Wire Trapping and Eavesdropping

  • 60,000+ Completed Assignments

  • 3000+ PhD Experts

  • 100+ Subjects

Question:

Discuss about the Wire Trapping and Eavesdropping.

Answer:

Introduction

Wiretapping is one of the technical tools that are used for eavesdropping or monitoring the suspected criminals. In order to use the wire tapping programme, the law enforcement uses a various number of technical tools. Generally, such tools are used to detect criminals and get hold of the crimes. The government has the authority to use such technological tools to intercept the data that is transmitted over the telephone. The Federal Bureau of Investigations (FDI) has been using such technologies for receiving the relevant information associated with crimes (Sengar, Wang and Iranmanesh 2014). However, use of such technology is raising a question regarding the privacy concern of an individual.

The hypothesis of the study is indicating that whether the use of such technology is justified or not. Even though these technologies are used for the investigation purposes, it is harming the individuals’ privacy. The right to be let alone is considered as the civil liberty that has been protecting a person from the unreasonable searches. The study will be presenting the argumentative responses regarding the relevancy if using such technologies, which can harm the privacy of the others.

Discussion

In keeping pace with the advancements of the technologies, the number of crimes is also increasing. Wiretapping and Eavesdropping are mainly used for detecting the crimes by tapping the records of phone calls, computer data, and other information. The government or the Federal Bureau of Investigation team is allowed to use such technicalities if they suspect any fraudulent activity (Geary, 2014). However, it is noted that the internet securities are provided to protect the data and privacy of the users. Keeping tracks of an individual’s personal activities is unethical. However, some of the employers even use such technologies to monitor the performance of the employees.

In considering the research hypothesis, it can be interpreted that privacy breaching is completely against the security ethics. Each individual use the different technical tools to protect the private information. Especially, internet is universally used for connecting with people worldwide, transferring information, and performing several professional and personal activities. The security applications are installed for protecting the personal or confidential data. Hsiao, Kerr and Madnick (2014) defined that ‘sniffer’ programming is a computer programme, which helps in analysing data on a communication network. This computer networking programme is generally used for gathering intelligence. For example, the programme helps in detecting the passwords of interests, which are transmitted over the internet source. However, some of the employers misuse such technologies and it becomes a major concern.

The electronic eavesdropping and wiretapping are the two major technical tools that are much significant in criminal investigation. The officials associated with law enforcements are usually use this technological tools for their investigation purposes. Onyancha (2015) implied that the employers use the “sniffer” programme to maintain the security of the confidential information. However, Freedman (2013) argued that the individuals have their full rights to keep the information secret. Especially, in terms of the confidential information or any of the private activities, it is required to install the security software for protection. The argument arises if the employers fail to present any justification to use such technologies (Siponen, Mahmood and Pahnila 2014). During the wiretapping, one can receive the information of a person who is working on the same system. Moreover, the government and the Federal Bureau of Investigation can use such system during the emergency cases.

It is noted that the use of sniffer system to protect the data with special security. However, if someone is using such system to receive information of other person, it will be called “hacking”. It is notified to everyone that “hacking” is illegal and unethical. If any of the employers is using such wiretapping system to get hold of the secret passwords and grab the sensitive data. Employers can monitor the performance and behavioural patterns of the employees in an ethical way. Monitoring the keystrokes and the detecting the security passwords are considered as the crimes. No one is allowed to hack the information of others if there is no such authentication. The wiretapping network allows the access on different system, which is protected by the internet security (Cherdantseva and Hilton 2013). It includes the privacy details of the individuals. Therefore, it will be a crime if any employer will use such programming to detect passwords.

The maintenance of the confidentiality and the privacy is the major concern for an employer. The information of the employees is needed to be kept safe. If any of the employers need to monitor the performance of the employees, the maintenance of the ethics is much important. The investigation bureau needs to get the permission for using such technology. In addition, the proper justification is needed to be provided for using “sniffer” programming (Baltzan 2012). The misuse of some security program is crime and against the ethics. Hence, while monitoring the performance of the employees, it is required to adopt the ethical procedures. The eavesdropping is sometimes involving the internet “bug”, which secretly records the conversation (Von Solms and Van Niekerk 2013). It helps the government to enable the recording system without revealing the presence of other existing listening devices. If the government and the Federal Bureau of Investigation suspect any criminal, they can use these technologies. However, these are absolutely prohibited for the ordinary people, as this includes the internet security breaches.

The cyber crime is one of the major concerns in this current world. The advancements of the technologies have become the most desirable trends in this modernised world (Quinn 2014). Internet sometimes consist the personal and confidential data, which should not be revealed. The business personnel can investigate about any discrepancy that is taking place within the internal scenario of an organisation (Liu et al. 2015). Employees are the major responsibilities for an employer. However, if there is any discrepancy takes place, the business authority can consult the police or any other investigation bureau. The business  personnel does not have the authority to use such internet programming for hacking data and taking access to others’ personal system.

The above analysis is indicating that the employers should not use the “sniffer” programming to derive several sensitive documents or any confidential information. However, in presenting the hypothetical arguments, it can be inferred that the process is equally necessary (Sengar, Wang and Iranmanesh 2014). The government or the Federal Bureau of Investigation sometimes prevents the ferocious activities of the terrorists. They can receive information through such wiretapping and eavesdropping programs. However, it is still illegal in the world. In discussing the concerns of an employer, it is noted that data breaching is a serious crime. If any of the employees is following the unethical activities, which are against the employer, it will also be considered as a crime. In such cases, the employer can take the help of government or the investigation bureau to monitor the activity (Geary 2014). The proper authentication is necessary in such cases. The positive side of using such technologies is to utilize it for detecting the criminals with proper authentication from government.

The argument is considering that these technologies should not be used by an employer. There is an objection on this particular statement. When any of the employees are committing any crime, it is necessary to monitor the activities. Some of the employers are even using the biometric censors to keep the information safe. If the employer is sceptical about any employee, the first step should be keeping the information about the activities. Collecting the justified proofs is also much essential (Risen and Lichtblau 2013). The employers can even inform the police if they suspect anything wrong. The police administrative can take the right decision about using such technologies to detect the crime. Hence, the process is somewhat necessary in order to prevent crimes and detect the criminals. On the other hand, the process is even hampering the privacy concerns. Hence, it is completely unethical for an employer to detect the personal data of an employee for monitoring their activities.

Conclusion

The study is discussing the wiretapping and eavesdropping functionalities performed to detect any crime. The government and the FBI are using such functionalities to get access to others’ system for the investigation purposes. Even though the process is effective enough to detect the crime, the argument is concerning the security issues of the individual. Each of the individual has the right to keep the sensitive passwords and confidential data private. However, if any employer requires monitoring the activities of any employee, it should be done in an ethical way. The ‘sniffer’ programming allows an individual to get access to others’ system to detect any problem. However, it should not be utilized to get hold of any personal information. The investigation bureau receives the authentication from the government to snoop the information. If the allegations are strong and the evidences are available, the employers can consult the investigation bureau to take some actions. However, it is unethical to use the “sniffer” programming by an employer to grab the sensitive password.  If it is used for maintaining the national security, it will be considered as the justified technique. However, security breaching is a crime and the employers need to be much concerned about the ethical manner before taking any decision regarding the use of such technology.

References

Baltzan, P., 2012. Business driven technology. McGraw-Hill/Irwin.

Freedman, R., 2013. Teaching Computer Ethics Via Current News Articles. In Innovations and Advances in Computer, Information, Systems Sciences, and Engineering (pp. 1193-1204). Springer New York.

Geary, K., 2014. Rights, Cameras, Action-Recording the Police: The Gap between Modern Technology and the Law, and Why the United States Should Not Follow the United Kingdom's Lead. Wis. Int'l LJ, 32, p.171.

Hsiao, D.K., Kerr, D.S. and Madnick, S.E., 2014. Computer security. Academic Press.

Onyancha, O.B., 2015. An informetrics view of the relationship between internet ethics, computer ethics and cyberethics. Library Hi Tech, 33(3), pp.387-408.

Quinn, M.J., 2014. Ethics for the information age. Pearson.

Risen, J. and Lichtblau, E., 2013. How the US uses technology to mine more data more quickly. The New York Times, 8.

Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees’ adherence to information security policies: An exploratory field study. Information & management, 51(2), pp.217-224.

Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. computers & security, 38, pp.97-102.

Cherdantseva, Y. and Hilton, J., 2013, September. A reference model of information assurance & security. In Availability, reliability and security (ares), 2013 eighth international conference on (pp. 546-555).

Sengar, H., Wang, H. and Iranmanesh, S.A., 2014, March. Wiretap-proof: What they hear is not what you speak, and what you speak they do not hear. In Proceedings of the 4th ACM conference on Data and application security and privacy (pp. 345-356). ACM.

Liu, C., Yang, N., Yuan, J. and Malaney, R., 2015, December. Secure transmission for relay wiretap channels in the presence of spatially random eavesdroppers. In 2015 IEEE Globecom Workshops (GC Wkshps) (pp. 1-7).

One of the finest academic solution providers in the UK, MyAssignmentHelp.co.uk, has introduced custom homework writing services that are specially designed to serve the specific requirements of various students. The experts at MyAssignmentHelp.co.uk are capable of handling all kinds of homework and provide the necessary homework help, no matter how complicated the topic is. We also guarantee on-time delivery of the order.

Why Student Prefer Us ?
Top quality papers

We do not compromise when it comes to maintaining high quality that our customers expect from us. Our quality assurance team keeps an eye on this matter.

100% affordable

We are the only company in UK which offers qualitative and custom assignment writing services at low prices. Our charges will not burn your pocket.

Timely delivery

We never delay to deliver the assignments. We are very particular about this. We assure that you will receive your paper on the promised date.

Round the clock support

We assure 24/7 live support. Our customer care executives remain always online. You can call us anytime. We will resolve your issues as early as possible.

Privacy guaranteed

We assure 100% confidentiality of all your personal details. We will not share your information. You can visit our privacy policy page for more details.

Upload your Assignment and improve Your Grade

Boost Grades