Surveillance or security? the risks posed by new wiretapping technologies
In this book, the author argues that in embarking on an unprecedented effort to build surveillance capabilities deeply into communications infrastructure, the U.S. government is opting for short-term security and creating dangerous long-term risks. Landau describes what makes communications security...
Saved in:
| Main Author: | Landau, Susan Eva (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Cambridge, Mass.
MIT Press
2013
|
| Edition: | Paperback edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Privacy on the line the politics of wiretapping and encryption
by: Diffie, Whitfield, et al.
Published: (2007)
by: Diffie, Whitfield, et al.
Published: (2007)
Surveillance and threat detection prevention versus mitigation
by: Kirchner, Richard, Jr
Published: (2014)
by: Kirchner, Richard, Jr
Published: (2014)
Review of the federal strategy for nanotechnology-related environmental, health, and safety research
Published: (2009)
Published: (2009)
Everyday surveillance vigilance and visibility in postmodern life
by: Staples, William G.
Published: (2014)
by: Staples, William G.
Published: (2014)
Space and security a reference handbook
by: Hays, Peter L.
Published: (2011)
by: Hays, Peter L.
Published: (2011)
The Irwin handbook of telecommunications
Published: (2000)
Published: (2000)
Calculated risks highly radioactive waste and homeland security
by: Rogers, Kenneth A. 1946-
Published: (2007)
by: Rogers, Kenneth A. 1946-
Published: (2007)
Risk and the war on terror
Published: (2008)
Published: (2008)
Cyber-security and threat politics US efforts to secure the information age
by: Dunn Cavelty, Myriam
Published: (2007)
by: Dunn Cavelty, Myriam
Published: (2007)
Digital diplomacy U.S. foreign policy in the information age
by: Dizard
Published: (2001)
by: Dizard
Published: (2001)
Digital crossroads telecommunications law and policy in the internet age
by: Nuechterlein, Jonathan E., et al.
Published: (2013)
by: Nuechterlein, Jonathan E., et al.
Published: (2013)
Assessment in special education An applied approach
by: OvertonlhTerry
by: OvertonlhTerry
The Irwin handbook of telecommunications
by: Green, James H. (James Harry)
Published: (1997)
by: Green, James H. (James Harry)
Published: (1997)
Meeting the challenge he Hexagon KH-9 reconnaissance satellite
by: Pressel, Philip
Published: (2013)
by: Pressel, Philip
Published: (2013)
Changing the odds cancer prevention through personal choice and public policy
by: Steen, R. Grant
Published: (1995)
by: Steen, R. Grant
Published: (1995)
Captive audience the telecom industry and monopoly power in the new gilded age
by: Crawford, Susan P.
Published: (2013)
by: Crawford, Susan P.
Published: (2013)
Criminal violence patterns, causes, and prevention
by: Riedel
Published: (2008)
by: Riedel
Published: (2008)
Defensive security handbook best practices for securing infrastructure
by: Brotherston, Lee, et al.
Published: (2017)
by: Brotherston, Lee, et al.
Published: (2017)
Introduction to homeland security principles of all-hazards risk management
by: Bullock, Jane A.
Published: (2021)
by: Bullock, Jane A.
Published: (2021)
Gun violence
Published: (2006)
Published: (2006)
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
by: Sterling, Bruce, 1954-
Published: (1994)
by: Sterling, Bruce, 1954-
Published: (1994)
Power hungry strategc investing in telecommunications,utilities and other essential services
by: ConradlhRoger S.
by: ConradlhRoger S.
Crime and everyday life lcMarcus Felson
by: Felson
Published: (2002)
by: Felson
Published: (2002)
Spy satellites and other intelligence technologies that changed history
by: Graham, Thomas 1933-
Published: (2007)
by: Graham, Thomas 1933-
Published: (2007)
Crimes of dissent civil disobedience, criminal justice, and the politics of conscience
by: Lovell, Jarret S.
Published: (2009)
by: Lovell, Jarret S.
Published: (2009)
Courts and Criminals
by: Train, Arthur Cheney, 1875-1945
Published: (2004)
by: Train, Arthur Cheney, 1875-1945
Published: (2004)
Citizen spies the long rise of America's surveillance society
by: Reeves, Joshua
Published: (2017)
by: Reeves, Joshua
Published: (2017)
US national cybersecurity international politics, concepts and organization
Published: (2017)
Published: (2017)
Dam Sector Protection and Homeland Security /
by: Spellman, Frank R.
Published: (2017)
by: Spellman, Frank R.
Published: (2017)
Sense and nonsense about crime and drugs a policy guide
by: Walker
Published: (1998)
by: Walker
Published: (1998)
Star wars US tools of space supremacy
by: Wirbel, Loring
Published: (2004)
by: Wirbel, Loring
Published: (2004)
Homeland security preparedness and information systems strategies for managing public policy /
by: Reddick, Christopher G.
Published: (2010)
by: Reddick, Christopher G.
Published: (2010)
Homeland Security The Essentials
by: Bullock, Jane A., et al.
Published: (2018)
by: Bullock, Jane A., et al.
Published: (2018)
COMMERCIAL FACILITIES PROTECTION AND HOMELAND SECURITY /
by: Spellman, Frank R.
Published: (2019)
by: Spellman, Frank R.
Published: (2019)
National security management national security policy formulation institutions, processes and issues
by: Dixon
Published: (1984)
by: Dixon
Published: (1984)
Pensions, social security and the privatization of risk
Published: (2009)
Published: (2009)
Similar Items
-
Privacy on the line the politics of wiretapping and encryption
by: Diffie, Whitfield, et al.
Published: (2007) -
Surveillance and threat detection prevention versus mitigation
by: Kirchner, Richard, Jr
Published: (2014) -
Review of the federal strategy for nanotechnology-related environmental, health, and safety research
Published: (2009) -
Everyday surveillance vigilance and visibility in postmodern life
by: Staples, William G.
Published: (2014) -
Space and security a reference handbook
by: Hays, Peter L.
Published: (2011)


