当前位置: X-MOL 学术Surveillance & Society › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Security against Surveillance: IT Security as Resistance to Pervasive Surveillance
Surveillance & Society ( IF 1.6 ) Pub Date : 2018-04-01 , DOI: 10.24908/ss.v16i1.5316
Mike Zajko

This paper examines Five Eyes surveillance programs as a threat to IT (Information Technology) security and IT security as resistance to these programs. I argue that the most significant of Snowden’s disclosures have been the Five Eyes agencies’ systematic compromise of the technologies, networks, and standards in use within their own countries and abroad. Attacks on domestic infrastructure contradict the defensive posture of these agencies but are consistent with the project of cyber security as defined by the Five Eyes. The cyber security project of the Five Eyes nations is expansive in scope and has proceeded along dangerous lines. By assigning signals intelligence agencies the dual role of exploiting IT systems as well as securing them, a contradiction has been baked into our evolving notion of cyber security. A comprehensive response should include political and legal reforms, disentangling the Five Eyes’ offensive and defensive roles, and narrowing the scope of the cyber security project. However, the most effective forms of resistance for individuals and institutions so far have been through an increased emphasis on IT security practices.

中文翻译:

防范监视的安全性:IT安全性抵抗普遍监视

本文研究了“五眼”监视程序对IT(信息技术)安全的威胁,以及IT安全对这些程序的抵抗。我认为,斯诺登所做的最重要的披露是五眼机构对本国和国外使用的技术,网络和标准的系统性折衷。对国内基础设施的攻击与这些机构的防御姿态相抵触,但与五眼所定义的网络安全项目是一致的。五眼国家的网络安全项目范围广泛,并沿着危险路线进行。通过将信号情报机构分配给利用IT系统并保护它们的双重作用,矛盾已融入到我们不断发展的网络安全概念中。全面的应对措施应包括政治和法律改革,消除五只眼在进攻和防御方面的作用,并缩小网络安全项目的范围。但是,迄今为止,对个人和机构的最有效抵制形式是通过越来越重视IT安全实践。
更新日期:2018-04-01
down
wechat
bug