Cloud Computing: Invasion of Privacy – Part 2
Every once in a while an opportunity for greater control of the masses will emerge. The West’s war-on-terror will have focused governments’ attention around the globe. Their security and intelligence services will have been tasked to seek better and faster ways of monitoring dissent and those who might perpetrate a terrorist act. Cloud computing is a one-time opportunity to consolidate both political and commercial power by centralising the capture of personal information and extending its scope by making it more efficient.
Lost in the Mesh
Until recently, the adoption of personal computers has been highly egalitarian and, when connected to the internet, has resulted in a myriad of communications. This culture of equality and freedom has been provided predominantly by an unsung hero of the internet, the DNS server. These servers are widely distributed around the internet and are responsible for translating the tens of millions of personal and business domain names. The resultant mesh of communications between computers on the internet is a logistical nightmare for the intelligence community because so many points on the internet must be intercepted and monitored; practicalities limit the scope on any surveillance.
To learn more and to read the entire article at its source, please refer to the following page, Cloud Computing : Part 2 : Invasion Of Privacy :: Sanders Research Associates Ltd.