top sections

Data gathering signals both ways

Data gathering signals both ways

Recent disclosures about data acquisition by several governments in massive proportions include password protected areas or personal equipment via firmware modifications or software trojans installing access points from external devices. Sometimes the technique —hackers use the word attack for anything like this— also involves going to sensitive and no user accessible zones of a hard drive, causing in general an interaction with the overall performance of the system as it exists an additional cycle of execution.

Surveillance, control over public areas has many benefits as an effective method to avoid criminality in any degree although there are multiple opinions about the limits and very frequently serious discrepancies. As international law doesn't provide an updated framework, it's necessary to create an agreement at a treaty level to guarantee that the basic doors aren't transgressed once the technology evolves permitting veritable intromissions in state sovereignty and the privacy of its citizens. We live in an epoch where the information may have economic value or it could be handled with that perspective. It's potentially against regional businesses or any form of trade.

Email has the possibility of entirely substituting the classic mail in terms of communication. History tells us that from ancient times the privacy of the communication was prioritized and respected, with legislation for protecting it. Who steals a classic mail and opens it is normally exposed to a penal sanction. The same for email, as it's a password protected area and contains private information, sometimes with account bank numbers, economical data, identification numbers for services, transactions, commercial interests, images, ideas and other kind of intellectual property.

Targeting the hardware in a firmware modification, there's the chance of creating a fatal fault as these operations always involve a risk. This causes economical jeopardy and damages and losses from a legal view. The same for the hard drive and any interaction with system specifications —additional software execution— and power consumption or performance.

Nevertheless, what doesn't admit discrepancies is the line between private and public when keywords like respect and ethics arise in consideration. Private when the citizen doesn't want others looking and shows perceivable signs of it. To surpass this line is already an offense; more when the citizen doesn't have a mere convergence with illicit / unethical behaviors and for it there's no reason, nor approved by a judicial system or with control from more than a single organization.

Finally to look at the intimacy —personal space without consent— has not a fortunate psychological component, usually referenced derogatorily.

Rate this item
(0 votes)
Comment article
Bookmark This Page