Skip to content

E-Corruption … “who controls the controller?”

by Pierluigi Paganini on November 27th, 2011

The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and USA.

The crucial point is the legality of these actions conducted  by Intelligence Agencies in the name of Nations Security abusing the rights of citizens.  To this we must consider another  significant issue , the corruption.  Corruption has no Country and is a cross problem widely diffused.

The dilemma is always the same … “who controls the controller?” Obvious who manage massive e-surveillance systems has a vantage point to gather confidential information and therefore make for a powerful private interests.

Even more dangerous is the phenomenon of corruption, enslaved to the power that can give rise to  intestine current  whose sole purpose is to destabilize the current political Government. Approaching the problem more in detail, we have on the one hand impeccable initiatives undertaken for reasons of National Security , on the other hand there is a pervasive phenomenon of  the human weakness to the money.  During this days in Italy for example we are fighting with a corruption case that involve the Finmeccanica Firm, one of the top euro defense provider.

Lets give a look to corruption perception report and related map.



It’s clear that all those States that are investing in e-Surveillance systems are the same governments that suffers majors corruptions problems. I believe that the combination of this two factors is dangerous at least like the phenomenon you want to fight, the cyber threat. Here you are some sample of monitoring system deployed in Country with high level of corruption:



Corruption is a phenomenon that exposes the internal organizations and governments to threats that are really difficult to detect.

…. All this projects are intended to strengthen the e-surveillance capabilities of the government without any constitutional safeguards.

Indian Government for example has forced  telecom and internet service providers (ISPs) to install monitoring equipment for surveillance of internet traffic.

Recently, the United Nations declared “Right to Access” to Internet as Human Right. This would have a positive impact upon many Human Rights in Cyberspace. For instance, Right to Speech and Expression, Right to Privacy, Right to Know, etc cannot be violated by any CMS Project. United Nations must expand Human Rights Protection to many more issues considering anyone of this violations.

It has no sense to promote human freedom closing the eyes on corruptions events, on the direct correlation that there is between corruption and policy to implement detailed traffic filtering.

Let me conclude with the hope that all the Governments that have introduced monitoring  systems are confident about their actual usage and that they will fight corruption in the same way they have declared war to any cyber threat.

Pierluigi Paganini


Other References

  1. Very great visual appeal on this website, I’d value it 10.

  2. Nice article. If we analyse this article in the light of your other article on cyber censorship it makes a wonderful read. Keep on contributing good stuff.

    • paganinip permalink

      Thank you … it is a pleasure to read your comments
      have a nice day and thanks again

  3. Anonymous permalink

    I agree with most of your points, but a few need to be discussed further, I will hold a small talk with my partners and maybe I will look for you some suggestion soon.

  4. Anonymous permalink

    I really enjoy reading on this internet site , it holds superb content . “A man of genius has been seldom ruined but by himself.” by Samuel Johnson.

  5. Anonymous permalink

    I wanted to thank you once more for this amazing web page you have designed here. It truly is full of useful tips for those who are actually interested in this particular subject, in particular this very post. You’re really all absolutely sweet as well as thoughtful of others as well as reading your site posts is a superb delight in my opinion. And what generous treat! Tom and I will certainly have pleasure making use of your tips in what we should do in a few weeks. Our listing is a distance long and simply put tips might be put to great use.

  6. I want to say – thank you for this!

  7. I merely wanted to thank you once again for that amazing web-site you have produced here. It truly is full of ideas for those who are genuinely interested in this particular subject, specifically this very post. You’re really all absolutely sweet as well as thoughtful of others as well as reading the blog posts is an excellent delight in my experience. And exactly what a generous reward! Dan and I are going to have excitement making use of your recommendations in what we must do in a few days. Our listing is a mile long which means that your tips will definitely be put to excellent use.

  8. The imminence of a ratings decision by S&P may explain why France has sought to deflect attention by lashing out against Britain, claiming the UK’s financial position is weaker than its own. Last week the Bank of France suggested the credit rating agencies train their fire on London, even though there seems no imminent danger of Britain losing its premier rating.

  9. Very nice post. I just stumbled upon your blog and wanted to say that I’ve really enjoyed surfing around your blog posts. After all I’ll be subscribing to your feed and I hope you write again very soon!

  10. Thanks for the writeup. I definitely agree with what you are saying. I have been talking about this subject a lot lately with my father so hopefully this will get him to see my point of view. Fingers crossed!

Trackbacks & Pingbacks

  1. The utopian privacy | Security Affairs
  2. A Distributed Satellite Ground Station Network for internet freedom | Security Affairs
  3. A Distributed Satellite Ground Station Network for internet freedom … | The Freedom Clock
  4. Social Media, exercise or not exercise the control | Security Affairs
  5. #opJapan, Anonymous against Japan and its war to piracy | Security Affairs
  6. Anety
  7. Lupita Crivaro

Leave a Reply

You must be logged in to post a comment.