Thursday, October 9, 2008

Writing Topic 8 (Emi): Undetected Intrusions into IT Systems, e.g. phone tapping

1 comment:

Anonymous said...

Undetected intrusions into IT systems comprises of phone tapping, hacking and wire tapping. The phone tapping is a relatively old method, in terms of usage years, since the beginning of the Cold War, the most popular era of spying intellingence. The simple phone tapping included, of inserting a device with radio signals into the phone receivers of the people under surveillance. As it happens, the most used form of phone tapping is conducted by the governments. The most controversial aspect of phone tapping exists in United States. Where FBI and other intelligence agencies gather information and collect data on phone conversation os suspects to crime. The laws of the freedom of speech and freedom of communication of the citizens have prohibited the government agencies for collecing legalised supervised data from suspects. The phone tapping is considered to be breaching of privacy. And in fact the communication laws in US had until 1993 only included rights of the citizens to not be secretively intruded by phone tapping, but the surgence of the communication devices, such as internet, it provided ciminals and terrorists a wide range of cumminication methods via email and IM, therefore the government agencies such as FBI argued that the communication laws should also include the rights of the government to practice supervision of conversation via phone and other electronic methods, such as email in case the decision was legalised by court orders.

Intrusions to the IT systems not only means, phone tapping, but also have increased in email and IP provider tapping, or internet connection tapping. These are primarily set on the government systems and softwares such as FBI's Carnivore for reading e-mails, and NSA's (National Security Agency)Echelon projects.

From the earlier times of internet convention, hacking was considered as a positive attribute to the computer programming revolution. But in recent times, the distinction between hacking and cracking have diminished, therefore hacking means to the public and the media, the intrusion to the IT systems without authorization. Any tpe of hacking, except the ones gvien permission by the company's security experiments, are legally considered as crimes. In approximately 30 seconds, hacking happens in any place on the Earth. The figure might increase as the speed of internet connection is doubled over the years. A very simplistic hacking or interception of information can happen with Wi-Fi connections. In a documentary Hackers, one hacker drove through the Washington DC avenue where the, government buildings are centralised, and intercepted phone calls that were radio transmitted. This is an example of the vulnerability of the communication devices, and lack of knowledge of the users.

Even though such intrustions to the systems brings issues relating to loss of data and loss of privacy, it is a more of an issue of security and how well the workers can follow regular methods of safe use of computers, such as protecting the passwords and shutting down servers when leaving the desk. In the upcoming era, the information would be shared by digital means much more frequently than nowadays. There is predicted to be an age where there would be no paperwork in printing. Such changes, call for a stronger regulation on government surveillance and also strong punishments as a consequence for hacking.