Internet: an architecture of freedom? Free communication and control of
Surveillance technologies allow you to intercept messages, insert bookmarks
Thanks to which you can follow the communication of a computer or a
Message marked over the network; Also consist of continuous listening of
The communication activity of a computer or the information stored in
Said computer. The FBI’s famous Carnivore program
Keywords huge masses of information of the telephone communications or
Internet, searching and rebuilding in full those messages that
Suspects (although some arrests on
Enough gossip, arresting good mothers who commented
Electronically the danger of drug use in their children’s school). The
Surveillance technologies allow the identification of the originating server of a
Message. From there, through collaboration or coercion, the
Maintainers of the servers can communicate to the holder of power the
Address where any message came from.
Research technologies are organized on databases
Storage of information resulting from surveillance technologies. TO
From these databases you can build aggregate profiles of users or
Sets of custom features of a given user. By
Example, by means of the credit card number, associated with a license number
Identity and the use of a particular computer, can be reconstructed
Easily the set of all movements that a person makes
Electronic record As that is something we do every day (telephone, mail
Credit cards), it seems evident that there is no longer any privacy since the
Point of view of electronic communication.
In other words, the combination of identification, surveillance and
Investigation are a system in which whoever has the legal or factual power of
Access to that database can know the essentials of what each person
It does on the net and out of it. From that point of view, the network is not controlled, but
Its users are exposed to a potential control of all their acts more than
Never in history. Thus, political, judicial, police or commercial power
(Defenders of property rights) who wants to act against an Internet user
Can intercept their messages, detect their movements and, if they are
In contradiction with its rules, proceed to repression of the internaut, the
Service provider, or both.
Obviously, control does not come only from the government or the police.
Companies routinely monitor employees’ e-mail
Universities, that of its students, because the protection of privacy is not
Extends to the world of work, under the control of corporate organization.
But neither the Internet is a network of freedom, in a world where technology can
To control our lives through electronic
Tendency to ubiquitous control is irreversible. In society, every process is made of
Tendencies and counter-tendencies, and the opposition between freedom and control
End, through new technological means and new institutional forms.
The technologies of control and surveillance are opposed by technologies of freedom. By
On the other hand, the movement for open source software allows the diffusion of
Codes on which computer processing is based on networks. By
Consequently, on the basis of a certain level of technical knowledge, frequent among
Support centers for those who defend freedom on the Internet, we can intervene in
Surveillance systems, codes can be transformed and protected.
The programs themselves. Of course, if one accepts without denying the world of
Microsoft, any possibility of privacy and, therefore, freedom in the
network. Among other things, because each Windows program contains an identifier
Individual that accompanies through the network any document generated from
that program. But the increasing ability of users to modify their
Programs creates a more complex situation in which the
To become controller of the systems that monitor it.
Subsequent repression of those who are the transgressors of the norms dictated
By such power. To this end, control technologies are now available which, in their
For the most part, they were created by computer entrepreneurs who do business
Of anything without caring too much for the libertarian principles that affirm
In your personal life. These technologies are fundamentally of three types:
Identification, monitoring and research