• Complain

Susan Landau - Surveillance or Security?: The Risks Posed by New Wiretapping Technologies

Here you can read online Susan Landau - Surveillance or Security?: The Risks Posed by New Wiretapping Technologies full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2011, publisher: The MIT Press, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Susan Landau Surveillance or Security?: The Risks Posed by New Wiretapping Technologies
  • Book:
    Surveillance or Security?: The Risks Posed by New Wiretapping Technologies
  • Author:
  • Publisher:
    The MIT Press
  • Genre:
  • Year:
    2011
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Surveillance or Security?: The Risks Posed by New Wiretapping Technologies: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Surveillance or Security?: The Risks Posed by New Wiretapping Technologies" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Digital communications are the lifeblood of modern society. We meet up online, tweet our reactions millions of times a day, connect through social networking rather than in person. Large portions of business and commerce have moved to the Web, and much of our critical infrastructure, including the electric power grid, is controlled online. This reliance on information systems leaves us highly exposed and vulnerable to cyberattack. Despite this, U.S. law enforcement and national security policy remain firmly focused on wiretapping and surveillance. But, as cybersecurity expert Susan Landau argues in Surveillance or Security?, the old surveillance paradigms do not easily fit the new technologies. By embedding eavesdropping mechanisms into communication technology itself, we are building tools that could be turned against us and opting for short-term security and creating dangerous long-term risks.

How can we get communications security right? Landau offers a set of principles to govern wiretapping policy that will allow us to protect our national security as well as our freedom.

Susan Landau: author's other books


Who wrote Surveillance or Security?: The Risks Posed by New Wiretapping Technologies? Find out the surname, the name of the author of the book and a list of all author's works by series.

Surveillance or Security?: The Risks Posed by New Wiretapping Technologies — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Surveillance or Security?: The Risks Posed by New Wiretapping Technologies" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
The Risks Posed by New Wiretapping Technologies Susan Landau - photo 1
Picture 2
Picture 3

The Risks Posed by New Wiretapping Technologies

Susan Landau

Picture 4

Picture 5

Picture 6

Picture 7

Picture 8

ix

xi

xv

1 1

Picture 9

Throughout this book, when I say the Internet, I mean the packet-moving layered architecture described in chapter 2. The Internet does not include the applications-the Googles, Facebooks, and so on-that lie above this architecture. Often the public conflates these two. I owe the observation about the confusion to Stefan Savage, who pointed out that engineers and the public have two differing definitions of the Internet. While there are security problems in both Internets, the ones that make securing the Internet extremely difficult are the ones inherent in the packet-moving architecture. This book focuses on these problems.

Picture 10

Several years before this book was completed, I gave a talk at a company's annual meeting for its technologists. There was nothing particularly unusual about that; I was representing Sun Microsystems to technologists of a major customer. I spoke on new technologies being developed in Sun Labs. Someone from Microsoft also spoke, as did someone from Google, Intel, and so on. The meeting was held at a combination hotel/convention center. That, too, was not surprising. What was odd was the phalanx of hotel security guards who carefully monitored the meeting room as three hundred attendees trooped back and forth between talks, meals, and coffee breaks.

Because outsiders had been invited to attend the sessions, there was no company proprietary information presented at the talks. The hotel was somewhat isolated; it was a large complex on the edge of several four-lane roads. I did not really think much about the security guards until the evening a guard walked into the elevator as I was going up to my room. Except for the United States right after September 11, and traveling in the Soviet Union and China, I could not recall ever having been in a place with so many security personnel, and I commented on the large number of guards I had seen in the hotel.

"That's good," he replied. I thought about this a day later, as the hotel's shuttle service took me back to the airport. The driver had a uniform that included a white shirt with epaulettes. I have taken shuttles in more states of the union and to and from more airports than I care to count. Some shuttle services are more professional than others, but never before had I been driven to the airport by someone who looked like he worked for the military in a third-world dictatorship. That's when I began to reflect on the security guards who had stood before the conference room.

I am sure that the company whose meeting it was did not arrange for the guards. Rather it was the hotel that provided them as part of the service of running a conference. The service was unnecessary. Any determined "spy"-I say "spy" in quotes because no proprietary information was released during the conference-could have counterfeited a badge and gone to hear the presentations. The guards kept out the hordes on the street, except that the hotel was on an inaccessible four-lane roadway. There was no street and no hordes. The guards were completely superfluous, but they were required by the hotel contract. The money the company was spending on guards' salaries was money it was not spending on training additional security technicians, on upgrading its IT infrastructure, or on improving the security of its products (which included defense information systems sold to the U.S. government). These guards were not providing good security. The situation was even worse. The cost of this "security" prevented this company from protecting what mattered.

The guards provided what Bruce Schneier has called security theater: the appearance of security rather than the genuine article. There are thousands of examples of this, from TSA inspections of passengers and X-rays of their hand luggage without accompanying inspection of the parcels that ride in the bellies of the planes, to the ubiquitous closed-circuit TV (CCTV) cameras appearing everywhere with little evidence that their usage actually cuts crime.' The cost of CCTVs diverts money from such activities as community policing. As such, their use may actually be counterproductive.

Electronic communication is the lifeblood of modern society. Simultaneously, such communication can be central to how criminals and terrorists conduct their business. Not a day passes without another story of Internet insecurities, critical infrastructure being attacked, attacks from China on U.S. corporations, and Russian hackers targeting U.S. consumers or Estonian government sites. In the decade since the attacks of September 11, in an attempt to keep the nation safe, the U.S. government has embarked on an unprecedented effort to build surveillance capabilities into communication infrastructure.

Unlike the TSA and CCTV examples, the issue of who is defending what runs more deeply than the question of whether we are diverting funds from techniques that may provide better security. What are these communication surveillance systems? Who are the guards? Are they really protecting us? Or are they working for someone else? Could these surveillance capabilities be turned by trusted insiders for their own profit, or used by our enemies to access our secrets? The fundamental issue is whether, by housing wiretapping within communication infrastructure, we are creating serious security risks. Understanding whether building wiretapping into communication infrastructure keeps us safe requires that we understand the technology, economics, law, and policy issues of communication surveillance technologies. That is the point and purpose of this book.

I begin in chapter 1 by laying out the issues of communication and wiretapping within their social and legal contexts. In chapter 2, I discuss the development of communication networks, both the telephone and the Internet, while in chapter 3, I explain how the Internet came to be so insecure. These two chapters are more technical than the rest of the book and less technically trained readers may choose to skim them. I discuss legal aspects of wiretapping in chapter 4, effectiveness of communications surveillance in chapter 5, and evolving communications technologies in chapter 6. In chapter 7, I examine who is intruding on our communications, how they intrude, and what they are seeking. Having built that framework, in chapter 8, I look at the technology risks that arise when wiretapping is embedded within communications infrastructures, while in chapter 9, I look at the policy risks created by wiretapping technologies. In chapter 10, I examine how communication takes place during disasters; this gives different insights into communications security. I conclude in chapter 11 by discussing how we might get communications security and surveillance "right."

Note: Because my focus in this book is on whether widespread communications surveillance enhances or endangers national security, I am not addressing broader policy issues of U.S. national security. In particular, I will discuss only peripherally the role that the concentration of executive power over the last decades, and most particularly under the administration of President George W. Bush, has had in determining current U.S. communications surveillance policy. This issue-which has been the subject of many other publications-is beyond the scope of this book.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Surveillance or Security?: The Risks Posed by New Wiretapping Technologies»

Look at similar books to Surveillance or Security?: The Risks Posed by New Wiretapping Technologies. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Surveillance or Security?: The Risks Posed by New Wiretapping Technologies»

Discussion, reviews of the book Surveillance or Security?: The Risks Posed by New Wiretapping Technologies and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.