​The Internet; our first ‘cyber Orwellian State’

The news that the Chinese government is toying with the idea of setting up ‘network security’ offices in some of China’s major internet companies may strike a somewhat Orwellian chord with some. The intention is to move quickly against potential illegal online behaviour, according to the Ministry of Public Security.

This somewhat encroaching plan is all in the name of cyber security, but at what point are the liberties of the Chinese overshadowed by an always watching’ Big Brother? And what parallels can be drawn when looking outward from China toward the rest of the world’s ever more restrictive internet regulations and policing?

Those most up in arms about government tactics to monitor and compromise the privacy of service providers’ users can draw strong parallels with the NSA’s appropriately titled ‘Fairview’ program.

Recently, a report published by the New York Times detailed evidence that the NSA was working in tandem with one of the USA’s largest carriers, AT&T, to spy on the United Nations office in New York City. The report outlined the ways in which the NSA infiltrated the UN building in conjunction with the supplier to monitor the video conferencing systems, tap phone lines and reportedly, read emails.

It is easy to condemn when attacks on the liberties of others are occurring in plain sight, such as the aforementioned Chinese initiative. However, as soon as you shift the blame, it is much harder to point fingers, a line reminiscent of the ‘Fairview’ program.

Two nations, who could not be further from each other in terms of their modern political and ideological history are starting to enforce very similar tactics, but with both shadowing past political ideals to enforce these regimes. China, a conservative and foreshadowed to be an ex-communist nation, enlists tactics that fall in line with previous governments; the people will be surveyed, and they will know about it, for fear of reprimand, thus keeping the nation in check. The United States, on the other hand, is employing exactly the same strategies, but with such resounding secrecy that half of the time, the nation doesn’t even know that surveillance is taking place. Both countries are employing exactly the same tactic but only one nation really knows it’s happening. The question is, which approach is right, if either?

The answer, unfortunately, is never cut and dry. While the likes of the deep web and even mainstream internet sites that contain explicitly illegal content is on the rise, the reality is that policing is very necessary. The real question is, when does it go too far? When do the people charged with policing become the oppressors? The internet, as all tools, can be used in a variety of different ways, for so much good, but also to harbour the bad. It is the opinion of many that the time where we will see the internet ruled with an iron fist is approaching. Who knows, maybe it’s already here and the NSA just hasn’t told us yet.

Blast from the past?

Try our new Space Invaders inspired video game NOW.

What score can you get ?

Join the CSO newsletter!

Error: Please check your email address.

Tags ‘cyber Orwellian StateChinesenew york timesgovernmentinternetCSO Australiacyber security

More about AT&TNSAUnited Nations

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Thomas Booth

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place