type of warfare: the
cyberweapons and the cyberwarfare waged by various countries both domestic and global.
Electronic Surveillance
In recent years, digital privacy has been one of the most significant issues of the modern
age. Technology companies and internet service providers have a means of tracking its devices
and monitor its activities, and there have been instances where the government has forced these
companies to hand over their data to monitor its citizens and combat potential threats to the state.
We have been fighting for liberty and freedom of speech, yet, companies and governments have
been threatening our privacy, and we are letting them have their way. Not everyone might have
incriminating data, but we still have sensitive information stored on the internet, and we have the
One of the prominent actors in electronic surveillance is the U.S., particularly the NSA
(National Security Agency). Secure Swiss Data, a Swiss Cybersecurity Company cited nine (9)
1) Phone Records
The NSA records every domestic and international phone calls made within
the U.S., they know the caller’s number, which number he/she dialed, when
Top online services like Facebook, Google, and Twitter are forced to hand
3) Hacking of Devices
Computers and mobile devices have different sorts of backdoors that the
NSA has made a deal with manufacturers to make some sort of backdoors
Cell towers are necessary for making a phone call, sending a text message
and even connect you to the internet; this means that the NSA will want to
keep a record of where a person is. When a person makes a call, the
company knows its them. If the customer requests, the company can send
them a detailed bill containing all calls and texts made on the account and
phone that informs the cell tower that the person is allowed to make a call.
6) Internet Tapping
Even upon leaving the U.S., the person is still being tracked by the NSA.
There are massive fiber-optic cable under the sea and the NSA can work
The NSA can hack companies in other countries to get information about
the activities of a certain person. They check from credit card transactions,
This is how the spending habits of criminals are tracked with ease. All credit
card transactions and bank transactions can be tracked by NSA, they even
Free email services like Gmail and Yahoo! are one of those that have been
hacked recently, which means that someone out there has access to billions
of information that can be used in any way possible. The NSA can also
access email of private individuals but only if it is not encrypted. This means
that the technology of NSA is not yet advanced enough to decrypt emails.
The NSA is only one of many government agencies that focus on information and
Zealand’s GCSB (Government Communications Security Bureau). Together they form the
Five Eyes Alliance which regularly cooperate on spy programs (Baxter, 2015).
References
A Brief History of the Internet. (n.d.). Retrieved from University System of Georgia:
https://www.usg.edu/galileo/skills/unit07/internet07_02.phtml
Baxter, A. (2015, August 15). How the government can spy on you, and what you can do about
it. Retrieved from The Next Web: https://thenextweb.com/insider/2015/08/15/how-the-
government-can-spy-on-you-and-what-you-can-do-about-it/
Ivana. (2017, October 30). 9 Ways Your Government Is Spying on Your Internet Activity.
Retrieved from Secure Swiss Data: https://secureswissdata.com/9-ways-government-
spying-on-internet-activity/
Meyer, E. (2017, February 1). The Internet Isn’t Vulnerable – It’s a Weapon. Retrieved from
Tripwire: https://www.tripwire.com/state-of-security/security-data-protection/internet-
isnt-vulnerable-weapon/