Книга - IT как оружие. Какие опасности таит в себе развитие высоких технологий

a
A


Warning: mb_convert_encoding(): Unable to detect character encoding in /var/www/u2150601/data/www/ae-books.online/wp-content/themes/twentyfifteen/content.php on line 442
IT .





IT- . , IT- , . . ? , Microsoft, , IT-, . ? , , ? , ? ? . , IT- , , .





,

IT :



: (, 1), ( 216)

.

.

.

. , .

.



2019 by Bradford L. Smith

, , . , 2021



. () . , , , , , . , , , , , , , .

, , , , () , , .


?













.

Microsoft 1993., - 1990- . , . . , .

. : Microsoft. .

Microsoft , . : , , ? , .

, , Microsoft, , , . 䠖 , , , , , ( ). , , , , . , .

, Microsoft. , , , , . - , , , , .

, , ( , , - ). , Microsoft , . , .

. . ? ? c ? ?

, , 20 , .

, , , . , . - ? , ?

, , . , , . , , , , .

, , . , . . , , . 頖 , , .

, , , , . . , , , 1812. .

. . , ,  . , .

젖 . - . , , , .

. , , , . , .




2019






:




.

, . , , .

. , .

, : , . [1 - , -. , , 2300. .. , , 2000 . , , , . Lionel Casson, Libraries in the Ancient World (New Haven, CT: Yale University Press, 2001), 34. , . , - , , , . , . , 300. .., 490000 . Casson, Libraries, 36. , . 121. .. , . James W. P. Campbell, The Library: A World History (Chicago: The University of Chicago Press, 2013), 95.]. , , . , , , , .

. , . XX. . [2 - . 1898. , , . . , . , . , . , , . , , . , 頖 . , , , , . . . James Ward, The Perfection of the Paper Clip: Curious Tales of Invention, Accidental Genius, and Stationery Obsession (NewYork: Atria Books, 2015), 25556.].

, , . , . , XXI. . , , , . . , , , , .

, . 25 , [3 - David Reinsel, John Gantz, and John Rydning, Data Age 2025: The Digitization of the World From Edge to Core (IDC White Paper #US44413318, Sponsored by Seagate), November 2018, 6, https://www.seagate.com/files/www-content/our-story/trends/files/idc-seagate-dataage-whitepaper.pdf (https://www.seagate.com/files/www-content/our-story/trends/files/idc-seagate-dataage-whitepaper.pdf).]. ( ) , - .

, , . - , , , . , - , -ࠖ , .

, -, , .

, , , . 240 90. [4 - . 60% . . .]. - . , , . , . , -. -, [5 - Jo?o Marques Lima, "Data centres of the world will consume 1/5 of Earth's power by 2025," Data Economy, December 12, 2017, https://data-economy.com/data-centres-world-will-consume-15-earths-power-2025/ (https://data-economy.com/data-centres-world-will-consume-1%E2%80%935-earths-power-2025/).].

, . , . Microsoft Columbia Data Center.

- . , 20 185000. . . , .

. , - , . 6 2000 . - 48, . - Microsoft, , , . - , -.

, 230000 240 . , , , , . , , . - 5000 . . -, . -, - .

, , , 堖 . Microsoft, . , . , .

, , , . , . , . , . .

- , , , , . , , , . . , .

- , . , , . , , .

, , . . , , , . Microsoft , -, - . , , . .

- . , - , . , , , , . , - , . , , , - .

Microsoft 100 - 20 ( ). 200 - 140 .

1993. Microsoft, . Microsoft , . , . , , .

, Microsoft . 2004. , . Giant Company Software. , , . Microsoft , , . , [6 - Ryan Naraine, "Microsoft Makes Giant Anti-Spyware Acquisition," eWEEK, December 16, 2004, http://www.eweek.com/news/microsoft-makes-giant-anti-spyware-acquisition (http://www.eweek.com/news/microsoft-makes-giant-anti-spyware-acquisition).].

-, Giant Company Software. , , - . . , , . , , , . , , . - . , . -, , . , , - , .

- , . , , . , ? , , ? , ? , ? ?

, , , .

, , . - . , . , , , .

. . , , . , , . , , . .

. , , , . , , , , .

, Microsoft , . . 20 , Microsoft . . , Windows , .

Microsoft , , . 2002. , -. [7 - Microsoft , , , , , . 2000- . 2009. . European Commission, "Antitrust: Commission Accepts Microsoft Commitments to Give Users Browser Choice," December 16, 2009, http://europa.eu/rapid/press-release_IP-091941_en.htm (http://europa.eu/rapid/press-release_IP-09%E2%80%931941_en.htm). Microsoft . 1990., , , Windows. Andrew I. Gavil and Harry First, The Microsoft Antitrust Cases: Competition Policy for the Twenty-First Century (Cambridge, MA: The MIT Press, 2014). , 28 , 21 2018. , 27 , , . , , , , . 1999., Microsoft , XX., , . , Standard Oil, U. S. Steel, IBM AT&T, .. , . AT&T 1913., , , 1982., . IBM 1932. 1984. , IBM , . Tom Buerkle, "IBM Moves to Defend Mainframe Business in EU," NewYork Times, July 8, 1994, https://www.nytimes.com/1994/07/08/business/worldbusiness/IHT-ibm-moves-to-defend-mainframe-business-in-eu.html (https://www.nytimes.com/1994/07/08/business/worldbusiness/IHT-ibm-moves-to-defend-mainframe-business-in-eu.html). , , . , , .], . , .

. , , , . . , .

, 20 . , . , . 頖 , .

, , , Microsoft. , : , , . , , , . , , , .

: - . . , , . , - . 蠖 , . , .

, . , 1700- . , , , . , .

, . . , , .




1

:




6 2013. , , - , Microsoft. - , , , .

, . , . , . , . , .

Microsoft/PRISM. PRISM . , , Microsoft.

. , - .

, The Guardian PRISM , .

ꠖ The Guardian. Microsoft , , , : .

, , . : , , . , . , 18:00 , 15:00 .

The Guardian , , 頖 Microsoft, Yahoo, Google, Facebook, Paltalk, YouTube, Skype, AOL Apple PRISM, , , , .

䠖 , , . , , , . , , The Guardian. , Verizon [8 - Glenn Greenwald, "NSA Collecting Phone Records of Millions of Verizon Customers Daily," Guardian, June 6, 2013, https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order (https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order).]. , - -, , , . , , , - .

- Microsoft - PRISM, , , , . .

, The Guardian . , , , , - : -. .

, , , . Microsoft 頖 .

, , , The Guardian. , , .

, . . Microsoft . , - ?

, , , , , . , The Guardian, .

Microsoft PRISM. The Guardian , . , , . : , , , , .

, , .

15:00 The Guardian : PRISM Apple, Google [9 - Glenn Greenwald and Ewen MacAskill, "NSA Prism Program Taps In to User Data of Apple, Google and Others," Guardian, June 7, 2013, https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data (https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data).]. - , PRISM (Planning Tool for Resource Integration, Synchronization and Management , )[10 - Benjamin Dreyfuss and Emily Dreyfuss, "What Is the NSA's PRISM Program? (FAQ)," CNET, June 7, 2013, https://www.cnet.com/news/what-is-the-nsas-prism-program-faq/ (https://www.cnet.com/news/what-is-the-nsas-prism-program-faq/).]. ? - . , , , -, [11 - , , , , , . Robert O'Harrow Jr., Ellen Nakashima, and Barton Gellman, "U.S., Company Officials: Internet Surveillance Does Not Indiscriminately Mine Data," Washington Post, June 8, 2013, https://www.washingtonpost.com/world/national-security/us-company-officials-internet-surveillance-does-not-indiscriminately-mine-data/2013/06/08/5b3bb234-d07d-11e29f1a-1a7cdee20287_story.html?utm_term=.b5761610edb1 (https://www.washingtonpost.com/world/national-security/us-company-officials-internet-surveillance-does-not-indiscriminately-mine-data/2013/06/08/5b3bb234-d07d-11e2%E2%80%939f1a-1a7cdee20287_story.html?utm_term=.b5761610edb1).].

The Guardian The Washington Post . Microsoft .

: ?

, . , . The Guardian , , . [12 - Glenn Greenwald, Ewen MacAskill, and Laura Poitras, "Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations," Guardian, June 11, 2013, https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance (https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance).], .

29- Booz Allen Hamilton, . . . [13 - Michael B. Kelley, "NSA: Snowden Stole 1.7 Million Classified Documents and Still Has Access to Most of Them," Business Insider, December 13, 2013, https://www.businessinsider.com/how-many-docs-did-snowden-take-201312 (https://www.businessinsider.com/how-many-docs-did-snowden-take-2013%E2%80%9312).], 20 2013. , The Guardian The Washington Post [14 - Ken Dilanian, Richard A. Serrano, and Michael A. Memoli, "Snowden Smuggled Out Data on Thumb Drive, Officials Say," Los Angeles Times, June 13, 2013, http://articles.latimes.com/2013/jun/13/nation/la-na-nsa-leaks-20130614 (http://articles.latimes.com/2013/jun/13/nation/la-na-nsa-leaks-20130614).].

, . PowerPoint 41 , . . , . , , [15 - Nick Hopkins, "UK Gathering Secret Intelligence Via Covert NSA Operation," Guardian, June 7, 2013, https://www.theguardian.com/technology/2013/jun/07/uk-gathering-secret-intelligence-nsa-prism (https://www.theguardian.com/technology/2013/jun/07/uk-gathering-secret-intelligence-nsa-prism); . Mirren Gidda, "Edward Snowden and the NSA Files Timeline," Guardian, August 21, 2013, https://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa-files-timeline (https://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa-files-timeline).].

, . , . , - , XVIII. , . , , . .

, , 젖 젖 . 1760- . -, , ( ). 1763. , . , , . , , .

, , , 14 [16 - William J. Cuddihy, The Fourth Amendment: Origins and Meaning, 16021791 (Oxford: Oxford University Press, 2009), 441.]. , 49, . , [17 - , . 442.]. , , : .

, . , . , , , , : . , , , , , , . , , ࠖ , , [18 - , . 459.].

. , . 蠖 蠖 . 1760- . , 25 . , , , . , , , , , , [19 - Frederick S. Lane, American Privacy: The 400-Year History of Our Most Contested Right (Boston: Beacon Press, 2009),].

, [20 - David Fellman, The Defendant's Rights Today (Madison: University of Wisconsin Press, 1976), 258.]. , , . , [21 - William Tudor, The Life of James Otis, of Massachusetts: Containing Also, Notices of Some Contemporary Characters and Events, From the Year 1760 to 1775 (Boston: Wells and Lilly, 1823), 8788. , , 2 1776. , . Brad Smith, "Remembering the Third of July," Microsoft on the Issues (blog), Microsoft, July 3, 2014, https://blogs.microsoft.com/on-the-issues/2014/07/03/remembering-the-third-of-july/ (https://blogs.microsoft.com/on-the-issues/2014/07/03/remembering-the-third-of-july/).]. , , , [22 - David McCullough, John Adams (NewYork: Simon & Schuster, 2001), 62. William Cranch, Memoir of the Life, Character, and Writings of John Adams (Washington, DC: Columbian Institute, 1827), 15. , . 2014., , , . Riley v. California, 573 U.S. _ (2014), https://www.supremecourt.gov/opinions/13pdf/13132_8l9c.pdf (https://www.supremecourt.gov/opinions/13pdf/13%E2%80%93132_8l9c.pdf), at 2728. 2018., , . Carpenter v. United States, No. 16402, 585 U.S. (2017), https://www.supremecourt.gov/opinions/17pdf/16402_h315.pdf (https://www.supremecourt.gov/opinions/17pdf/16%E2%80%93402_h315.pdf), at 5.].

13, , . -, - 1789. . , [23 - Thomas K, Clancy, The Fourth Amendment: Its History and Interpretation (Durham, NC: Carolina Academic Press, 2014), 6974.]. , , , , , , [24 - , IV.]. . , , , [25 - Brent E. Turvey and Stan Crowder, Ethical Justice: Applied Issues for Criminal Justice Students and Professionals (Oxford: Academic Press, 2013), 18283.].

, ? 1800- . , . . , , [26 - Ex parte Jackson, 96 U.S. 727 (1878).]. , , .

, , - . - , , , . , , . , , , [27 - Cliff Roberson, Constitutional Law and Criminal Justice, second edition (Boca Raton, FL: CRC Press, 2016), 50; Clancy, The Fourth Amendment, 91104.].

- , , .

2013. , . . , , , . , . , . : ", - . Microsoft, ".

The Guardian PRISM . [28 - Charlie Savage, "Government Releases Once- Secret Report on Post-9/11 Surveillance," NewYork Times, April 24, 2015, https://www.nytimes.com/interactive/2015/04/25/us/25stellarwind-ig-report.html (https://www.nytimes.com/interactive/2015/04/25/us/25stellarwind-ig-report.html).], 11 2001. .

Microsoft, , . , . 11 . , , . . , .

ࠖ , .

PRISM, 11 : ?

. . , . , , . , , . .

2002. , , . , , .

10 . 1798., . , , , 300 [29 - Terri Diane Halperin, The Alien and Sedition Acts of 1798: Testing the Constitution (Baltimore: John Hopkins University Press, 2016), 4243.]. . , , , . , , - , , . , [30 - , . 5960.].

60 , , . . , - . 15000 [31 - David Greenberg, "Lincoln's Crackdown," Slate, November 30, 2001, https://slate.com/news-and-politics/2001/11/lincoln-s-suspension-of-habeas-corpus.html (https://slate.com/news-and-politics/2001/11/lincoln-s-suspension-of-habeas-corpus.html).].

- 1942. 120000 . . , , , [32 - T.A. Frail, "The Injustice of Japanese-American Internment Camps Resonates Strongly to This Day," Smithsonian, January 2017, https://www.smithsonianmag.com/history/injustice-japanese-americans-internment-camps-resonates-strongly-180961422/ (https://www.smithsonianmag.com/history/injustice-japanese-americans-internment-camps-resonates-strongly-180961422/).].

, , , , . , : 10 , ? , ?

, . . 蠖 . , ?

2013. - . . , . , , . , .

, . , . , 蠖 , , 頖 -.

, . , 1930- . , , , , , . . 1930- . , .

2013. , , . , , , . , , , . , , , , . .

, : . , , , . , , FISC.

FISC , . , . . , FISC , , . , , , , .

, Google. . , . Google Windows. Microsoft Google. . , Google. .

. , , . , Xbox, , . , , Halo , . , .

. , , . : , . , . , , .

, . , , . , - . 2013. . .

30 The Washington Post , : , Yahoo - Google [33 - Barton Gellman and Ashkan Soltani, "NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say," Washington Post, October 30, 2013, https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-416611e38b74-d89d714ca4dd_story.html?noredirect=on&utm_term=.5c2f99fcc376 (https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166%E2%80%9311e3%E2%80%938b74-d89d714ca4dd_story.html?noredirect=on&utm_term=.5c2f99fcc376).]. , , The Daily Princetonian , . , - Yahoo Google. , , [34 - "Evidence of Microsoft's Vulnerability," Washington Post, November 26, 2013, https://www.washingtonpost.com/apps/g/page/world/evidence-of-microsofts-vulnerability/621/ (https://www.washingtonpost.com/apps/g/page/world/evidence-of-microsofts-vulnerability/621/).]. , . .

. . , , , . , .

The Washington Post , , , , , . , . . , , , , , , .

Microsoft . , , - , -[35 - Craig Timberg, Barton Gellman, and Ashkan Soltani, "Microsoft, Suspecting NSA Spying, to Ramp Up Efforts to Encrypt Its Internet Traffic," Washington Post, November 26, 2013, https://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b4856a911e38304-caf30787c0a9_story.html?utm_term=.69201c4e9ed8 (https://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b48%E2%80%9356a9%E2%80%9311e3%E2%80%938304-caf30787c0a9_story.html?utm_term=.69201c4e9ed8).]. ⠖ , , .

堖 . - . , . , , , , . , . , Microsoft - . .

, , . Westin Seattle, . Microsoft.

, , , . . , . , , : , , , .

The Washington Post , , . , .

. . , .

.

, . , , ? , . , , , , , , , . , , .

. , , . , , , IT- . , , , -, . , .

, Apple , Google , Facebook , Netflix . . 頖 , , (Reform Government Surveillance). , . .

⠖ , , , [36 - "Roosevelt Room," White House Museum, accessed February 20, 2019, http://www.whitehousemuseum.org/west-wing/roosevelt-room.htm (http://www.whitehousemuseum.org/west-wing/roosevelt-room.htm).]. , , , . [37 - - 1898. 1- , . . .]. , 90 .

. - . , .

, . , . . , .

, . . , Zynga, , - , , . , , [38 - , , . Seth Rosenblatt, "'Pardon Snowden,' One Tech Exec Tells Obama, Report Says," CNET, December 18, 2013, https://www.cnet.com/news/pardon-snowden-one-tech-exec-tells-obama-report-says/ (https://www.cnet.com/news/pardon-snowden-one-tech-exec-tells-obama-report-says/); Dean Takahashi, "Zynga's Mark Pincus Asked Obama to Pardon NSA Leaker Edward Snowden," VentureBeat, December 19, 2013, https://venturebeat.com/2013/12/19/zyngas-mark-pincus-asked-president-obama-to-pardon-nsa-leaker-edward-snowden/ (https://venturebeat.com/2013/12/19/zyngas-mark-pincus-asked-president-obama-to-pardon-nsa-leaker-edward-snowden/).].

, . , . , , , , , .

Yahoo . : , , - . : . . .

, . . . , -, , .

, . , , , , , . , , , , . , , .

, , , . , , .

, 17 2014., [39 - "Transcript of President Obama's Jan. 17 Speech on NSA Reform," Washington Post, January 17, 2014, https://www.washingtonpost.com/politics/full-text-of-president-obamas-jan-17-speech-on-nsa-reforms/2014/01/17/fa33590a-7f8c-11e395564a4bf7bcbd84_story.html?utm_term=.c8d2871c4f72 (https://www.washingtonpost.com/politics/full-text-of-president-obamas-jan-17-speech-on-nsa-reforms/2014/01/17/fa33590a-7f8c-11e3%E2%80%939556%E2%80%934a4bf7bcbd84_story.html?utm_term=.c8d2871c4f72).]. , , . , Microsoft Google , , , . , , . Google, , , .

, , . , , . , . , -, ? , ? .

, , , The Guardian . , . . . .

, , , . , . 2014. : ; , .




2

:

,


. , , . XXI. - .

, , . .

, , , . 2002., 23 , , The Wall Street Journal [40 - "Reporter Daniel Pearl Is Dead, Killed by His Captors in Pakistan," Wall Street Journal, February 24, 2002, http://online.wsj.com/public/resources/documents/pearl-022102.htm (http://online.wsj.com/public/resources/documents/pearl-022102.htm).]. -, Hotmail , . F-16 . , . ࠖ .

, . , , [41 - Electronic Communications Privacy Act of 1986, Public Law 99508, 99th Cong., 2d sess. (October 21, 1986), 18 U.S.C. 2702.b.]. , , .

. . Hotmail, , IP- - , . , , .

, . , . . , , , .

, . - . , , .

, , . , , , , , . , , , . .

, . 1980- .

1986. , (Electronic Communications Privacy Act), ECPA. , - , , .

, 1986. , . ECPA , . , , , , [42 - Electronic Communications Privacy Act of 1986, Public Law 99508, 99th Cong., 2d sess. (October 21, 1986), 18 U.S.C. Chapter 121 2701 et seq.]. . .

. , , , - . , , , . , , .

, , , . . , . , , , [43 - Electronic Communications Privacy Act of 1986, Public Law 99508, 99th Cong., 2d sess. (October 21, 1986), 18 U.S.C. 2705.b.].  , 堖 .

, . - . 25 ⠖ , , . . Microsoft LENS. : . . LENS . 50000 75 [44 - "Law Enforcement Requests Report," Corporate Social Responsibility, Microsoft, last modified June 2018, https://www.microsoft.com/en-us/about/corporate-responsibility/lerr/ (https://www.microsoft.com/en-us/about/corporate-responsibility/lerr/).]. 3% . IP-, .

Microsoft . , , . , -. , , . LENS , , , . , , , .




.


.

, (https://www.litres.ru/bred-smit/it-kak-oruzhie-kakie-opasnosti-tait-v-sebe-razvitie-vysokih-tehn/) .

Visa, MasterCard, Maestro, , , , PayPal, WebMoney, ., QIWI , .



notes








1


, -. , , 2300. .. , , 2000 . , , , . Lionel Casson, Libraries in the Ancient World (New Haven, CT: Yale University Press, 2001), 34. , .

, - , , , . , . , 300. .., 490000 . Casson, Libraries, 36. , . 121. .. , . James W. P. Campbell, The Library: A World History (Chicago: The University of Chicago Press, 2013), 95.




2


. 1898. , , . . , . , . , . , , .

, , . , 頖 . , , , , . . . James Ward, The Perfection of the Paper Clip: Curious Tales of Invention, Accidental Genius, and Stationery Obsession (NewYork: Atria Books, 2015), 25556.




3


David Reinsel, John Gantz, and John Rydning, Data Age 2025: The Digitization of the World From Edge to Core (IDC White Paper #US44413318, Sponsored by Seagate), November 2018, 6, https://www.seagate.com/files/www-content/our-story/trends/files/idc-seagate-dataage-whitepaper.pdf (https://www.seagate.com/files/www-content/our-story/trends/files/idc-seagate-dataage-whitepaper.pdf).




4


. 60% . . .




5


Jo?o Marques Lima, "Data centres of the world will consume 1/5 of Earth's power by 2025," Data Economy, December 12, 2017, https://data-economy.com/data-centres-world-will-consume-15-earths-power-2025/ (https://data-economy.com/data-centres-world-will-consume-1%E2%80%935-earths-power-2025/).




6


Ryan Naraine, "Microsoft Makes Giant Anti-Spyware Acquisition," eWEEK, December 16, 2004, http://www.eweek.com/news/microsoft-makes-giant-anti-spyware-acquisition (http://www.eweek.com/news/microsoft-makes-giant-anti-spyware-acquisition).




7


Microsoft , , , , , . 2000- . 2009. . European Commission, "Antitrust: Commission Accepts Microsoft Commitments to Give Users Browser Choice," December 16, 2009, http://europa.eu/rapid/press-release_IP-091941_en.htm (http://europa.eu/rapid/press-release_IP-09%E2%80%931941_en.htm).

Microsoft . 1990., , , Windows. Andrew I. Gavil and Harry First, The Microsoft Antitrust Cases: Competition Policy for the Twenty-First Century (Cambridge, MA: The MIT Press, 2014). , 28 , 21 2018. , 27 , , .

, , , , . 1999., Microsoft , XX., , . , Standard Oil, U. S. Steel, IBM AT&T, .. , . AT&T 1913., , , 1982., . IBM 1932. 1984. , IBM , . Tom Buerkle, "IBM Moves to Defend Mainframe Business in EU," NewYork Times, July 8, 1994, https://www.nytimes.com/1994/07/08/business/worldbusiness/IHT-ibm-moves-to-defend-mainframe-business-in-eu.html (https://www.nytimes.com/1994/07/08/business/worldbusiness/IHT-ibm-moves-to-defend-mainframe-business-in-eu.html).

, , . , , .




8


Glenn Greenwald, "NSA Collecting Phone Records of Millions of Verizon Customers Daily," Guardian, June 6, 2013, https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order (https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order).




9


Glenn Greenwald and Ewen MacAskill, "NSA Prism Program Taps In to User Data of Apple, Google and Others," Guardian, June 7, 2013, https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data (https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data).




10


Benjamin Dreyfuss and Emily Dreyfuss, "What Is the NSA's PRISM Program? (FAQ)," CNET, June 7, 2013, https://www.cnet.com/news/what-is-the-nsas-prism-program-faq/ (https://www.cnet.com/news/what-is-the-nsas-prism-program-faq/).




11


, , , , , . Robert O'Harrow Jr., Ellen Nakashima, and Barton Gellman, "U.S., Company Officials: Internet Surveillance Does Not Indiscriminately Mine Data," Washington Post, June 8, 2013, https://www.washingtonpost.com/world/national-security/us-company-officials-internet-surveillance-does-not-indiscriminately-mine-data/2013/06/08/5b3bb234-d07d-11e29f1a-1a7cdee20287_story.html?utm_term=.b5761610edb1 (https://www.washingtonpost.com/world/national-security/us-company-officials-internet-surveillance-does-not-indiscriminately-mine-data/2013/06/08/5b3bb234-d07d-11e2%E2%80%939f1a-1a7cdee20287_story.html?utm_term=.b5761610edb1).




12


Glenn Greenwald, Ewen MacAskill, and Laura Poitras, "Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations," Guardian, June 11, 2013, https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance (https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance).




13


Michael B. Kelley, "NSA: Snowden Stole 1.7 Million Classified Documents and Still Has Access to Most of Them," Business Insider, December 13, 2013, https://www.businessinsider.com/how-many-docs-did-snowden-take-201312 (https://www.businessinsider.com/how-many-docs-did-snowden-take-2013%E2%80%9312).




14


Ken Dilanian, Richard A. Serrano, and Michael A. Memoli, "Snowden Smuggled Out Data on Thumb Drive, Officials Say," Los Angeles Times, June 13, 2013, http://articles.latimes.com/2013/jun/13/nation/la-na-nsa-leaks-20130614 (http://articles.latimes.com/2013/jun/13/nation/la-na-nsa-leaks-20130614).




15


Nick Hopkins, "UK Gathering Secret Intelligence Via Covert NSA Operation," Guardian, June 7, 2013, https://www.theguardian.com/technology/2013/jun/07/uk-gathering-secret-intelligence-nsa-prism (https://www.theguardian.com/technology/2013/jun/07/uk-gathering-secret-intelligence-nsa-prism); . Mirren Gidda, "Edward Snowden and the NSA Files Timeline," Guardian, August 21, 2013, https://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa-files-timeline (https://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa-files-timeline).




16


William J. Cuddihy, The Fourth Amendment: Origins and Meaning, 16021791 (Oxford: Oxford University Press, 2009), 441.




17


, . 442.




18


, . 459.




19


Frederick S. Lane, American Privacy: The 400-Year History of Our Most Contested Right (Boston: Beacon Press, 2009),




20


David Fellman, The Defendant's Rights Today (Madison: University of Wisconsin Press, 1976), 258.




21


William Tudor, The Life of James Otis, of Massachusetts: Containing Also, Notices of Some Contemporary Characters and Events, From the Year 1760 to 1775 (Boston: Wells and Lilly, 1823), 8788. , , 2 1776. , . Brad Smith, "Remembering the Third of July," Microsoft on the Issues (blog), Microsoft, July 3, 2014, https://blogs.microsoft.com/on-the-issues/2014/07/03/remembering-the-third-of-july/ (https://blogs.microsoft.com/on-the-issues/2014/07/03/remembering-the-third-of-july/).




22


David McCullough, John Adams (NewYork: Simon & Schuster, 2001), 62. William Cranch, Memoir of the Life, Character, and Writings of John Adams (Washington, DC: Columbian Institute, 1827), 15. , . 2014., , , . Riley v. California, 573 U.S. _ (2014), https://www.supremecourt.gov/opinions/13pdf/13132_8l9c.pdf (https://www.supremecourt.gov/opinions/13pdf/13%E2%80%93132_8l9c.pdf), at 2728. 2018., , . Carpenter v. United States, No. 16402, 585 U.S. (2017), https://www.supremecourt.gov/opinions/17pdf/16402_h315.pdf (https://www.supremecourt.gov/opinions/17pdf/16%E2%80%93402_h315.pdf), at 5.




23


Thomas K, Clancy, The Fourth Amendment: Its History and Interpretation (Durham, NC: Carolina Academic Press, 2014), 6974.




24


, IV.




25


Brent E. Turvey and Stan Crowder, Ethical Justice: Applied Issues for Criminal Justice Students and Professionals (Oxford: Academic Press, 2013), 18283.




26


Ex parte Jackson, 96 U.S. 727 (1878).




27


Cliff Roberson, Constitutional Law and Criminal Justice, second edition (Boca Raton, FL: CRC Press, 2016), 50; Clancy, The Fourth Amendment, 91104.




28


Charlie Savage, "Government Releases Once- Secret Report on Post-9/11 Surveillance," NewYork Times, April 24, 2015, https://www.nytimes.com/interactive/2015/04/25/us/25stellarwind-ig-report.html (https://www.nytimes.com/interactive/2015/04/25/us/25stellarwind-ig-report.html).




29


Terri Diane Halperin, The Alien and Sedition Acts of 1798: Testing the Constitution (Baltimore: John Hopkins University Press, 2016), 4243.




30


, . 5960.




31


David Greenberg, "Lincoln's Crackdown," Slate, November 30, 2001, https://slate.com/news-and-politics/2001/11/lincoln-s-suspension-of-habeas-corpus.html (https://slate.com/news-and-politics/2001/11/lincoln-s-suspension-of-habeas-corpus.html).




32


T.A. Frail, "The Injustice of Japanese-American Internment Camps Resonates Strongly to This Day," Smithsonian, January 2017, https://www.smithsonianmag.com/history/injustice-japanese-americans-internment-camps-resonates-strongly-180961422/ (https://www.smithsonianmag.com/history/injustice-japanese-americans-internment-camps-resonates-strongly-180961422/).




33


Barton Gellman and Ashkan Soltani, "NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say," Washington Post, October 30, 2013, https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-416611e38b74-d89d714ca4dd_story.html?noredirect=on&utm_term=.5c2f99fcc376 (https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166%E2%80%9311e3%E2%80%938b74-d89d714ca4dd_story.html?noredirect=on&utm_term=.5c2f99fcc376).




34


"Evidence of Microsoft's Vulnerability," Washington Post, November 26, 2013, https://www.washingtonpost.com/apps/g/page/world/evidence-of-microsofts-vulnerability/621/ (https://www.washingtonpost.com/apps/g/page/world/evidence-of-microsofts-vulnerability/621/).




35


Craig Timberg, Barton Gellman, and Ashkan Soltani, "Microsoft, Suspecting NSA Spying, to Ramp Up Efforts to Encrypt Its Internet Traffic," Washington Post, November 26, 2013, https://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b4856a911e38304-caf30787c0a9_story.html?utm_term=.69201c4e9ed8 (https://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b48%E2%80%9356a9%E2%80%9311e3%E2%80%938304-caf30787c0a9_story.html?utm_term=.69201c4e9ed8).




36


"Roosevelt Room," White House Museum, accessed February 20, 2019, http://www.whitehousemuseum.org/west-wing/roosevelt-room.htm (http://www.whitehousemuseum.org/west-wing/roosevelt-room.htm).




37


- 1898. 1- , . . .




38


, , . Seth Rosenblatt, "'Pardon Snowden,' One Tech Exec Tells Obama, Report Says," CNET, December 18, 2013, https://www.cnet.com/news/pardon-snowden-one-tech-exec-tells-obama-report-says/ (https://www.cnet.com/news/pardon-snowden-one-tech-exec-tells-obama-report-says/); Dean Takahashi, "Zynga's Mark Pincus Asked Obama to Pardon NSA Leaker Edward Snowden," VentureBeat, December 19, 2013, https://venturebeat.com/2013/12/19/zyngas-mark-pincus-asked-president-obama-to-pardon-nsa-leaker-edward-snowden/ (https://venturebeat.com/2013/12/19/zyngas-mark-pincus-asked-president-obama-to-pardon-nsa-leaker-edward-snowden/).




39


"Transcript of President Obama's Jan. 17 Speech on NSA Reform," Washington Post, January 17, 2014, https://www.washingtonpost.com/politics/full-text-of-president-obamas-jan-17-speech-on-nsa-reforms/2014/01/17/fa33590a-7f8c-11e395564a4bf7bcbd84_story.html?utm_term=.c8d2871c4f72 (https://www.washingtonpost.com/politics/full-text-of-president-obamas-jan-17-speech-on-nsa-reforms/2014/01/17/fa33590a-7f8c-11e3%E2%80%939556%E2%80%934a4bf7bcbd84_story.html?utm_term=.c8d2871c4f72).




40


"Reporter Daniel Pearl Is Dead, Killed by His Captors in Pakistan," Wall Street Journal, February 24, 2002, http://online.wsj.com/public/resources/documents/pearl-022102.htm (http://online.wsj.com/public/resources/documents/pearl-022102.htm).




41


Electronic Communications Privacy Act of 1986, Public Law 99508, 99th Cong., 2d sess. (October 21, 1986), 18 U.S.C. 2702.b.




42


Electronic Communications Privacy Act of 1986, Public Law 99508, 99th Cong., 2d sess. (October 21, 1986), 18 U.S.C. Chapter 121 2701 et seq.




43


Electronic Communications Privacy Act of 1986, Public Law 99508, 99th Cong., 2d sess. (October 21, 1986), 18 U.S.C. 2705.b.




44


"Law Enforcement Requests Report," Corporate Social Responsibility, Microsoft, last modified June 2018, https://www.microsoft.com/en-us/about/corporate-responsibility/lerr/ (https://www.microsoft.com/en-us/about/corporate-responsibility/lerr/).



Развитие IT-индустрии за несколько десятилетий трансформировало современную реальность. Теперь мы живем и работаем в цифровом мире, а ведущие IT-компании владеют большим объемом персональных данных, чем любое правительство на планете. Возможность собирать и обрабатывать огромные объемы информации стало мощным инструментом прогресса и грозным оружием одновременно. Но кто им управляет на самом деле?

Авторы этой книги, руководители компании Microsoft, раскрывают перед читателями самые актуальные проблемы, которые стоят перед IT-компаниями, и рассказывают о своем пути их решения. Как в эту новую эру найти правильный баланс общественной безопасности и неприкосновенности частной жизни? Как защититься от злоумышленников, которые используют новые технологии для кибератак на целые страны, корпорации или частную жизнь граждан? Удастся ли нам создать мир, в котором наши дети смогут найти работу? Сможем ли мы вообще контролировать зарождающийся новый мир?

Возможность собирать огромные объемы данных о пользователях – это палка о двух концах. И от того, как IT-компании решают сложнейшие этические проблемы, зависит устройство мира, в котором нам предстоит жить.

Как скачать книгу - "IT как оружие. Какие опасности таит в себе развитие высоких технологий" в fb2, ePub, txt и других форматах?

  1. Нажмите на кнопку "полная версия" справа от обложки книги на версии сайта для ПК или под обложкой на мобюильной версии сайта
    Полная версия книги
  2. Купите книгу на литресе по кнопке со скриншота
    Пример кнопки для покупки книги
    Если книга "IT как оружие. Какие опасности таит в себе развитие высоких технологий" доступна в бесплатно то будет вот такая кнопка
    Пример кнопки, если книга бесплатная
  3. Выполните вход в личный кабинет на сайте ЛитРес с вашим логином и паролем.
  4. В правом верхнем углу сайта нажмите «Мои книги» и перейдите в подраздел «Мои».
  5. Нажмите на обложку книги -"IT как оружие. Какие опасности таит в себе развитие высоких технологий", чтобы скачать книгу для телефона или на ПК.
    Аудиокнига - «IT как оружие. Какие опасности таит в себе развитие высоких технологий»
  6. В разделе «Скачать в виде файла» нажмите на нужный вам формат файла:

    Для чтения на телефоне подойдут следующие форматы (при клике на формат вы можете сразу скачать бесплатно фрагмент книги "IT как оружие. Какие опасности таит в себе развитие высоких технологий" для ознакомления):

    • FB2 - Для телефонов, планшетов на Android, электронных книг (кроме Kindle) и других программ
    • EPUB - подходит для устройств на ios (iPhone, iPad, Mac) и большинства приложений для чтения

    Для чтения на компьютере подходят форматы:

    • TXT - можно открыть на любом компьютере в текстовом редакторе
    • RTF - также можно открыть на любом ПК
    • A4 PDF - открывается в программе Adobe Reader

    Другие форматы:

    • MOBI - подходит для электронных книг Kindle и Android-приложений
    • IOS.EPUB - идеально подойдет для iPhone и iPad
    • A6 PDF - оптимизирован и подойдет для смартфонов
    • FB3 - более развитый формат FB2

  7. Сохраните файл на свой компьютер или телефоне.

Видео по теме - Брэд Смит – IT как оружие. Какие опасности таит в себе развитие высоких технологий. [Аудиокнига]

Рекомендуем

Последние отзывы
Оставьте отзыв к любой книге и его увидят десятки тысяч людей!
  • константин александрович обрезанов:
    3★
    21.08.2023
  • константин александрович обрезанов:
    3.1★
    11.08.2023
  • Добавить комментарий

    Ваш e-mail не будет опубликован. Обязательные поля помечены *