Security and Privacy in a Networked World/Cyberwars: erinevus redaktsioonide vahel
WikiHaldur (arutelu | kaastöö) |
WikiHaldur (arutelu | kaastöö) |
||
13. rida: | 13. rida: | ||
While military cryptography can be traced back to the antiquity (e.g. [https://en.wikipedia.org/wiki/Scytale scytale], the connection with IT was probably first made with [https://en.wikipedia.org/wiki/Enigma_machine the Enigma machines] - as many chapters of early history of computers, e.g. the work of [https://en.wikipedia.org/wiki/Alan_Turing Alan Turing] as well as one of the pretenders to the title of the first modern computer, [https://en.wikipedia.org/wiki/Colossus_computer Colossus], were linked to them. | While military cryptography can be traced back to the antiquity (e.g. [https://en.wikipedia.org/wiki/Scytale scytale], the connection with IT was probably first made with [https://en.wikipedia.org/wiki/Enigma_machine the Enigma machines] - as many chapters of early history of computers, e.g. the work of [https://en.wikipedia.org/wiki/Alan_Turing Alan Turing] as well as one of the pretenders to the title of the first modern computer, [https://en.wikipedia.org/wiki/Colossus_computer Colossus], were linked to them. | ||
The recent scandal of NSA surveillance has its roots in the [https://en.wikipedia.org/wiki/Quadripartite_Agreement_%281947%29 Quadripartite Agreement] (UKUSA) of 1947 and the development of ECHELON in the 1960s. Earlier, a kind of unspoken rule had dictated avoidance of spying after a country's own subjects - the UKUSA found an elegant bypass in mutual surveillance and subsequent exchange of collected information. | |||
== Additional reading and links == | == Additional reading and links == |
Redaktsioon: 14. aprill 2014, kell 08:58
The Online Battlefield
Using IT in military context today involves various applications, for example
- propaganda and information warfare (including controlling the public on both sides of the 'front')
- cryptography
- communication interception (cyberespionage)
- communication disruption and sabotage (cyberattacks on infrastructure using e.g. DDOS)
Cryptography has a history that spans far before the Internet age. So does propaganda, albeit the information warfare has gained many new measures with the advent of social media (as exemplified by "Facebook revolutions" worldwide). Cyberespionage has its predecessors in various technologies of the mid-20th century. While communication disruption and sabotage have some ancestors in the pre-IT era, its true potency has only been realized recently - the first widely published case was likely Stuxnet. However, current threat analyses point out actual attack vectors towards critical infrastructure, e.g. the power grid (the central website of the US Office of Electricity Delivery and Energy reliability, energy.gov, has an extensive section on cybersecurity).
Looking back
While military cryptography can be traced back to the antiquity (e.g. scytale, the connection with IT was probably first made with the Enigma machines - as many chapters of early history of computers, e.g. the work of Alan Turing as well as one of the pretenders to the title of the first modern computer, Colossus, were linked to them.
The recent scandal of NSA surveillance has its roots in the Quadripartite Agreement (UKUSA) of 1947 and the development of ECHELON in the 1960s. Earlier, a kind of unspoken rule had dictated avoidance of spying after a country's own subjects - the UKUSA found an elegant bypass in mutual surveillance and subsequent exchange of collected information.
Additional reading and links
- BACARD, Andre. Remailer FAQ. http://www.andrebacard.com/remail.html
- BIDDLE, Peter, ENGLAND, Paul, PEINADO, Marcus, WILLMAN, Bryan. The Darknet and the Future of Content Distribution. http://msl1.mit.edu/ESD10/docs/darknet5.pdf
- DAVIES, Roger. What is Dark Internet, How to Access Onion Domains and Configure Hosting for the Dark Web http://www.rogerdavies.com/2011/06/dark-internet/
- CAMPBELL, Duncan. Inside Echelon. http://echelononline.free.fr/documents/dc/inside_echelon.htm
- DUNHAM, Roger C. Spy Sub: Top-Secret Mission to the Bottom of the Pacific.
- HAGER, Nicky. The Secret Power. http://www.nickyhager.info/secret-power-new-zealands-role-in-the-international-spy-network/
- HELMERS, Sabine. A Brief History of anon.penet.fi - The Legendary Anonymous Remailer http://www.december.com/cmc/mag/1997/sep/helmers.html
- RIJMENANTS, Dirk. Dirk's Weblog: Cipher Machines & Cryptology / Intelligence / Security. http://rijmenants.blogspot.com/
- SONTAG, Sherry, DREW, Christopher. Blind Man's Bluff: The Untold Story of American Submarine Espionage.
- WALTON, Greg. China's Golden Shield: Corporations and the Development of Surveillance Technology in the People's Republic of China. http://www.freerepublic.com/focus/fr/582542/posts
- The Enigma and the Bombe. http://www.ellsbury.com/enigmabombe.htm
- The Great Firewall of China. http://www.greatfirewallofchina.org/
- Invisible or Deep Web: What it is, how to find it, and its inherent ambiguity. http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/InvisibleWeb.html
- The Freenet Project Wiki. https://wiki.freenetproject.org/Main_Page
- The Tor Project. https://www.torproject.org/
- The Invisible Internet Project. http://geti2p.net/en/
- The Hidden Wiki. https://zqktlwi4fecvo6ri.onion.to/wiki/index.php/Main_Page
Also in Estonian:
- MÄGI, Harri, VITSUT, Lauri. Infosõda: visioonid ja tegelikkus. Eesti Ekspressi kirjastus 2008.