PL EN RU
ELECTRONIC SURVEILLANCE AS A METHOD OB OBTAINING INFORMATION – EVALUATION AND FORECASTS
 
More details
Hide details
1
absolwent Wojskowej Akademii Technicznej i Akademii Sztabu Generalnego
 
2
Wydział Nauk Politycznych i Studiów Międzynarodowych Uniwersytetu Warszawskiego
 
3
absolwent Wyższej Oficerskiej Szkoły Radiotechnicznej w Jeleniej Górze
 
 
Publication date: 2020-01-15
 
 
Studia Politologiczne 2019;54
 
KEYWORDS
ABSTRACT
The text focuses on one of the elements belonging to the surveillance society – surveillance with the use of electronic tools. The authors attempt to answer the following questions. What types of negative phenomena are produced and intensified by electronic surveillance technologies? How deep is the state of the „vulnerability” of modern societies, what are the possibilities of surveillance devices? Is it possible to practically oppose them, how and what are the limits? What is the genesis of these phenomena and what future scenarios can be sketched based on the anticipation of observed trends? A set of research questions defined in this way required both sociological and technical perspectives at the same time. The authors recognize the negative phenomena associated with electronic surveillance: escalation, professionalization, institutionalization and normalization.
PEER REVIEW INFORMATION
Article has been screened for originality
 
REFERENCES (39)
1.
Aid M.M., Inside the NSA’s Ultra-Secret China Hacking Group, „Foreign Policy”, 10.06.2013, http:// www.foreignpolicy.com/articles/2013/06/10/inside_the_nsa_s_ultra_secret_china_hacking_group (dostęp: 20.12.2018).
 
2.
Assange J., Appelbaum J., Müller-Maguh A., Zimmerman J., Cypherpunks. Freedom and the Future of the Internet, Nowy Jork – Londyn 2012.
 
3.
Assser M., Echelon: Big Brother without a cause?, BBC News, 6.06.2000, http://news.bbc.co.uk/2/hi/eur... (dostęp: 20.12.2018).
 
4.
Batey A., The Spies Behind Your Screen, „Telegraph”, 24.10.2011, https://www.telegraph.co.uk/te... (dostęp: 20.12.2018).
 
5.
Bell J., Assassination Politics, 1997, http://outpost-of-freedom.com/... (dostęp: 20.12.2018).
 
6.
Błoński M., Najbardziej zaawansowana operacja hakerska w historii, http://kopalniawiedzy.pl/Equat... (dostęp: 20.12.2018).
 
7.
Campbell D., Making History: The Original Source for the 1988 First Echelon Report Steps Forward, 25.02.2000, cryptome.org/echelon-mndc.htm (dostęp: 20.12.2018).
 
8.
Chaum D., Security without Identification. Transaction Systems to Make Big Brother Obsolete, „Communications of the ACM” 1985, nr 28(10).
 
9.
Choi H.-J., i in., Reconstruction of Leaked Signal From USB Keyboards, 2016, http://www.researchgate.net/pu... (dostęp: 20.12.2018).
 
10.
Dobos N., Two Concepts of Moral Injury: Moral Trauma and Moral Degradation, [w:] T. Frame (red.), Moral Injury: Unseen Wounds in an Age of Barbarism, Sydney 2016.
 
11.
Eck W. van, Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?, „North-Holland Computers & Security” 1985, nr 4.
 
12.
Elibol F., Sarac U., Erer I., Realistic Eavesdropping Attacks on Computer Displays with Low-Cost and Mobile Receiver System, [w:] Proceedings of the 20th European Signal Processing Conference (EUSIPCO), 2012, http://www.eurasip.org/Proceed... Conference/papers/1569583239.pdf (dostęp: 20.12.2018).
 
13.
European Parliament, Report on the Existence of a Global System for the Interception of Private and Commercial Communications (ECHELON Interception System), Session document,.
 
14.
FINAL A5-0264/2001, 11.07.2001, http://www.fas.org/irp/program... (dostęp: 20.12.2018).
 
15.
Frankland R., Side Channels, Compromising Emanations and Surveillance. Current and Future Technologies, Londyn 2011,http://pdfs.semanticscholar.or... (dostęp: 20.12.2018).
 
16.
Gandy O., Data Mining and Surveillance In the Post – 9/11 Environment [w:] K. Ball, F. Webster (red.), The Intensification of Surveillance. Crime, Terrorism and Warfare in the Information Era, Londyn 2003.
 
17.
Guri M., Kedma G., Kachlon A., Elovici Y., AirHopper. Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies, 2014, https://www.wired.com/wpconten.... pdf (dostęp: 8.01.2019).
 
18.
Guri M., Monitz M., Mirski Y., Elovici Y., BitWhisper. Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations, „Cryptography & Security” 2015.
 
19.
Guri M., Solewicz Y., Daidakulov A., Elovici Y., Fansmitter. Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers, 2016, http://www.wired.com/wp-conten... (dostęp: 20.12.2018).
 
20.
Hager N., Secret Power. New Zealand’s Role in the International Spy Network, Nelson 1996.
 
21.
Kania B., VGASIG. FM Radio Transmitter Using VGA Graphics Card, 2009, https:// bk.gnarf.org/creativity/vgasig/vgasig.pdf (dostęp: 8.01.2019).
 
22.
Kuhn M.G., Compromising Emanations: Eavesdropping Risks of Computer Displays, „Computer Laboratory” 2003, nr 577.
 
23.
Kuhn M.G., Electromagnetic Eavesdropping Risks of Flat-Panel Displays, 2004, http://www.cl.cam.ac.uk/~mgk25... (dostęp: 20.12.2018).
 
24.
Lawry T., An Acoustic-Electric Bridge: Traversing Metal Barriers Using Ultrasound, http://www. ttivanguard.com/ttivanguard_cfmfiles/pdf/miami11/miami11session7014.pdf (dostęp: 20.12.2018).
 
25.
Ludlow P. (red.), Crypto Anarchy, Cyberstates, and Pirate Utopias, Cambridge 2001.
 
26.
Lyon D., The Electronic Eye. The Rise of Surveillance Society, Minneapolis 1994.
 
27.
May T.C., The Crypto Anarchist Manifesto, Activism.net, 22.11.1992, https://www.activism.net/cyphe... (dostęp: 20.12.2018).
 
28.
May T.C., Cyphernomicon. Cypherpunks FAQ and More, Version 0.666, 10.09.1994, http:// www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html (dostęp: 20.12.2018).
 
29.
May T.C., True Nyms and Crypto Anarchy, 2001, http://www.isfdb.org/cgi-bin/t... (dostęp: 20.12.2018).
 
30.
Michalski K., Autonomizacja techniki i niepożądane skutki eliminowania człowieka jako źródła błędów, „Filo-Sofija” 2017, nr 39(4/I).
 
31.
Miller P., Keyboard “Eavesdropping” Just Got Way Easier, Thanks to Electromagnetic Emanations, Engadget, 20.10.2008, http://www.engadget.com/2008/1... (dostęp: 20.12.2018).
 
32.
Murray K.D., The Great Seal Bug, http://counterespionage.com/gr... (dostęp: 20.12.2018).
 
33.
Nikitin P., Leon Theremin (Lev Termen), „IEEE Antennas and Propagation Magazine” 2012, nr 54(5).
 
34.
Pavithran M., Eavesdropping on GSM, „International Journal of Engineering Research in Computer Science and Engineering” 2016, nr 3(9).
 
35.
Reis K., The Eavesdropping Society. Electronic Surveillance and Information Brokering, „Patents, Copyrights, Trademarks, and Literary Property”, June 2001.
 
36.
Simon B., The Return of Panopticism: Supervision, Subjection and the New Surveillance, „Surveillance & Society” 2005, nr 3(1).
 
37.
Špaček S., Celeda P., Drašar M., Vizváry M., Analyzing an Off-the-Shelf Surveillance Software. Hacking Team Case Study, 2.06.2017, http://spi.unob.cz/papers/spi2... (dostęp: 20.12.2018).
 
38.
Vuagnoux M., Pasini S., Compromising Electromagnetic Emanations of Wired Keyboards, 2007– 2009 Security and Cryptography Laboratory – LASEC/EPFL, 2009, https://lasec.epfl.ch/keyboard... (dostęp: 20.12.2018).
 
39.
Waterman S., „ Prism” a Vital Program Used to Collect Personal Web Data, „Washington Times”, 7.06.2013, http://www.washingtontimes.com... (dostęp: 20.12.2018).
 
ISSN:1640-8888
Journals System - logo
Scroll to top