Tuesday, 3 January 2012

Civil Rights

There has been many debate about the impact of ICT in today’s society, civil rights has been infringe in many different ways since the development of ICT. Giving individual to receive equal treatment is not always possible or can be quite difficult; many surveillance cameras are now around the street, phone hacking and computer hacking are also very popular in today’s society. With more data and more technologies it means it’s more likely that rights to privacy and civil rights are compromised. These are examples on how civil rights are being infringed and due to all of these; certain laws are created to protect individual and give them the freedom they should have. Government exchanges data and people worried about their personal data not being accurate or being shown to public. Computer makes copying and collecting data more sufficient and very convenient

Examples of how ICT may/can breach civil rights
Surveillance Cameras- having surveillance cameras is not illegal but how you use the video in the surveillance camera sometimes may breech civil right. Putting the video online or broadcasting it to everyone may be considered as illegal.

Phone hacking- is illegally listening to the voicemails or conversation of a mobile phone without the consent of the phone’s owner. Mobile phone hacking can also mean intercepting mobile calls to listen, taking control of the phone to receive copies of text messages etc. 
Phone hacking has been all over the news this recent years and the biggest talk is the News of the world. This is an article: http://www.bbc.co.uk/news/uk-16265505

The Internet

How Internet-related civil rights covered by current law?

The UN Universal Declaration of Human Rights and the ECHR both contain articles relating to freedom of thought, expression and association. The ECHR also contains an article relating to the right to private life and private correspondence. Article 19 of the UN Universal Declaration of Human Rights states:
Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers

Is there an alternative model for Internet rights?

Many governments have promoted rights for electronic commerce and strengthened intellectual property rights, but few have done parallel work to represent the interests of the general public. They believe that the new digital media, there has been no specific move to protect rights to access and use information and communications technologies.
The Association for Progressive Communications has been developing a Charter for Internet Rights as part of its work on Internet rights. It sets out seven key themes:
  • The right to communicate 
  • Freedom of expression and information exchange 
  • Diversity of content, ownership and control, and the protection of user rights 
  • The licensing and control of intellectual property 
  • Privacy 
  • Global, regional and national governance of the Internet 
  • Rights awareness and realisation of rights 

Data Protection Act 1998
Data protection act 1998 covers how information about a person is used and stored. This act is a UK law on processing data on identifiable living people. It requires protecting people’s fundamental rights and freedoms to the processing of their personal data. It provides a way for individual to control information about themselves and anyone holding personal data for other purpose is legally obliged to comply with this Act.

This act covers 8 data protection principles:
  • Personal data shall be obtained only for lawful purposes 
  • Personal data shall not be transferred to a country without adequate protection 
  • Personal data shall be processed fairly and lawfully 
  • Personal data shall always be accurate and up to date 
  • Personal data shall be adequate, relevant and not excessive and other data needed may be used 
  • Personal data shall not be kept for longer than necessary for that purpose or purposes 
  • Rights of individuals, you should have the right to have data about you removed 
  • Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data 
Computer Misuse act

Computer Misuse act is an act of the UK Parliament in 1990. It’s design to stop computer/internet crimes as hacking into other people’s computer or system, helping a person to gain access to protected files on someone else’s computer.

It’s split into sections
  • Accessing computer material without permission with intent to commit further criminal offences. EG hacking into bank’s computer and wanting to put more money into your account 
  • Changing or altering computer data without permission. EG writing a virus to someone else’s data 
There are many different types of computer misuse; they all come in several forms. The most popular or known one is hacking. Hacking is where an unauthorised person uses a network to gain access past security password to see data stored on computer, hackers sometimes use a software hacking tools and target particular sites on the internet. Another well know one is viruses. Viruses are generally simple programs written by people, its main purpose is to damage computers or files. Unauthorised transfer or copying is another type of computer misuses. Illegal transfer of data is very easy and quick thing to do but personal data cannot be copied without the copyright holder’s permission and if someone does copy it then it’s breaking the computer misuse law. Furthermore, email and chat room abuses can also be classified as computer misuse. Internet services such as chat rooms and email have been the subject of many well publicised cases of impersonation where people who are online pretend to have a different identity. Chat rooms have also been used to spread rumours about certain people but the biggest and well known one is email spam, where millions of emails are sent to advertise both legal and illegal products and services. Lastly, copying or distributing copyrighted music, software and films are also illegal. Copying music or movies using computer then distributing it on the internet without the copyright holder’s permission is the main and commonly issue, this breaks the copyright regulations.

How can you or how to prevent computer misuse?
  • Closing down chat rooms 
  • Some chat rooms have moderators who help to prevent abuses 
  • Reduce email spamming 
  • Never reply to anonymous emails 
  • Setting filters on your email account 
  • Reporting spammers 
  • Security 
  • Keeping their data safe with “backups” and sufficient security with passwords

Crime Prevention

Preventing crime by using ICT very common in today’s society, ICT had a tremendous affect on the way we live today. The information age has changed crime and how it can be prevented massively. Police stations now that their own websites and computers, this makes it easier for citizens to contact them and interact with them. Police has seen the ICT can be use to their advantage and therefore started to use it wisely. They now use different technologies available around them to make their jobs easier and more effective, it makes it quicker for them to prevent crimes and catch criminals. The development ICT created more crimes available; today they are now electronic hacking or robbing bank electronically, emails and internet frauds and variety of viruses. Crime has now become global due to the information age. With new crimes occurring the government had to make changes and make new laws to prevent these types of crimes.

Technologies used

Have you ever watched CSI and wondered, wow how did they solved this crime? Well obviously, CSI is not real and some technologies they use is not really as well but wouldn’t it wonderful if we actually have all of those technologies? There is nothing to worry about; police in today’s society have number of technologies to give them an extra hand.

Every police station will now have computers available. This is where they will be processing and storing all of data collected from the criminals and other offenders; they could also use computers to get more data or details about a person, furthermore they could write reports and store reports which make it more organised instead of having written reports that you could lose easily. Computers have now become a vital part of police stations; it is their main storage of information. It is also now possible to report minor crimes over the Internet, this give the person who reported the crime a feeling of secure and safety.

Programmes that can be stored or downloaded in computers are also being use in police stations. Holmes2 is a computer programme created to help keep vital evidences and it also reduces paperwork. Furthermore it can easily identify a missing person if given the right descriptions, it will then match automatically. If a match is found or confirmed, the police can then easily contact relatives. This show how new technologies can make police’s job more sufficient and quicker. Police also uses the internet to communicate with each other; an example is the Criminal Justice extranet. It’s a network that allows police and other organisations to communicate and share documents securely and safely.

Before, computers were not available at all or it wasn’t as developed which means that polices have to write their reports and keep it in their stations, this is hard and long work. Additionally, this means that losing reports is easy which could lead to more problems and more work.

Digital radio is probably the most common technology or most well known technology that police uses. But they have now updated it and digital radios now has encrypted transmission to allow officers to communicate securely, this means no hacking and the sound is very clear to hear.

Identifying a person, criminal or victim was difficult back then; there were no technologies available to help. The technologies available today has immensely changed therefore it means that identifying a person is much quicker. One type of technology that is used today is biometrics. It easily identifies people using physical using physical characteristics such as fingerprints. Biometrics works by recognizing patterns that are unique to individual. Biometrics is used to identify fingerprints, each one of have different finger prints or patterns on our fingers. Usually, fingerprints were taken by covering fingertips with ink and pressing it down on paper, but now fingerprints can be scanned electronically. This means that the image that is collected can be visually seen easily and clearly, the computers will then be used to match the prints against other fingerprints in their database. Fingerprints have been used to identify people for a long time. Polices are also beginning to use palm prints in addition to fingerprints.

DNA Analysis is another one that has become important for identifying both criminals and victims. Each every one of us has unique DNA apart from identical twins, sample of DNA sample like body fluid, tissue or hair that is found in a crime scene can be use to compare with other criminals or other suspects

CCTV cameras are now also can be use to identity a person especially if it’s used with facial recognition system, with many CCTV cameras around there is no way a criminal would get away easily without being seen.

Automatic Number Plate Recognition is also new technology that helps police. Its cameras can tell the police within seconds whether a vehicle has been stolen or is known to be involved in crime or if it doesn’t have tax etc. Instead of contacting back to the police station to ask if a car is stolen the police will use ANPR to detect it, they can then easily and quickly react and catch the car.

In the future, many more technologies will develop and grow. All criminals or bad people should be scared by this thought and I’m pretty sure that sooner or later indentifying criminals or even arresting them will be done with no hassle at all.

This is an article discussing on how we can protect children, they were talking about how we can use technology to help and lower the risk of children being killed, raped etc.

Police National Computer (PNC)

PNC is a computer system used by law enforcement organisations all over UK. PNC provides and allows quick and accurate research that includes ANPR, the PNC scans thousands of number plates alerting police to any that are needed to be caught. Vehicle online descriptive search or VODS, it allows users to search the vehicles database such as post code, registration etc. there are many more that PNC could do.

PNC is still and continually improving or upgrading making sure that development is what police needs or required. One of the most recent introductions has included the National Firearms register and mobile data checking.

There are many benefits of using PNC:
  • Can be accessed 24/7 
  • Allows sharing of information through a secure network 
  • Quick, efficient tool for investigating crimes 
New crimes are developed due to the changed in technologies and the development of ICT. These crimes include cyber crime, phishing, hacking, viruses etc. With new crimes occurring, new laws are introduced to intervened and stop these crimes.

Cyber crimes

Phishing- this is probably one of the common cyber crimes at the moment. Phishing is an e-mail fraud in which the scammers sends out a legitimate looking email in an attempt to gather personal and financial information from recipients. Phishing e-mail messages, website and phone calls are all designed to steal money but you can detect phishing by looking for spelling mistake and bad grammar, if the email is threatening you etc.

Computer Hacking- this is probably the most popular form of hacking in today’s society but hacking also has many other forms, such as phone hacking. Computer hacking is the process in which where someone gains or try to gain access to a computer system without the owner’s permission.

Spam- the voluntary sending of emails that is illegal or unlawful in some areas in an attempt to force the message on people who would not choose to receive it. Most spam is commercial advertising; there are 2 types of spam, the email spam which targets individual users with direct mail messages and the Usenet spam which targets or aimed at "lurkers", people who read newsgroups but rarely or never post and give their address away.

Fraud- is the deliberate act of deception intended for personal gain or to cause other person damages. There are many different forms of fraud, some may be facilitated by using computer systems this include bank fraud, identity theft, extortion and theft of classified information.

Laws to stop cyber crimes

Computer Misuse act

Computer Misuse act is an act of the UK Parliament in 1990. It’s design to stop computer/internet crimes as hacking into other people’s computer or system, helping a person to gain access to protected files on someone else’s computer.

It’s split into sections
  • Accessing computer material without permission with intent to commit further criminal offences. EG hacking into bank’s computer and wanting to put more money into your account 
  • Changing or altering computer data without permission. EG writing a virus to someone else’s data 
Data Protection Act 1998

This act covers 8 data protection principles:
  • Personal data shall be obtained only for lawful purposes 
  • Personal data shall not be transferred to a country without adequate protection 
  • Personal data shall be processed fairly and lawfully 
  • Personal data shall always be accurate and up to date 
  • Personal data shall be adequate, relevant and not excessive and other data needed may be used 
  • Personal data shall not be kept for longer than necessary for that purpose or purposes 
  • Rights of individuals, you should have the right to have data about you removed 
  • Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data