Redesigning Wiretapping (Record no. 177170)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04494nam a22006015i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-030-39919-1 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423125351.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 201218s2020 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783030399191 |
-- | 978-3-030-39919-1 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-030-39919-1 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Fitsanakis, Joseph. |
Relator term | author. |
Relator code | aut |
-- | http://id.loc.gov/vocabulary/relators/aut |
245 10 - TITLE STATEMENT | |
Title | Redesigning Wiretapping |
Medium | [electronic resource] : |
Remainder of title | The Digitization of Communications Interception / |
Statement of responsibility, etc | by Joseph Fitsanakis. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2020. |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2020. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | IX, 195 p. 1 illus. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | History of Information Security, |
International Standard Serial Number | 2662-7566 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction -- The Context -- The Government and Telecommunications: A Complex History -- The Interception of Communications in Historical Context -- The Techniques of Communications Interception -- The Views of the Negotiators -- The Trajectories of Communications Interception -- Epilogue: Surveillance in the Information Society. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11. It pays particular attention to the 1990s, which marked one of the most dramatic turns in the history of telecommunications interception. During that time, fiber optic and satellite networks rapidly replaced the copper-based analogue telephone system that had remained virtually unchanged since the 1870s. That remarkable technological advance facilitated the rise of the networked home computer, cellular telephony, and the Internet, and users hailed the dawn of the digital information age. However, security agencies such as the FBI and MI5 were concerned. Since the emergence of telegraphy in the 1830s, security services could intercept private messages using wiretaps, and this was facilitated by some of the world's largest telecommunications monopolies such as AT&T in the US and British Telecomin the UK. The new, digital networks were incompatible with traditional wiretap technology. To make things more complicated for the security services, these monopolies had been privatized and broken up into smaller companies during the 1980s, and in the new deregulated landscape the agencies had to seek assistance from thousands of startup companies that were often unwilling to help. So for the first time in history, technological and institutional changes posed a threat to the security services’ wiretapping activities, and government officials in Washington and London acted quickly to protect their ability to spy, they sought to force the industry to change the very architecture of the digital telecommunications network. This book describes in detail the tense negotiations between governments, the telecommunications industry, and civil liberties groups during an unprecedented moment in history when the above security agencies were unable to wiretap. Itreveals for the first time the thoughts of some of the protagonists in these crucial negotiations, and explains why their outcome may have forever altered the trajectory of our information society. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Technology. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | History. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Criminology. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Security systems. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | History of Technology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Criminology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Security Science and Technology. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783030399184 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783030399207 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783030399214 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | History of Information Security, |
-- | 2662-7566 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-030-39919-1">https://doi.org/10.1007/978-3-030-39919-1</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.