The Defense Department continues to discuss how to improve their cyber defense technology. Pentagon is related to the implications of a weak cyber system that can be exposed to cyber threats from American enemies. DOD wants greater cooperation with industry and the government in protecting Cyberspace A.S. Pentagon and DOD will meet with large time internet companies like Google and Intel to find out the best strategies to expand in the cyber industry and overcome the main problems. Defense leaders know the importance of expansion to the private sector for assistance in implementing cyber security and finding effective policies to regulate the area.
There will be a big impact on individual freedom even though the government maintains supervision in the cyber system. Many privacy problems will occur such as access to information. The government will have access to individual preferences such as credit card numbers, airlines, hotels, or restaurant reservations. They will know website public visits and more. But the main benefit for the public will be a more effective tactic to eliminate crime and enforce the law.
There are many examples of how oversight technology has been used. Special Air Force Investigation Unit and police forces use this technology to track and investigate crime. They use many types of systems combined with cyber space technology such as visual, audio-visual, computer, and surveillance tracking. This type of supervision is seen in many communities such as shops and public transportation. Many companies use it and have increased by the company to utilize supervision technology in vehicles, service tags, humans, and to track objects. This type of supervision becomes obsolete because people become more and more proficient on computer systems.
Foreign countries such as China rely on cyber supervision technology to tighten internet use. They constantly utilize web sensors and block major private networks such as Facebook, MySpace and Twitter. Government officials routinely monitor their individual and internet behavior. The police argue that their criminal investigations work more efficiently because they can use Interne to control extortion, gambling, and stop the spread of viruses and important computer information.
The negative side of cyber supervision is to be used to monitor people and come into contact with legal issues. Managers can use cyber technology to monitor employees. The supervisor will be able to spy on the purpose intended. New contracts must be implemented for approval. There are other concerns with cyber technology such as ethical and social problems.