Electronic communication interception technologies and issues of power
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
London, England ; Hoboken, NJ :
ISTE Ltd
[2023]
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811327506719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Introduction
- Chapter 1. History and Repertoire of Communication Interception Practices
- 1.1. Military interceptions during the war
- 1.1.1. The interception of telegraphic communications
- 1.1.2. The interception of radio communications
- 1.1.3. Telephone interception
- 1.1.4. The use of SIGINT capabilities
- 1.1.5. Wartime interceptions in cyberspace
- 1.1.6. Drones and interceptions
- 1.2. The interception of international communications: espionage, surveillance, war
- 1.2.1. The interception of telegrams
- 1.2.2. Espionage during the Cold War: satellite, radio, telephone interceptions
- 1.2.3. The interception of international communications: the Echelon program
- 1.2.4. Bulk cyber surveillance
- 1.2.5. Foreign companies in national telecommunication infrastructures
- 1.2.6. Actions over undersea Internet cables
- 1.2.7. Interceptions in planes and airports
- 1.2.8. International interceptions as a product of secret alliances
- 1.3. Interception of diplomatic correspondence
- 1.4. Political surveillance: targeted and bulk interceptions
- 1.4.1. Interception of correspondence
- 1.4.2. Bulk domestic surveillance in East Germany
- 1.4.3. Cyber surveillance in Russia: the SORM system
- 1.4.4. Fixed and mobile telephone tapping
- 1.4.5. The interception of electronic communications in the political sphere
- 1.5. Criminal interceptions
- 1.6. Police, justice: the fight against crime, lawful interceptions
- 1.7. On the usefulness and effectiveness of interceptions
- Chapter 2. The Central Issue of Encryption
- 2.1. The capabilities required for interceptions
- 2.1.1. Material, technological capabilities
- 2.1.2. Human resources
- 2.2. Protecting yourself against the threat of interceptions: encryption
- 2.2.1. The public key revolution.
- 2.2.2. Advances in factorization
- 2.2.3. Shor's quantum algorithm
- 2.2.4. The evolution of computing capabilities
- 2.2.5. The evolution of etching precision
- 2.3. Attacking encrypted communications, circumventing the hurdle of encryption
- 2.3.1. Interceptions on encrypted messaging
- 2.3.2. The attacks against keys and PKIs
- 2.3.3. The use of backdoors
- Chapter 3. Power Struggles
- 3.1. State pressure on the industry: cooperation or coercion logics?
- 3.2. The accounts of whistleblowers and their analyses of the balance of power between the state, the citizen and companies
- 3.2.1. The account of Herbert O. Yardley
- 3.2.2. The account of Perry Fellwock (also known as Winslow Peck)
- 3.2.3. The account of Mark Klein
- 3.2.4. The account of James Bamford
- 3.2.5. The account of Babak Pasdar
- 3.2.6. The account of Joseph Nacchio
- 3.2.7. The account of Edward Snowden
- 3.2.8. The account of Julian Assange
- 3.3. Limits imposed on the state's power to control technology
- 3.3.1. The difficult and fragile international regulation of technologies
- 3.3.2. Illicit markets and the circumvention of laws
- 3.4. Trust
- 3.4.1. How much confidence in encryption?
- 3.4.2. The acceleration of calculations as a factor of confidence
- 3.4.3. Abandoning secret methods
- 3.4.4. Provable security
- 3.4.5. The worlds of Impagliazzo
- 3.4.6. The contribution of quantum computing
- 3.5. Conclusion
- 3.5.1. Technologies
- 3.5.2. Actors
- 3.5.3. Interactions or relationships
- Appendices
- References
- Index
- EULA.