Should Internet Activity Be Monitored Essay

2357 words - 10 pages

Tina Rios
Business Law I
Position Paper

Should Internet Activity be Monitored?

There has been an ongoing debate over many years on whether or not internet activity should be legally monitored by Internet Service Providers or the government. Obviously there many pros and cons to both sides of this issue. There is not only a valid need for internet monitoring of private networks in addition to government systems, but there is also a valid concern for the privacy of our country’s citizens. Both sides of this issue will be addressed as well as my own analysis of this topic.
There is quite a bit of history regarding monitoring public internet communications. Some forms of electronic ...view middle of the document...

They include numerous types cyber crimes to include: fraud, such as: financial, computer, identity theft, debit/credit card…etc., child exploitation, online gambling, phishing scams, cyber stalking/bullying, and computer viruses, just to name a few. In 2004, Kenneth Flury was charged with bank fraud and conspiracy when he tried to steal debit card account numbers, pins and other personal information from Citibank. The US Secret Service got involved as part of Operation Firewall. He ended up getting over $380,000. He was sentenced to 32 months in prison and 3 years of supervised release and pay $300,000 in restitution to Citibank. In 2005, Jeanson Anceta used botnets to launch destructive spam and adware attacks. Most of his damage affected the computers used by the Federal Government for National Defense. He generated over $100,000 in proceeds. He was sentenced to 5 years in prison and has to undergo 3 years of supervised release which limits his internet and computer use. He also has to pay the Weapons Division of the United States Naval Air Warfare Center $15,000 in restitution and relinquish $58,000 of his profits from his illegal activities. In November 2008 a mother reported that a 20 yr old male was having sexual conversations with her 12 yr old son through Xbox live. She gave the tip line his first name, numerous screen names, and a possible location. The Exploited Children’s Division conducted internet searches using the screen names and found a discussion board posting and discovered an email address. After analyzing the information the analyst notified the New Jersey Internet Crimes Against Children task force. After further investigation, it was found that there were previous complaints against the suspect and due to the tip from the Cyber Tip Line authorities were able to tie up the lose ends of prior reports and arrest a 21-year old suspect for possession of Child Pornography and multiple counts of Endangering the Welfare of a Child. At this time it is believed that there are at least 10 child victims. In 1996, the FBI only investigated 113 cases involving child exploitation via the internet; in 2001 the FBI opened 1,559 cases. The Internet Crimes Against Children program was launched by Congress and the Department of Justice in 1998 and between then and 2001 these task forces have arrested over 900 predators. There are numerous cases on cyber crimes that may have been preventable if internet activity were being monitored. FBI Director Robert Mueller said “the idea balances on one hand, the privacy rights of the individual who are receiving the information, but on the other hand, given the technology, the necessity of having some omnibus search capability utilizing filter that would identify the illegal activity as it comes through and give us the ability to preempt that illegal activity where it comes through a choke point.”
The federal government is launching an expansive program called “The Perfect Citizen”...

Other Essays Like Should Internet Activity Be Monitored

Social Media Addiction Essay

1167 words - 5 pages In this generation, the most meaningful and personal relationships now involve the use of a computer on social media sites. However, social media now is believed to be related to deeper issues in a person’s life. Studies show that almost 17 percent of children and teens have an internet addiction. For prevention, parents should monitor and openly discuss the internet usage in their home. “Children are experts in social media, with parents

Access Denied Essay

1086 words - 5 pages of pornography and other adult materials. These problems could be eliminated through locks on sites, fees on pornography and tags for monitoring on child trafficking sites. Also all “home-made” websites should be viewed and approved by the government. The following paragraphs will illustrate the dangers of the above issues, provide arguments, and provide a call to action on how to resolve the problem. The Smaller Issues of Easy Internet

Monitoring Employees Private Social Networks

713 words - 3 pages why companies monitor their employee’s social sites should be made, as well, as the employee’s rights to privacy. Why do companies monitor their employee’s social networking media? The reasons managers monitor social media was revealed in a new Deloitte survey. Many businesses want to be able to monitor their employees’ social networking activity on sites such as MySpace, Facebook, and Twitter. The main problem with this idea

The Disadvantages of Internet.Docx

541 words - 3 pages media. Internet which has been a part of human’s activity has not only advantages but also disadvantages for human’s life. The disadvantages of the internet such as unlimited and unfiltered information, piracy and virus attack can be reduced if people are more educated to use the internet safely and wisely. People should keep themselves and people around them from the bad things that may come from the internet and also use internet without harming the others activity.

Ta Internet

4100 words - 17 pages away by the internet; other times I think it’s being gulped down in huge, Jaws-shaped chunks. (Geoff Dyer, quoted in The internet: is it changing the way we think?) So how worried should we be? Your Plastic Brain Let’s start with the science. Nicholas Carr is absolutely right to make a connection between mental activity and the structure of his brain. The phenomenon of neuroplasticity means that when we learn a new skill, or change our

Digital Marketing

4000 words - 16 pages that enterprise. For instance, if an Internet transaction were conducted in a retail establishment within a manufacturing enterprise, that activity would be classified as a sale of the manufacturing sector if that establishment provided more value-added to that enterprise. Instrument design The survey data are collected via a multi-mode strategy, using an electronic questionnaire as the primary mode. A paper questionnaire is sent to those

Within the Network of the Department of Defense (Dod),

633 words - 3 pages be allowed. This will be monitored by web-admins, who can see the browsing activity of these contractors and full time employees at any time. It is imperative to save bandwidth and to provide our end users will quality Internet service. For example, if I am working on an assignment and it is taking longer than usual, someone may be using YouTube for an extended period of time, taking up the available bandwidth that could be used for work purposes

Employee Privacy Report

1085 words - 5 pages . Personal email accounts such as Yahoo, Hotmail, etc. are not allowed and will be denied access in government computers. Under no circumstances will the military use their internet network to access any pornographic websites or any other prohibited content. By engaging in such activities can lead to reprimand and further administrative action. E-mail transactions should only contain work related material and messages that contain prohibited

Information Technology Acts  Paper

673 words - 3 pages could harm them. Today schools are required to block or filter internet access to any programs or internet access that would be considered offensive they are also required to track and monitor all internet activity (American Library Association [ALA], 2003). The internet has become an important tool to school age children. It allows them greater access to extended learning tools, such as reading and math assistance. It is used to research in

What Has the Internet Come to

5012 words - 21 pages also committing crimes. Some of the crimes that are being committed online are identity theft, child pornography, prostitution, and narcotic sales to name a few. An individual must be knowledgeable about the Internet or know someone who is, in order to engage in any kind of criminal activity. Many criminals think they can use the Internet to conduct their illegal business without being detected but the truth is these criminals can still be

Shut Down Your Screen Week

658 words - 3 pages distractions of the Internet, including games and social media, this isn’t hard to believe. The average IQ of a single person is about 90-110. This means average intelligence. People who use the internet on a regular basis could have a lowered IQ of about 85 according to a study made which monitored Internet Explorer users, which is near below average intelligence. I’m not saying that technology is the reason for lowered IQ levels, but it is the average

Related Papers

Should Internet Be Monitored Or Censored?

1520 words - 7 pages Should the internet be monitored or censored? By whom? There is a controversy about the internet whether should be monitored, censored or the free flow of information should be allowed. There are two main arguments that come up to the surface. The first reason is political and the second reason is rather social. Today, the internet provides the widest source of information and addresses to anyone at any age. It is an ever-expanding spectrum

Food Safety Should Be More Closely Monitored For Wellbeing Of Public Health In Australia

1416 words - 6 pages Food Safety should be more closely monitored for Wellbeing of Public Health in Australia Name Institutional Affiliation Food Safety should be more closely monitored for Wellbeing of Public Health in Australia The rising cases of food scandals in the recent past have put the topic of food safety in the limelight. Additionally, food scandals have made food safety a contentious issue that warrants special attention. Some of the food

Should The Internet Be Trusted? Essay

998 words - 4 pages Should The Internet Be Trusted? The Internet has become more and more of a favorite place for students to go when searching for sources to use in research papers. This is mostly because of the wide and relatively simple access that the Internet provides to all kinds of information. Why get up and travel all the way to the library when it is so much easier to open a browser window and head to Google? While the Internet can be a wonderful

Richman Investments Essay

637 words - 3 pages either access to the Services and/or Richman Investments account or other actions as deemed appropriate. User Responsibilities: These guidelines are intended to help you make the best use of the Internet resources at your disposal. You should understand the following. 1. Richman Investments provides Internet access to staff to assist them in carrying out their duties for the Company. It is envisaged that it will be used to lookup details about