Preview

Pub Case Study

Good Essays
Open Document
Open Document
473 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pub Case Study
Publius

Although many people believe that the World Wide Web is anonymous and secured from censorship, the reality is very different. Government, law courts, and other officials who want to censor, examine or trace a file of materials on the Web need merely go to the server (the online computer) where they think the file is stored. Using their subpoena power, they can comb through the server’s drives to find the files they are looking for and the identity of the person who created the files.

On Friday, June 30, 2000, however, researchers at AT&T Labs announced the creation Publius, a software program that enables Web users to encrypt (translate into a secret code) their files – text, pictures or music – break them up like the pieces of a jigsaw puzzle, and store the encrypted pieces on many different servers scattered all over the globe on the World Wide Web. As a result, anyone wanting to examine or censor the files or wanting to trace the original transaction that produced the file would find it impossible to succeed because they would have to examine the contents of dozens of different servers all over the world, and the files in the servers would be encrypted and fragmented in a way that would make the pieces impossible to identify without the help of the person who created the file. A person authorized to retrieve the file, however, would look through a directory of his files posted on a Publius-affiliated website, and the Publius network would reassemble the file for him at his request. Researchers published a description of Publius at www.cs.nyu.edu/waldman/publius.

Although many people welcomed the way that the new software would enhance freedom of speech on the Web, many others were dismayed. Bruce Taylor, an antipornography activist for the National Law Center for Children and Families, stated “It’s nice to be anonymous, but who wants to be more anonymous than criminals, terrorists, child molesters, child pornographers, hackers, and email virus

You May Also Find These Documents Helpful

  • Good Essays

    In the case of United States v. Warshak, the primary issue at hand is the constitutionality of the government’s warrantless seizure of more than twenty-seven thousand e-mails stored on an internet service provider’s server. To answer the constitutionality issue, the first focus is on e-mail itself as a form of communication, and whether there can be a reasonable expectation of privacy for e-mail stored on a service provider’s equipment. In this case, the Court ruled that e-mail has fundamental similarities with traditional forms of communication, such as a phone call or letter (Craig, 2013). For example, law enforcement cannot obtain a wiretap, search a house, or open mail without a…

    • 628 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Mba 6004 U3A1

    • 1121 Words
    • 5 Pages

    Boswell, W. (2011). The Invisible Web: What It Is, How You Can Find It. Retrieved December 9, 2011, from About.com: http://websearch.about.com/od/invisibleweb/a/invisible_web.htm…

    • 1121 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The exchange of information is taking place every day over the internet. Although this may be convenient for us, it can also pose as an opportunity for criminals. Phishing, corporate fraud, intellectual property disputes, theft, and breach of contract and asset recovery are some of the situations wherein computer forensics can be used.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What the author does is he lists three people, all of whom practice the highest level of internet security. They are fugitives hiding from the cyber police. The point I assume he is trying to make is that even if you practice this extreme level of anonymity, you can, and will, still be tracked. So, as a normal user of the internet, if I wanted to stay anonymous, there are ways to circumvent it, but in the end, there is no way of being unseen. This is worrying to a point, and it is why this essay is intriguing to me because I feel like there should be an easier way to stay under the radar.…

    • 591 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Law enforcement agencies face many challenges that deal with cybercrime. One of the greatest challenges facing law enforcement agencies in investigating exploitation, cyber stalking, and obscenity is the power of anonymity.…

    • 897 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Digital Forensics

    • 1977 Words
    • 8 Pages

    The rapid growth of the internet has made it easier to commit traditional crimes by providing criminals an alternate method for launching attacks with relative anonymity. Effects of such technology has been great but , with the ever changing complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues to solving a case might be hidden in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence.…

    • 1977 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Misuse of this technology and the information accessible to online users can cause potential harm varying in severity. From spam, to cyber-stalking, the legal implications of various internet-related offences can result in fines and jail sentences. The purpose of the internet is to provide, and share information and data between computers. International boundaries are no longer a concern, which proves to be as useful as it is dangerous. Internet users all over the globe are able to act and figuratively hide behind their screens, with the use of anonymity. Anonymity poses a risk on the world wide web, users are able to create their own persona, develop and transfer data without an identity, and even pose as another. The internet may be misused by an individual through the use of anonymity. Untrackable viruses and bots can be created and spread through the wide synapses of the net, transferred from computer to computer through e-mail, downloading malicious files, and unauthorized access of ones personal computer, known as hacking. Another misuse of the internet is the act of copying someone 's work and claiming it as your own, also known as plagiarism. With thousands of documents, files and information readily available across the web on various websites, stealing another 's work is as simple as a copy and paste. Plagiarism and copyright infringement are similar, but not the same. Copyright infringement is a violation of the rights of a copyright holder, when material restricted by copyright is used without consent. On…

    • 1321 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Controversy Over Internet

    • 560 Words
    • 3 Pages

    Controversy over Internet Police has raged on since the creation of the internet. Several have thought that not policing the internet has led to numerous crimes such as theft, illegal transactions, and cyber bullying. But a majority, in defence, claim that such policing could revoke us from our rights as citizens of the United States. Cases as such tend to lean more to the side of not policing the Internet. We believe that as well.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Anonymous Research Paper

    • 734 Words
    • 3 Pages

    In the last few years, Anonymous has gained increasing notoriety for its action against websites, agencies and organizations that promote censorship and control. It has helped spread information and supported protestors demanding freedoms and…

    • 734 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Invisible Web: What It Is, Why It Exists, How to Find It, and Its Inherent…

    • 891 Words
    • 4 Pages
    Better Essays

Related Topics