Premium Essay

Peiter

In:

Submitted By Peiter
Words 695
Pages 3
Surveillance– Essay

Have we civilized countries grown to be dependent on the benefits modern technology provides us? As technology has progressed through the decades, we have greeted the simplicity and efficiency it has brought us with open arms. Little did we know that these revolutionizing creations of Mankind would one day be implements misused in a never-ending battle, between individual privacy and state power.

Surveillance around the world has strongly increased after the terrorist acts of 9/11. This has led to a strong media focus on the impact the different kinds of surveillance technology will have on our societies.
The first text “The Spy in Your Refrigerator” is an excerpt from an article in The UNESCO Courier, written March 2001 by Simon Davies. The article focuses on the civilian surveillance and its’ evolution. The fear of surveillance growing into an uncontainable situation is clearly illustrated in the quote “… surveillance that will one day cross all national boundaries – touching citizens everywhere” (p.4,ll.15-16). The writer makes use of the persuasion mode, Pathos, as he plays with our emotions regarding our fears against the states invasion of privacy. Furthermore we are introduced to the different kinds of surveillance methods and technology. The most common and obvious practice of surveillance is the “Closed circuit television cameras” (CCTV). They are neither hidden nor unnoticeable, but simply monitor private properties or numerous town streets, hence working as a scarecrow towards possible thieves, burglars and acts of vandalism. Secondly are the more high-tech “biometric identifiers”. These are dependent on the human characteristics and traits such as our fingerprint, handprint and eye, which are unique for every person. The purposes of these “biometric identifiers” are to keep track of individuals. Whether you are traveling or

Similar Documents

Premium Essay

Ajantha

...LITERATURE REVIEW Cygnus Business Consulting & Research Pvt. Ltd. (2008), in its “Quarterly Performance Analysis of Companies (April-June 2008)” has analysed the Indian telecom industry in the awake of recent global recession and its overall impact on the Indian economy. The analysis is done in the background of wake of global recession and rising inflation. Cygnus estimates, the Indian telecom industry is expected to maintain the growth trajectory in the next quarter as well. With almost 5-6m subscribers are being added every month, and the country is witnessing wild momentum in the telecom industry. Maheshwari (July-September 2008), in her report analysed the Indian telecom industry and ascertain that Indian telecommunications has been zooming up the growth curve at an mounting pace, and India is has surpassed US to become the second largest wireless network in the world. This growing subscriber base is basically created by tapping into rural India, which is an emerging market for the industry. The estimate for the next five to ten years is that the rural market will form 40 % of the subscriber base. The study has analysed the human resource management process of the industry, and specially the latest trends of recruitment of this massively growing industry. Anderson (2008), in his single executive interview titled “Developing a route to market strategy for mobile communications in rural India An interview with Gurdeep Singh, Operations Director, Uttar Pradesh,...

Words: 1864 - Pages: 8

Free Essay

A Hands on Intro to Hacking

...Penetration testing Penetration testing A Hands-On Introduction to Hacking by Georgia Weidman San Francisco Penetration testing. Copyright © 2014 by Georgia Weidman. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed in USA First printing 18 17 16 15 14   123456789 ISBN-10: 1-59327-564-1 ISBN-13: 978-1-59327-564-8 Publisher: William Pollock Production Editor: Alison Law Cover Illustration: Mertsaloff/Shutterstock Interior Design: Octopod Studios Developmental Editor: William Pollock Technical Reviewer: Jason Oliver Copyeditor: Pamela Hunt Compositor: Susan Glinert Stevens Proofreader: James Fraleigh Indexer: Nancy Guenther For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 245 8th Street, San Francisco, CA 94103 phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com Library of Congress Cataloging-in-Publication Data Weidman, Georgia. Penetration testing : a hands-on introduction to hacking / Georgia Weidman. pages cm Includes index. ISBN 978-1-59327-564-8 (paperback) -- ISBN 1-59327-564-1 (paperback) 1. Penetration testing (Computer security) 2. Kali Linux. 3. Computer hackers. QA76.9.A25W4258 2014 005.8'092--dc23 2014001066...

Words: 117203 - Pages: 469