Many of the videos that were filmed in the offices of companies and public and private institutions around the world, in the early nineties of the last century AD, carried scenes that were not without funny situations in our neighborhood, and sometimes embarrassing for employees and users trying to adapt to the newcomer to their offices, which has been known since At that time, not many people knew, perhaps, that this newcomer carried in his gut an invention and a wondrous electronic system that would later be known as the International Information Network, or the World Wide Web, known by its English acronym “The Internet” “It is what will change in the future, and it has done, the nature and methods of human dealing with issues of research, access, or collecting, receiving and sending information, documents and data in various fields of knowledge, walks of life, and even personal messages and opinions, gathering all of this in the crucible of its unlimited world. The actual and real emergence of the Internet, which was characterized in its first twenty years by secrecy and limited circulation, at the height of the Cold War between the United States of America and the former Soviet Union, at the end of The sixties and the beginning of the seventies of the last century AD, as one of the most important reflections of the development of computers (computers) in that period. Since then the Internet has continued and developed as a secret US Department of Defense program to ensure the transmission and protection of information in wartime. With the collapse of the Soviet Union and the end of the Cold War at the beginning of the nineties, there was no longer a need to maintain secrecy on the Internet, and the United States saw that time and developments on the international scene allowed to bring this great and advanced scientific and technical achievement to the public, to benefit from it in a way that A different one that had apparently been planned long ago. Apart from the depth of statistics, numbers and data, which confirm the development and escalation of the vital importance of the Internet in contemporary life, it is logical to say that the new generations that were born with the beginning of the spread of the Internet for open use worldwide in the early nineties of the last century, have become It is difficult for her to imagine the separation of her life course and her daily habits from interacting and communicating with the Internet with all the services and systems that this network provides and provides. It was a dream for the generations that preceded it. Practically the owners and creators of this highly advanced technology succeeded in launching an unusual product, which automatically transformed with the development of its capabilities and diversity. Its contents and services have led to a real addiction to consumers across the world, and an indispensable necessity in contemporary life. The level of “espionage” on them is almost closely monitored.
Although this matter is no longer a secret, however, many Internet users ignore this fact because they believe that the nature of their search, access, blogging, receiving and sending activities on the network does not pose a threat to them, and they are not supposed to be classified in “dangerous or suspicious” lists according to the standards of those in charge. on data collection and monitoring. Practically it is conceivable that the beneficiaries of information, intelligence and research from ordinary people's use of the Internet classify users into different categories, the members of each of which are determined according to the nature of one's use of the network. In the least bad possibility, the nature and content of the websites that the average user browses and visits regularly, as well as the content of his communications and messages that he exchanges with others through the free e-mail service, or instant chat applications, and his views and political and social positions, which he writes down on one From social media, and draw out what is remarkable about it, or compare it, for example, with the activities and comments of other users belonging to the same social, cultural and geographical environment, to come up with a perception of the moods, trends and tendencies of people and society, towards specific topics such as politics and religion, in addition to the social and living issues raised This is what research and study institutions benefit from, whether independent or related to intelligence institutions and agencies. Social networking sites and voice and video communication applications and text messages play a pivotal role in securing all this information about users by attracting them to them through the free service they offer them, and it is remarkable that these applications and sites inform the user in the usage agreement that they have the right to see their private data, Their locations and the content they view or record on its platform, to ensure that it does not conflict with its policies, but on the other hand, it never talks about what has become known and circulated through leaks of facts and abuses that it has proven to have committed, such as “selling it” or “transferring everything it knows about Users and their activities on their platforms, to hidden parties, whether for commercial or intelligence purposes. Some people tend to believe that the profits and revenues announced by the largest platforms and applications of social media and free instant communications, are exaggerated and aim to give the impression that they are institutions and companies that ultimately aim for profit, in When its work and its real goal lies in collecting an incredible amount of information of different quality and importance, and placing it at the disposal of those who are interested in obtaining it to analyze it and extract what interests them from it. According to this view, it is not possible at all to exclude the hypothesis that these platforms themselves, which are nothing but interfaces for institutions and security devices, saw the Internet, with its services, applications, and other vital service devices branching from it, such as mobile devices, GPS devices, and directions, as a place or trap that is perfectly suitable for carrying out work and achieve its goals. From here, it is not possible to understand the uproar made by some about the new terms of use, which the “WhatsApp” application for instant communication between users announced its intention to impose soon, which includes the user’s consent to transfer his data and activities, and even what information is available about his commercial transactions to the social networking platform. Facebook, as long as the reality indicates that a person’s mere connection to the Internet puts him practically under control, even if he is not personally targeted by it, and this means that all other applications and sites that are rumored to be distinguished by protecting user privacy and data, cannot practically fulfill their commitments to Completely, as long as it uses the Internet to reach hundreds of millions of its users around the world, and it cannot even make profits and incomes through which it can finance its operating costs and its survival in a market characterized by intense competition, without selling or leaking its users’ data in one way or another. On questioning the secrecy of what is known as the “dark or deep Internet”, which is the bulk of the real content of the Internet, whose sites and the content available in it can only be accessed through search engines. Especially providing privacy and confidentiality for the user, and also for the sites and platforms themselves on it, and the source of doubt lies in the users’ ignorance of the dark side of the Internet about the real parties that run the search engines they rely on to access the “dark net” world, or those that allow the creation of sites and databases in it, which are known Certainly the true identity of users, whether they are ordinary surfers or owners of sites and platforms who seek to hide their true identities. In Arabic, something hated but inevitable is sometimes referred to by the phrase “a necessary evil,” and this phrase applies in our days to the Internet, the great incubator of what is feared Some programs, applications, and websites complain or suspect that they are spying on him. While the rest of the users accept dealing with this “necessary evil” reassured and based on what they consider “normal and legitimate” their uses and activities on the network. Palestinian writer