Surveillance or security? : the risks posed by new wiretapping technologies

cover image

Where to find it

Information & Library Science Library

Call Number
TK5102.85 .L36 2010
Status
Available

Authors, etc.

Names:

Summary

How, in the name of greater security, our current electronic surveillance policies are creating major security risks.

Digital communications are the lifeblood of modern society. We "meet up" online, tweet our reactions millions of times a day, connect through social networking rather than in person. Large portions of business and commerce have moved to the Web, and much of our critical infrastructure, including the electric power grid, is controlled online. This reliance on information systems leaves us highly exposed and vulnerable to cyberattack. Despite this, U.S. law enforcement and national security policy remain firmly focused on wiretapping and surveillance. But, as cybersecurity expert Susan Landau argues in Surveillance or Security? , the old surveillance paradigms do not easily fit the new technologies. By embedding eavesdropping mechanisms into communication technology itself, we are building tools that could be turned against us and opting for short-term security and creating dangerous long-term risks.

How can we get communications security right? Landau offers a set of principles to govern wiretapping policy that will allow us to protect our national security as well as our freedom.

Contents

  • Author's Note p. ix
  • Preface p. xi
  • Acknowledgments p. xv
  • 1 Introduction p. 1
  • 2 Communication Networks and Their Architectures p. 13
  • 3 Securing the Internet Is Difficult p. 37
  • 4 Wiretaps and the Law p. 65
  • 5 The Effectiveness of Wiretapping p. 97
  • 6 Evolving Communications Technologies p. 123
  • 7 Who Are the Intruders? What Are They Targeting? p. 145
  • 8 Security Risks Arising from Wiretapping Technology p. 175
  • 9 Policy Risks Arising from Wiretapping p. 203
  • 10 Communication during Crises p. 225
  • 11 Getting Communications Security Right p. 233
  • Epilogue p. 255
  • Notes p. 257
  • Bibliography p. 339
  • Index p. 345

Other details