Week+8

__//**09/03/12**//__

Deep packet inspection is an advanced form of technology that allows Internet services providers, more commonly known as ISPs, to monitor the traffic of their clients’ Internet activities. These activities potentially include anything that a client does on the Web, such as sending emails, browsing, downloading files of any sort, etc.

What is distinctive about this technology is that it “studies” a user’s Internet habits. In other words, deep packet inspection monitors a user’s Internet habits. In Canada and the United states, network providers use this technology to monitor questionable behavior on the Web. For example, a British man was denied entry into the United States because it was discovered that he sent out a Tweet on twitter that stated he wanted to “destroy America.”

As with every form of technology, deep packet inspection has its pros and cons. Among the positive benefits of this technology is that it highlights suspicious activities on the Internet. The Web is a space that almost has no boundaries; somebody somewhere is bound to be engaging in something that is illegal or dangerous. In addition, this technology studies users’ Internet patterns and provides search results according to those users’ preferences. As a result, users will have access to Internet resources that suit their preferences.

On the other hand, there has been much argument that this practice is the Internet parallel for telephone wiretapping. Moreover, many people believe that this practice limits people’s privacy. Essentially, deep packet inspection allows network providers to keep a close eye on users' Facebook and Twitter accounts, emails, and credit card transactions. Such activities often contain personal information. Why should Rogers or Bell have a hold of their customers’ Internet habits?

In my opinion, deep packet inspection is not the intimidating threat that many people consider it to be. If you are not doing anything wrong, then why should you be worried? I believe that those who are not engaging in wrongdoing have no reason to object to this technology. However, it is important to note that many policies do not mention the presence of a third party that serves to monitor Internet activity. As users, we agree to the terms of use in a way that is similar to entering an agreement with someone else. As a result, we have the right to know anything and everything that is involved with the terms that we agree to.