Surveillance Or Security? The Risks Posed by New Wiretapping Technologies

نویسنده

  • Susan Landau
چکیده

The United States has moved large portions of business and commerce, including the control of critical infrastructure, onto IP-based networks. This reliance on information systems leaves the U.S. highly exposed and vulnerable to cyberattack. Yet despite this, U.S. law enforcement and national security policy remain firmly focused on building wiretapping systems within communications infrastructure. These surveillance paradigms do not easily fit the new technologies of the Internet. By embedding eavesdropping mechanisms into communications technology itself, we are building tools that could easily be turned against us. Indeed, such attacks have already occurred. In a world that has Al-Qaeda, nation-state economic espionage, and Hurricane Katrina, how do we get communications security right?

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

National Security on the Line

INTRODUCTION................................................................................... 409 I. FEDERAL WIRETAPPING LAWS: A SHORT HISTORY............ 412 II. EXTENDING CALEA --WHAT DOES LAW ENFORCEMENT WANT? .......................................................... 418 III. HOW DOES NETWORK-SWITCHING TECHNOLOGY WORK?..........................................................................

متن کامل

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder or the like to a single pair of wires. By the 1990s, however, the changing structure of telecommunications—there was no longer just " Ma Bell " to talk to—and new technologies such as ISDN and cellular telephony made executing a wiretap more complicated for law enforcement. Simple technol...

متن کامل

Ambivalence in the (Private) Public Sphere: How Global Digital Activists Navigate Risk

This paper seeks to provide insight into how digital activists navigate the risks posed to them in online environments. I examine how a group of activists across ten different non-Western countries adapt and respond to threats posed by two types of powerful actors: not just the state, but also the technology companies that run the social media platforms on which many activists rely to conduct t...

متن کامل

IXmaps - Tracking your personal data through the NSA's warrantless wiretapping sites

The National Security Agency’s ‘warrantless wiretapping program’ is arguably one of the largest domestic surveillance operations in history. It also represents among the most serious contemporary challenges to democratic governance and civil liberties. This paper reports on the development of the IXmaps interactive mapping application designed to show internet users how their personal traffic m...

متن کامل

overview of ways to enhance the security of video surveillance networks using blockchain

In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of  (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Soc.

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2011