ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Redesigning Wiretapping: The Digitization of Communications Interception

دانلود کتاب طراحی مجدد استراق سمع: دیجیتالی کردن رهگیری ارتباطات

Redesigning Wiretapping: The Digitization of Communications Interception

مشخصات کتاب

Redesigning Wiretapping: The Digitization of Communications Interception

ویرایش:  
نویسندگان:   
سری: History of Information Security 
ISBN (شابک) : 9783030399184, 9783030399191 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 204 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 2 Mb 

قیمت کتاب (تومان) : 54,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 3


در صورت تبدیل فایل کتاب Redesigning Wiretapping: The Digitization of Communications Interception به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب طراحی مجدد استراق سمع: دیجیتالی کردن رهگیری ارتباطات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب طراحی مجدد استراق سمع: دیجیتالی کردن رهگیری ارتباطات




توضیحاتی درمورد کتاب به خارجی

This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11. It pays particular attention to the 1990s, which marked one of the most dramatic turns in the history of telecommunications interception. During that time, fiber optic and satellite networks rapidly replaced the copper-based analogue telephone system that had remained virtually unchanged since the 1870s. That remarkable technological advance facilitated the rise of the networked home computer, cellular telephony, and the Internet, and users hailed the dawn of the digital information age. However, security agencies such as the FBI and MI5 were concerned. Since the emergence of telegraphy in the 1830s, security services could intercept private messages using wiretaps, and this was facilitated by some of the world\'s largest telecommunications monopolies such as AT&T in the US and British Telecom in the UK. The new, digital networks were incompatible with traditional wiretap technology. To make things more complicated for the security services, these monopolies had been privatized and broken up into smaller companies during the 1980s, and in the new deregulated landscape the agencies had to seek assistance from thousands of startup companies that were often unwilling to help. So for the first time in history, technological and institutional changes posed a threat to the security services’ wiretapping activities, and government officials in Washington and London acted quickly to protect their ability to spy, they sought to force the industry to change the very architecture of the digital telecommunications network. This book describes in detail the tense negotiations between governments, the telecommunications industry, and civil liberties groups during an unprecedented moment in history when the above security agencies were unable to wiretap. It reveals for the first time the thoughts of some of the protagonists in these crucial negotiations, and explains why their outcome may have forever altered the trajectory of our information society.



فهرست مطالب

Preface
Contents
Chapter 1: Introduction
	1.1 Information Security and Communications Interception
	1.2 The Scant Bibliography on Communications Interception
	1.3 British Literature on Analog Communications Interception
	1.4 American Literature on Analog Communications Interception
	1.5 Information Security, Bureaucracy, Secrecy and Surveillance
	1.6 A Polemical Contribution to the Literature on Information Security
Chapter 2: The Context
	2.1 Regulating and Policing Telecommunications Networks
	2.2 The State and Telecommunications Providers
	2.3 The Onset of Digitization and Informatization
	2.4 Deregulation of the Telecommunications Sector
	2.5 Privatization and Deregulation as Anathemas Wiretapping
	2.6 The Introduction of Wiretapping Legislation
	2.7 Implications for Information Security
Chapter 3: The Government and Telecommunications: A Complex History
	3.1 Messenger Boys and Telephones
	3.2 Telephony´s Takeover in the United Kingdom
	3.3 Challenging the Motives Behind Nationalization
	3.4 The Socio-Political Context of the Nationalization of Telephony
	3.5 United States: Regulating Deregulation
	3.6 American Telephony and the National Interest
	3.7 Regulatory Discretion as a Platform of Negotiation
	3.8 Summary: Regulation as a Political Choice
Chapter 4: The Interception of Communications in Historical Context
	4.1 Britain: Bobbies on the Line
	4.2 United States: Telephones and Alcohol
	4.3 Early Uses of Wiretapping
	4.4 The Legal Pretexts of Wiretapping
	4.5 The Regulatory Dysfunction of Historical Wiretapping
	4.6 Wiretapping in Practice
	4.7 Considerations on the Actual Extent of Wiretapping
	4.8 The Industry-State Telecommunications Interface
	4.9 Discussion: A Debate That Isn´t
	4.10 Summary: A Fine Line Between Discretion and Abuse
Chapter 5: The Techniques of Communications Interception
	5.1 The Micro-mechanics of Analog Communications Interception
	5.2 DNR-Based Hardwired Taps
	5.3 Cross-Connect Box Hardwired Taps
	5.4 Loading Coil-Based Hardwired Taps
	5.5 REMOBS Unit-Based Softwired Taps
	5.6 Enter Digital Telephony
	5.7 Digitization as a Barrier to Communications Interception
	5.8 Communications Interception and Custom Calling Services
	5.9 Enter Digital Wireless Telephony
	5.10 Battling for Standards
	5.11 The Switch Solution
	5.12 United States: Intercepting the Internet with DragonWare and DCS 1000
	5.13 United Kingdom: Active, Semi-Active and Passive Interception on the Internet
	5.14 Towards a Permanent Interception Presence
	5.15 Summary
Chapter 6: The Views of the Negotiators
	6.1 Interception of Communications as a Social Tool
	6.2 The Technological Promise of RIPA and CALEA
	6.3 The Ability to Intercept in the Digital Environment
	6.4 Law Enforcement´s Knowledge Gap
	6.5 Shifting the Communications Interception Paradigm
	6.6 TSPs as Guarantors of Communications-Interception Legality
	6.7 TSPs as New Trenches of Communications Security and Control
	6.8 The TSP/Law Enforcement Interface Under RIPA and CALEA
	6.9 Exchanging State Monopoly for Chaos
	6.10 Communications Interception in a Global Deregulatory Environment
	6.11 The Cultural Shift of Deregulation
	6.12 The Financial Shift of Deregulation
	6.13 Negotiating Over Digital Communications Interception
	6.14 Law Enforcement Disunited
	6.15 The Industry Mosaic
	6.16 Challenging RIPA: The Illusion of Negotiations
	6.17 Challenging RIPA: The Fraud Card
	6.18 Challenging CALEA: Climbing the Hill
	6.19 Defending RIPA: Backdoor Lobbying
	6.20 Defending CALEA: The Rhetoric of Emotion
	6.21 Citizen Participation: The Crucial Absence
	6.22 Communications Interception and Accountability
	6.23 Summary
Chapter 7: The Trajectories of Communications Interception
	7.1 Comparing Transatlantic Case Studies
	7.2 Communications Interception in a Deregulated Market Environment
	7.3 Industry´s Elevated Role in Communications Interception
	7.4 Deregulation an Anathema to Communications Interception
	7.5 Blackboxing the Communications-Interception Debate
Chapter 8: Epilogue: Surveillance in the Information Society
	8.1 A Political Economy of Information Security
	8.2 The Effects of the 9/11 Attacks
	8.3 The Pluralism of Information-Security Policy-Making
	8.4 Sociotechnical Trends in Communications Interception
	8.5 Questions for Future Research
References




نظرات کاربران