De mon sejour comme jeune ingenieur dans le gotha de l’Arpanet en 1969-1970, je me souviens davantage de l’Universite de Los Angeles en Californie (UCLA) comme d’un lieu ouvert et convivial, quelque peu surprenant pour un ingenieur... more
De mon sejour comme jeune ingenieur dans le gotha de l’Arpanet en 1969-1970, je me souviens davantage de l’Universite de Los Angeles en Californie (UCLA) comme d’un lieu ouvert et convivial, quelque peu surprenant pour un ingenieur francais de cette epoque, de l’ambiance contestataire du campus que d’une quelconque influence des « militaires ». Mon voyage temoigne de l’influence de l’Arpanet en France, notamment au sein d’une grande entreprise impliquee dans le « Plan calcul », la Compagnie internationale pour l’informatique (CII). De retour en France, l’experience acquise et la question devenue d’une brulante actualite de l’integration des transmission de donnees au sein des systemes informatiques me feront participer activement, avec d’autres, au « debat » assez vif qui divise les architectes-reseau de Bull, de Cyclades et de la DGT/CNET puis aux developpements de la fonction communication dans les machines de la CII et, apres la fusion avec Honeywell, dans celles de CII-HB.
An Examination Of The Computer Underground From Conception To 2000. Hacking, Phreaking, Pirating & Social Engineering With Emphasis On Individuals & Groups. Redacted Public Edition
The concept of the internet started over 50 years ago when computers filled the entire room, today it is an ubiquitous information infrastructure, the initial prototype of what J. C. R. Licklider called the inter-galactic computer network... more
The concept of the internet started over 50 years ago when computers filled the entire room, today it is an ubiquitous information infrastructure, the initial prototype of what J. C. R. Licklider called the inter-galactic computer network Its history is complex and involves many aspects-technological, organizational, and community; its influence reaches not only to the technical field of computer communications but throughout society. Categorizing internet into different generations seeks to give us a microscopic view of what the internet was, what its now and its future. The internet generation is divided into four (4) guided by its usage, number of users, technology, protocols device used and transmission technology.
The thesis submits that current modalities of Internet governance are failing because they are predicated on political ideas, economic systems and legal structures which no longer reflect twenty-first century existence. The paper advances... more
The thesis submits that current modalities of Internet governance are failing because they are predicated on political ideas, economic systems and legal structures which no longer reflect twenty-first century existence. The paper advances this argument in four main ways. The first is by examining the ideology and cartographic technology of the Westphalian nation-state and the challenge posed to its underlying logic by the spatial and multi-jurisdictional nature of cyberspace. Second, the paper interrogates the legal, ethical and philosophical basis of the post World War II system of international relations, submitting that its founding principles are being superseded by the interrelated forces of globalization, privatization and programming code. At the same time the logic of state competition is resulting in Internet fragmentation, surveillance, censorship, information subversion and ‘norm-regression’ (Deibert, 2012). Thirdly, the thesis demonstrates that current multistakeholder approaches to Internet governance are lacking in democratic accountability, effectiveness and legitimacy, often serving to reify networks of private-capital and state power in the developed and developing world. The thesis concludes by submitting that the future systems of Internet governance will seek legitimacy by providing services to the billions of users of cyberspace, and will be constructed inside the network, rather than imposed externally from above and without.
Este artigo argumenta sobre a emergência da ciberguerra como nova forma de conflito internacional. É feita uma introdução à temática da guerra no ciberespaço, seguida de uma contextualização histórica que abrange o nascimento da ARPAnet1... more
Este artigo argumenta sobre a emergência da ciberguerra como nova forma de conflito internacional. É feita uma introdução à temática da guerra no ciberespaço, seguida de uma contextualização histórica que abrange o nascimento da ARPAnet1 e a sua evolução até à Internet que conhecemos hoje.
São analisados dois exemplos reais e paradigmáticos desta realidade: os ciberataques à República da Estónia e o ciberataque à central de produção de material nuclear de Natanz, no Irão, executado pelo Stuxnet2.
São, ainda, argumentadas questões que demonstram que as ICT 3 estão a fornecer às sociedades novas ferramentas para práticas antigas e a possibilitar a distribuição de poder (empowerment) pelos novos intervenientes desta emergente forma de guerra, seguidas da conclusão.
This article is dedicated to the emergence of the cyber war as a new form of international conflict. The topic of cyberspace war is introduced, followed by an historical background covering the birth and evolution of DARPA’s ARPAnet to the Internet we know today.
Two paradigmatic and real examples of this new reality: the cyber attacks to the Republic of Estonia and the cyber attacks to Iran’s Natanz nuclear material production facility, executed by Stuxnet, are analysed.
The issues about ICT allowing the use of new tools to perform old practices and the distribution of power (empowerment) among new actors in this emerging way of war, are also discussed, followed by the conclusion.
"In not many years the human mind and computers will be very closely interconnected and this man-machine alliance will be able to think as no human being has ever neglected ..."
With increasing frequency, organizations are implementing intranets to improve their internal communication, increase productivity and reduce operating expenses. This paper defines the need for improved internal communication, outlines... more
With increasing frequency, organizations are implementing intranets to improve their internal communication, increase productivity and reduce operating expenses. This paper defines the need for improved internal communication, outlines the history of intranets, explores their benefits, notes the risks and solutions, and offers implementation insights to which an organization can refer.
El alcance de los cambios que las tecnologías electrónicas y digitales comportan no ha pasado desapercibido para las ciencias sociales. Mucho se ha escrito acerca de nuevos espacios de deliberación política y de los hábitos de consumo... more
El alcance de los cambios que las tecnologías electrónicas y digitales comportan no ha pasado desapercibido para las ciencias sociales. Mucho se ha escrito acerca de nuevos espacios de deliberación política y de los hábitos de consumo asociados a internet y a las llamadas redes sociales o virtuales. Relativamente menos, sin embargo, ha sido dicho sobre la temática desde la perspectiva de la producción científico-técnica. Tenemos, ciertamente, etnografías de grandes centros de investigación, como el laboratorio de Los Alamos (LANL) y de consorcios públicos-privados como el Xerox PARC o el Media Lab del MIT, relatos que coronan las tareas de informáticos y de ingenieros pioneros, estudios sobre los trabajos de los representantes de la primera generación de la cibernética. El interés en analizar espacios de producción de tecnologías es creciente, sobre todo, en lo que se refiere a su incidencia en las prácticas teórico-experimentales en diversos dominios científicos. Aun cuando tratan la temática, la mayoría de esos trabajos no tiene a la producción de software como principal objeto de indagación (...)
Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are selfconfigurable and autonomous systems... more
Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are selfconfigurable and autonomous systems which are able to support movability and organize themselves arbitrarily. These unique characteristics of ad hoc networks pose a number of challenges for the implementation of security infrastructure in the wireless network system design. In this paper, we study the ad-hoc architecture thus understanding the vulnerabilities and security goals. Further, we discuss the various security attacks and explore approaches to secure the communication.