Security and Privacy in a Networked World/Cyberwars: erinevus redaktsioonide vahel

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti
21. rida: 21. rida:
* [https://en.wikipedia.org/wiki/Project_SHAMROCK Project Shamrock] - a large-scale interception of telegrams within the US in the 70s
* [https://en.wikipedia.org/wiki/Project_SHAMROCK Project Shamrock] - a large-scale interception of telegrams within the US in the 70s
* [https://en.wikipedia.org/wiki/Project_MINARET Project MINARET] - surveillance of electronic communications involving 'suspicious' persons in the US in the 70s
* [https://en.wikipedia.org/wiki/Project_MINARET Project MINARET] - surveillance of electronic communications involving 'suspicious' persons in the US in the 70s
* [https://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29 Stellar Wind] - a large-scale data mining and interception program targetting US citizens since about 2001 (sources disagree on whether it is still active)
* [https://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29 Stellar Wind] - a large-scale data mining and interception programme targetting US citizens since about 2001 (sources disagree on whether it is still active)
* [https://en.wikipedia.org/wiki/Turbulence_%28NSA%29 Turbulence] - a network traffic interception and cyber-warfare program of the NSA since about 2005
* [https://en.wikipedia.org/wiki/Turbulence_%28NSA%29 Turbulence] - a network traffic interception and cyber-warfare programme of the NSA since about 2005
* [https://en.wikipedia.org/wiki/DCSNet DCSNet] - an 'on-the-run' wiretapping system run by the FBI, reportedly capable to intercept most electronic channels in the US
* [https://en.wikipedia.org/wiki/DCSNet DCSNet] - an 'on-the-run' wiretapping system run by the FBI, reportedly capable to intercept most electronic channels in the US
* [https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29 PRISM] - a joint US/UK surveillance programme since 2007.


== Additional reading and links ==
== Additional reading and links ==

Redaktsioon: 14. aprill 2014, kell 09:47

The Online Battlefield

Using IT in military context today involves various applications, for example

  • propaganda and information warfare (including controlling the public on both sides of the 'front')
  • cryptography
  • communication interception (cyberespionage, both domestic and international)
  • communication disruption and sabotage (cyberattacks on infrastructure using e.g. DDOS)


Cryptography has a history that spans far before the Internet age. So does propaganda, albeit the information warfare has gained many new measures with the advent of social media (as exemplified by "Facebook revolutions" worldwide). Cyberespionage has its predecessors in various technologies of the mid-20th century. While communication disruption and sabotage have some ancestors in the pre-IT era, its true potency has only been realized recently - the first widely published case was likely Stuxnet. However, current threat analyses point out actual attack vectors towards critical infrastructure, e.g. the power grid (the central website of the US Office of Electricity Delivery and Energy reliability, energy.gov, has an extensive section on cybersecurity).

Looking back

While military cryptography can be traced back to the antiquity (e.g. scytale), the connection with IT was probably first made with the Enigma machines - as many chapters of early history of computers, e.g. the work of Alan Turing as well as one of the pretenders to the title of the first modern computer, Colossus, were linked to them.

In cyberespionage and surveillance, the recent scandal of NSA has its roots in the Quadripartite Agreement (UKUSA) of 1947 and the development of ECHELON in the 1960s. Earlier, a kind of unspoken rule had dictated avoidance of spying after a country's own subjects - the UKUSA found an elegant bypass in mutual surveillance and subsequent exchange of collected information. It also strived to cover the whole world by assigning areas of responsibility to every participating country (a version of the scheme can be found at http://cryptome.org/jya/echelon-bw.htm).

ECHELON was originally meant to intercept and collect information transferred over short wave radio, but went on to keep pace with evolving technology, gradually also covering telephone, fax, mobile phones and different channels of Internet communication.

Prominent examples of technological surveillance include

  • Project Shamrock - a large-scale interception of telegrams within the US in the 70s
  • Project MINARET - surveillance of electronic communications involving 'suspicious' persons in the US in the 70s
  • Stellar Wind - a large-scale data mining and interception programme targetting US citizens since about 2001 (sources disagree on whether it is still active)
  • Turbulence - a network traffic interception and cyber-warfare programme of the NSA since about 2005
  • DCSNet - an 'on-the-run' wiretapping system run by the FBI, reportedly capable to intercept most electronic channels in the US
  • PRISM - a joint US/UK surveillance programme since 2007.

Additional reading and links

Also in Estonian:

  • MÄGI, Harri, VITSUT, Lauri. Infosõda: visioonid ja tegelikkus. Eesti Ekspressi kirjastus 2008.