16.

Patrick Fitzgerald and Mark Leopold, Stranger on the Line: The Secret History of Phone Tapping (London: Bodley Head, 1987).

17.

Thomas Icom, “Cellular interception techniques,” 2600, Vol. 12, No. 1, Spring 1995, pp. 23-27.

18.

Caller number identification also raises issues concerning protection of personal data. Thus, it is possible that there could be friction between priorities on privacy and on nonviolent resistance. For a discussion of potential problems with surveillance in a social defence system, see Brian Martin, “Possible pathologies of future social defence systems,” Pacifica Review, Vol. 7, No. 1, 1995, pp. 61-68.

19.

On the early history of the British post office, including attempts to shut down alternative posts, see Herbert Joyce, The History of the Post Office from its Establishment down to 1836 (London: Richard Bentley and Son, 1893). On postal worker struggles in Britain, see H. G. Swift, A History of Postal Agitation from Fifty Years Ago till the Present Day (London: C. Arthur Pearson, 1900). For a comprehensive history of disputes in the US Congress over what things should be allowed to be mailed, censorship and wartime controls, see Dorothy Ganfield Fowler, Unmailable: Congress and the Post Office (Athens: University of Georgia Press, 1977). On government attempts to monopolise the post, see Carl Watner, “’Plunderers of the public revenue’: voluntaryism and the mails,” The Voluntaryist, No. 76, October 1995, pp. 1-7. A pilot study of the post in relation to social defence is reported in Alison Rawling, Lisa Schofield, Terry Darling and Brian Martin, “The Australian Post Office and social defence,” Nonviolence Today, No. 14, April/May 1990, pp. 6-8.

20.

See, among others, Ann Cavoukian and Don Tapscott, Who Knows: Safeguarding Your Privacy in a Networked World (New York: McGraw-Hill, 1997); Simon Davies, Monitor: Extinguishing Privacy on the Information Superhighway (Sydney: Pan Macmillan, 1996); David H. Flaherty, Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States (Chapel Hill: University of North Carolina Press, 1989); Oscar H. Gandy, Jr., The Panoptic Sort: A Political Economy of Personal Information (Boulder, CO: Westview, 1993); Simson Garfinkel, Database Nation: The Death of Privacy in the 21st Century (Sebastopol, CA: O’Reilly & Associates, 2000); David Lyon, The Electronic Eye: The Rise of Surveillance Society (Cambridge: Polity Press, 1994); Gary T. Marx, Undercover: Police Surveillance in America (Berkeley: University of California Press, 1988).

21.

There is a vast body of writing about the net. Useful treatments of net culture include Wendy M. Grossman, Net.wars (New York: New York University Press, 1997); Howard Rheingold, The Virtual Community: Finding Connection in a Computerized World (London: Secker and Warburg, 1994).

22.

David S. Bennahum, “The Internet revolution,” Wired, Vol. 5, No. 4, April 1997, pp. 122-129 and 168-173.

23.

Bob Travica and Matthew Hogan, “Computer networks in the x-USSR: technology, uses and social effects,” in Debora Shaw (ed.), ASIS ’92: Proceedings of the 55th ASIS Annual Meeting, Vol. 29 (Medford, NJ: Learned Information, 1992), pp. 120-135.

24.

On hacking see the magazine 2600 and The Knightmare, Secrets of a Super Hacker (Port Townsend, WA: Loompanics, 1994).

25.

For the dabate over government-sponsored encryption, see Whitfield Diffie and Susan Landau, Privaacy on the Line: The Politics of Wiretapping and Encryption (Cambridge, MA: MIT Press, 1998) and Lance J. Hoffman (ed.), Building in Big Brother: The Cryptographic Policy Debate (New York: Springer-Verlag, 1995).

26.

See for example Simson Garfinkel, PGP: Pretty Good Privacy (Sebastopol, CA: O’Reilly & Associates, 1995).

Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату
×