The text focuses on one of the elements belonging to the surveillance society
– surveillance with the use of electronic tools. The authors attempt to answer
the following questions. What types of negative phenomena are produced and
intensified by electronic surveillance technologies? How deep is the state of the
„vulnerability” of modern societies, what are the possibilities of surveillance devices?
Is it possible to practically oppose them, how and what are the limits? What is the
genesis of these phenomena and what future scenarios can be sketched based on
the anticipation of observed trends? A set of research questions defined in this
way required both sociological and technical perspectives at the same time. The
authors recognize the negative phenomena associated with electronic surveillance:
escalation, professionalization, institutionalization and normalization.
PEER REVIEW INFORMATION
Article has been screened for originality
ЛИТЕРАТУРА(39)
1.
Aid M.M., Inside the NSA’s Ultra-Secret China Hacking Group, „Foreign Policy”, 10.06.2013, http:// www.foreignpolicy.com/articles/2013/06/10/inside_the_nsa_s_ultra_secret_china_hacking_group (dostęp: 20.12.2018).
Campbell D., Making History: The Original Source for the 1988 First Echelon Report Steps Forward, 25.02.2000, cryptome.org/echelon-mndc.htm (dostęp: 20.12.2018).
Dobos N., Two Concepts of Moral Injury: Moral Trauma and Moral Degradation, [w:] T. Frame (red.), Moral Injury: Unseen Wounds in an Age of Barbarism, Sydney 2016.
Elibol F., Sarac U., Erer I., Realistic Eavesdropping Attacks on Computer Displays with Low-Cost and Mobile Receiver System, [w:] Proceedings of the 20th European Signal Processing Conference (EUSIPCO), 2012, http://www.eurasip.org/Proceed... Conference/papers/1569583239.pdf (dostęp: 20.12.2018).
European Parliament, Report on the Existence of a Global System for the Interception of Private and Commercial Communications (ECHELON Interception System), Session document,.
Frankland R., Side Channels, Compromising Emanations and Surveillance. Current and Future Technologies, Londyn 2011,http://pdfs.semanticscholar.or... (dostęp: 20.12.2018).
Gandy O., Data Mining and Surveillance In the Post – 9/11 Environment [w:] K. Ball, F. Webster (red.), The Intensification of Surveillance. Crime, Terrorism and Warfare in the Information Era, Londyn 2003.
Guri M., Kedma G., Kachlon A., Elovici Y., AirHopper. Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies, 2014, https://www.wired.com/wpconten.... pdf (dostęp: 8.01.2019).
Guri M., Solewicz Y., Daidakulov A., Elovici Y., Fansmitter. Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers, 2016, http://www.wired.com/wp-conten... (dostęp: 20.12.2018).
Lawry T., An Acoustic-Electric Bridge: Traversing Metal Barriers Using Ultrasound, http://www. ttivanguard.com/ttivanguard_cfmfiles/pdf/miami11/miami11session7014.pdf (dostęp: 20.12.2018).
May T.C., Cyphernomicon. Cypherpunks FAQ and More, Version 0.666, 10.09.1994, http:// www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html (dostęp: 20.12.2018).
Miller P., Keyboard “Eavesdropping” Just Got Way Easier, Thanks to Electromagnetic Emanations, Engadget, 20.10.2008, http://www.engadget.com/2008/1... (dostęp: 20.12.2018).
Reis K., The Eavesdropping Society. Electronic Surveillance and Information Brokering, „Patents, Copyrights, Trademarks, and Literary Property”, June 2001.
Špaček S., Celeda P., Drašar M., Vizváry M., Analyzing an Off-the-Shelf Surveillance Software. Hacking Team Case Study, 2.06.2017, http://spi.unob.cz/papers/spi2... (dostęp: 20.12.2018).
Waterman S., „ Prism” a Vital Program Used to Collect Personal Web Data, „Washington Times”, 7.06.2013, http://www.washingtontimes.com... (dostęp: 20.12.2018).
Мы используем файлы cookies для улучшения пользовательского интерфейса и анализа трафика. Данные собираются и обрабатываются нами и Google Analytics (more). Вы можете изменить настройки cookies в своем браузере. Продолжая использовать сайт, вы соглашаетесь с этими условиями.