The text focuses on one of the elements belonging to the surveillance society
– surveillance with the use of electronic tools. The authors attempt to answer
the following questions. What types of negative phenomena are produced and
intensified by electronic surveillance technologies? How deep is the state of the
„vulnerability” of modern societies, what are the possibilities of surveillance devices?
Is it possible to practically oppose them, how and what are the limits? What is the
genesis of these phenomena and what future scenarios can be sketched based on
the anticipation of observed trends? A set of research questions defined in this
way required both sociological and technical perspectives at the same time. The
authors recognize the negative phenomena associated with electronic surveillance:
escalation, professionalization, institutionalization and normalization.
PEER REVIEW INFORMATION
Article has been screened for originality
REFERENCES(39)
1.
Aid M.M., Inside the NSA’s Ultra-Secret China Hacking Group, „Foreign Policy”, 10.06.2013, http:// www.foreignpolicy.com/articles/2013/06/10/inside_the_nsa_s_ultra_secret_china_hacking_group (dostęp: 20.12.2018).
Campbell D., Making History: The Original Source for the 1988 First Echelon Report Steps Forward, 25.02.2000, cryptome.org/echelon-mndc.htm (dostęp: 20.12.2018).
Dobos N., Two Concepts of Moral Injury: Moral Trauma and Moral Degradation, [w:] T. Frame (red.), Moral Injury: Unseen Wounds in an Age of Barbarism, Sydney 2016.
Elibol F., Sarac U., Erer I., Realistic Eavesdropping Attacks on Computer Displays with Low-Cost and Mobile Receiver System, [w:] Proceedings of the 20th European Signal Processing Conference (EUSIPCO), 2012, http://www.eurasip.org/Proceed... Conference/papers/1569583239.pdf (dostęp: 20.12.2018).
European Parliament, Report on the Existence of a Global System for the Interception of Private and Commercial Communications (ECHELON Interception System), Session document,.
Frankland R., Side Channels, Compromising Emanations and Surveillance. Current and Future Technologies, Londyn 2011,http://pdfs.semanticscholar.or... (dostęp: 20.12.2018).
Gandy O., Data Mining and Surveillance In the Post – 9/11 Environment [w:] K. Ball, F. Webster (red.), The Intensification of Surveillance. Crime, Terrorism and Warfare in the Information Era, Londyn 2003.
Guri M., Kedma G., Kachlon A., Elovici Y., AirHopper. Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies, 2014, https://www.wired.com/wpconten.... pdf (dostęp: 8.01.2019).
Guri M., Solewicz Y., Daidakulov A., Elovici Y., Fansmitter. Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers, 2016, http://www.wired.com/wp-conten... (dostęp: 20.12.2018).
Lawry T., An Acoustic-Electric Bridge: Traversing Metal Barriers Using Ultrasound, http://www. ttivanguard.com/ttivanguard_cfmfiles/pdf/miami11/miami11session7014.pdf (dostęp: 20.12.2018).
May T.C., Cyphernomicon. Cypherpunks FAQ and More, Version 0.666, 10.09.1994, http:// www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html (dostęp: 20.12.2018).
Miller P., Keyboard “Eavesdropping” Just Got Way Easier, Thanks to Electromagnetic Emanations, Engadget, 20.10.2008, http://www.engadget.com/2008/1... (dostęp: 20.12.2018).
Reis K., The Eavesdropping Society. Electronic Surveillance and Information Brokering, „Patents, Copyrights, Trademarks, and Literary Property”, June 2001.
Špaček S., Celeda P., Drašar M., Vizváry M., Analyzing an Off-the-Shelf Surveillance Software. Hacking Team Case Study, 2.06.2017, http://spi.unob.cz/papers/spi2... (dostęp: 20.12.2018).
Waterman S., „ Prism” a Vital Program Used to Collect Personal Web Data, „Washington Times”, 7.06.2013, http://www.washingtontimes.com... (dostęp: 20.12.2018).
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.