Surveillance

Implications of surveillance

• Freedom of speech curtailed – journalists or dissidents who have
criticised the government – targeted.

• Faulty refuge under Statues – Indian Telegraph Act, 1885; section 69 and the
Interception Rules of 2009 under Information Technology (IT) Act, 2000.
 Statutes provide way for surveillance, no protections to the surveilled.
 Even the opaque laws don’t provide for surveillance
 Hacking is a criminal offence under the IT Act.
• Threatens the separation of powers
 Judiciary can effectively over see and curtail such
powers being misused.
 Laws provides no scope for an individual subjected
to surveillance to approach a court of law.

Key Take-away

• Surveillance system impacts the right to privacy under Art. 21 – reiterated in K.S. Puttaswamy (Retd) v.
Union of India (2017) case.

• Impacts exercise of freedom of speech and personal liberty under Art. 19 of the Constitution.

• Mass surveillance – risk of concentration of powers
with the executive.

Cyber Crime

Now in modern era science and technology has reaching it’s new peak day by day. It is also advancing man is becoming dependent on internet for all his needs as it gives easy access to gaming, online studying, social networking, online jobs, shopping etc. everything at one place. Apart from other countries, India is also not far where the rate of incidence of cyber crime is increasing day by day. It makes our life easier than before. As people also face the incidences of the Cyber crime. Cyber crime is an illegal activity which involves a series of issues ranging from theft to using your system or IP address as a tool for committing a crime. It can be refers to the use of an electronic device (computer, laptop, etc.) for stealing someone’s data or trying to harm them mentally or physically like Fraud due to credit card, debit card, bank robbery, illegal downloading, child pornography, distribution of viruses using a computer.

There are many types of cyber crime mainly we can say that Cyber Crime are categorized into four different types. These are

The financial crime where they steal the money of user or account holders. Likewise, they also stole data of companies which can lead to financial crimes. Also, transactions are heavily risked because of them. Every year hackers stole lakhs and crores of rupees of businessmen and government. It also includes e-commerce fraud.

The Privacy Crime includes stealing your private data which you do not want to share with the world. It is common nowadays. Moreover, due to it, the people suffer a lot and some even commit suicide because of their data’s misuse.

In hacking they intentional deface a website to cause damage or loss to the public or owner. Apart from that, they destroy or make changes in the existing websites to diminish its value. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.

Modern-day terrorism has grown way beyond what it was 10-20 years ago. But cyber terrorism is not just related to terrorists or terrorist organizations. But to threat some person or property to the level of creating fear is also Cyber Terrorism.

It can be saved by keeping our system update regularly, use strong and unique password. It cannot be written down on notebook or be disclosed to anyone. Data must be backed and don’t click suspicious links. We should follow the security protocols and other proper method to save us from Cyber crime.

Thanks….

What is Ethical Hacking?

Hacking refers to the practice of gaining access to systems or computers through unauthorized means. While our everyday life is increasingly moving online as are all activities, it is important that our privacy is maintained, our bank accounts remain secure, and our data not be used for other purposes. Cyber-crimes which are crimes perpetuated online pose a massive threat to our security in the virtual world and are on the rise every day. These activities are done by malicious hackers who use the information for their own personal gain or for organizations with criminal intentions. It is to counter this threat that ethical hacking is promoted now.

code on computer screen
Photo by ThisIsEngineering on Pexels.com

Ethical hacking refers to the practice of breaking through or bypassing system security with non-criminal intent. It is a pre-emptive measure to identify the flaws in a system as well as expose the probable cracks through which data can be compromised. The breach in the system will allow the organization to understand their current security status and do what is needed to better it. Ethical hackers are also known as White Hat hackers as opposed to Black Hat hackers who use illegal means to gain access to a system and do harm. There is a third group who are called the Grey Hat hackers. They are hackers who break into systems without authorization but do so with no mal-intention. Many do it for the fun of it and also report their breaches to whoever concerned. However, the lack of official authorization makes even this act a crime. Data theft, identity stealing, and large-scale money heists are all common activities that a black hat hacker would engage in. In the current landscape of commerce and technology, it is undebated that those who have access to and control of more information get the upper-hand. Information and data are the currency used most widely now. It is to ensure that these transactions and safekeepings are as secure as possible, and that the organizations who handle our data are able to safeguard them that we have need of ethical hacking.

An ethical hacker employs his skills to find the glitches in the armor and alerts his employers about his findings. With technological innovations reaching new heights every day, it is necessary that security systems are constantly upgraded and under scrutiny. Companies hire ethical hackers to find vulnerable points in their security systems and software that could be points through which an unethical hacker could enter the system. Ethical Hacking is also known as pen-testing or penetration testing. This is because they perform what is called a ‘pen test’ to hack into the system. Ethical hackers usually use the same methods that unethical hackers will use to enter a system. The only difference is that they are doing it with legal authority. They are required to keep their findings and understanding of the security system of an organization confidential since any slippage of information from them can cause harm as well. They are to remove or erase any traces of the hack once they have finished checking the system in order to stop unethical hackers from exploiting the same vulnerabilities. Ethical hacking can be learnt online from professionals or as part of courses. It is becoming a much sought-after profession and an increasingly pertinent one in the current global scenario.

What is a Surveillance society?

The surveillance society is a society that is structured and organized using surveillance-based techniques. To be under surveillance means having information about individual’s movements and activities recorded by technologies, on behalf of the governments and organizations that structure our society. This information is sorted and categorized and then used as a basis for decisions which affect our life. Such decisions concern our entitlement, work, access to benefits, products, services, and criminal justice; our health, well-being, and our movement through private and public spaces. 

Everyday encounters with surveillance include:

• Video cameras which watch us every day everywhere we go – in buildings, shopping malls, streets, and residential areas. Automatic systems can now also recognize number plates (as well as faces).

• Electronic tags that keep a check on ones who are on probation do not break their release conditions, and people arrested by police have samples of their DNA taken and kept whether they are guilty or not. 

• We are constantly asked to prove our identity, for benefits like healthcare, and so on.

If surveillance is a normal aspect of the management and governance, then what’s wrong with it?

 Using surveillance to achieve one’s aims, no matter how big or small bestows great power. Some interests will be served, while others will be marginalized. Some will receive entitlements and benefits, while others may not.

As data travel silently across international boundaries, national states, and within transnational corporations, the impact of surveillance becomes even harder to identify and regulate.

It focuses on correcting the negative also it gives a message to those who are watched that they are not trusted to behave appropriately.

The rise of technology is shattering even the illusion of privacy. Video cameras peer constantly from lamp poles, satellites and drones float through the skies, smartphones relay a dizzying barrage of information about their owners and what not.

The information of every traveler on every stop is noted and stored by Internet service providers like Google, Verizon, and Comcast. Retailers scan, remember, and analyze each purchase by every customer. Smart TVs know what we’re watching—soon they will have eyes to watch us watching them.

The future is here. Nearly everything that happens from now on has the potential to be seen by someone and also stored indefinitely. Government and the private corporations working with them, collect and store billions of records every day and they’re hungry for more. Technology makes all secrets difficult to keep.

There has been evidence that shows mass surveillance erodes intellectual freedom and damages the social fabric of the affected societies. It opens door to flawed and illegal profiling of individuals. Mass surveillance has also not helped in preventing terrorist attacks.

Other evidence shows that even the possibility of being under surveillance changes the way people think and act, causing them to avoid talking or writing about sensitive or controversial subjects. This only showcases that mass monitoring of citizens achieves only one thing that is the development of mutual mistrust between individual and state.

Surveillance society instead of beneficial has given us more non-benefits. It affects the privacy of the individual. The mismanagement of CCTV, ID cards, mobile phone data, health, and social security databases, shop loyalty cards, and other data retention technologies has an enormous potential in causing public or personal catastrophe – from criminals and terrorists hacking into or sabotaging the health care database, down to personal data being stolen or accidentally destroyed.

However, if surveillance and personal data collection are to achieve its true value then it should be tightly regulated to avoid abuse and mismanagement by government, companies, and individuals. If we are living in a society that relies on surveillance to get things done are we committing slow social suicide?

Surveillance and personal data collection have the potential to be of benefit to society but only if maintained with due care, otherwise it only risks jeopardizing the public safety it’s meant to protect.