Jared Cohen - The New Digital Age
Здесь есть возможность читать онлайн «Jared Cohen - The New Digital Age» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: Старинная литература, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:The New Digital Age
- Автор:
- Жанр:
- Год:неизвестен
- ISBN:нет данных
- Рейтинг книги:5 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 100
- 1
- 2
- 3
- 4
- 5
The New Digital Age: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The New Digital Age»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
The New Digital Age — читать онлайн бесплатно полную книгу (весь текст) целиком
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The New Digital Age», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:
new “cyber-industrial complex” somewhere between $80 billion and $150 billion annually: Ron Deibert and Rafal Rohozinski, “The New Cyber Military-Industrial Complex,” Globe and Mail (Toronto), March 28, 2011, http://www.theglobeandmail.com/commentary/the-new-cyber-military-industrial-complex/article573990.
A raid on the Egyptian state security building after the country’s: Ibid.; Eli Lake, “British Firm Offered Spy Software to Egypt,” Washington Times, April 25, 2011, http://www.washingtontimes.com/news/2011/apr/25/british-firm-offered-spy-software-to-egypt/?page=all#pagebreak.
Chinese telecom was contacted: WikiLeaks cable, “Subject: STIFLED POTENTIAL: FIBER-OPTIC CABLE LANDS IN TANZANIA, Origin: Embassy Dar Es Salaam (Tanzania), Cable time: Fri. 4 Sep 2009 04:48 UTC,” http://www.cablegatesearch.net/cable.php?id=09DARESSALAAM585.
Sichuan Hongda announced: Fumbuka Ng’wanakilala, “China Co Signs $3 Bln Tanzania Coal, Iron Deal,” Reuters, September 22, 2011, http://www.reuters.com/article/2011/09/22/tanzania-china-mining-idUSL5E7KM1HU20110922.
loan agreement with China: “China, Tanzania Sign $1 Bln Gas Pipeline Deal: Report,” Reuters, September 30, 2011, Africa edition, http://af.reuters.com/article/investingNews/idAFJOE78T08T20110930?pageNumber=1&virtualBrandChannel=0.
State-owned enterprises make up 80 percent: “Emerging-Market Multinationals: The Rise of State Capitalism,” Economist, January 21, 2012, http://www.economist.com/node/21543160.
$150 million loan for Ghana’s e-governance venture: Andrea Marshall, “China’s Mighty Telecom Footprint in Africa,” eLearning Africa News Portal, February 21, 2011, http://www.elearning-africa.com/eLA_Newsportal/china%E2%80%99s-mighty-telecom-footprint-in-africa/.
research hospital in Kenya: “East Africa: Kenya, China in Sh8 Billion University Hospital Deal,” AllAfrica, April 22, 2011, http://allafrica.com/stories/201104250544.html.
“African Technological City” in Khartoum: John G. Whitesides, “Better Diplomacy, Better Science,” China Economic Review, January 1, 1970, http://www.chinaeconomicreview.com/content/better-diplomacy-better-science.
There are currently four main manufacturers: Opinion of the authors.
Some refer to this as the upcoming Code War: Michael Riley and Ashlee Vance, “Cyber Weapons: The New Arms Race,” Bloomberg BusinessWeek, July 20, 2011, http://www.businessweek.com/magazine/cyber-weapons-the-new-arms-race-07212011.html. As you can see, we did not coin the term “code war.”
DDoS attacks crippled major government websites: Kim Zetter, “Lawmaker Wants ‘Show of Force’ Against North Korea for Website Attacks,” Wired, July 10, 2009, http://www.wired.com/threatlevel/2009/07/show-of-force/.
suggested that the network of attacking computers, or botnet, began in North Korea: Choe Sang-Hun and John Markoff, “Cyberattacks Jam Government and Commercial Web Sites in U.S. and South Korea,” New York Times, July 9, 2009, http://www.nytimes.com/2009/07/10/technology/10cyber.html?_r=1; Associated Press (AP), “U.S. Officials Eye N. Korea in Cyberattack,” USA Today, July 9, 2009, http://usatoday30.usatoday.com/news/washington/2009-07-08-hacking-washington-nkorea_N.htm.
Officials in Seoul directly pointed their fingers at Pyongyang: Choe and Markoff, “Cyberattacks Jam Government and Commercial Web Sites in U.S. and South Korea,” New York Times, July 9, 2009.
Republican lawmaker demanded: Zetter, “Lawmaker Wants ‘Show of Force’ Against North Korea for Website Attacks,” Wired, July 10, 2009.
analysts concluded they had no evidence that North Korea or any other state was involved: Lolita C. Baldor, Associated Press (AP), “US Largely Ruling Out North Korea in 2009 Cyber Attacks,” USA Today, July 6, 2010, http://usatoday30.usatoday.com/tech/news/computersecurity/2010-07-06-nkorea-cyber-attacks_N.htm.
analyst in Vietnam had earlier said that the attacks originated in the United Kingdom: Martyn Williams, “UK, Not North Korea, Source of DDOS Attacks, Researcher Says,” IDG News Service and Network World, July 14, 2009, http://www.networkworld.com/news/2009/071409-uk-not-north-korea-source.html?ap1=rcb.
South Koreans insisted: “N. Korean Ministry Behind July Cyber Attacks: Spy Chief,” Yonhap News, October 30, 2009, http://english.yonhapnews.co.kr/northkorea/2009/10/30/0401000000AEN20091030002200315.HTML.
semiconductors and motor vehicles to jet-propulsion technology: Michael Riley and Ashlee Vance, “Inside the Chinese Boom in Corporate Espionage,” Bloomberg BusinessWeek, March 15, 2012, http://www.businessweek.com/articles/2012-03-14/inside-the-chinese-boom-in-corporate-espionage.
England’s East India Company hired a Scottish botanist: “Famous Cases of Corporate Espionage,” Bloomberg BusinessWeek, September 20, 2011, http://images.businessweek.com/slideshows/20110919/famous-cases-of-corporate-espionage#slide3.
Chinese couple in Michigan: Ed White, Associated Press (AP), “Shanshan Du, Ex-GM Worker, Allegedly Tried to Sell Hybrid Car Secrets to Chinese Companies,” Huffington Post, July 23, 2010, http://www.huffingtonpost.com/2010/07/23/shanshan-du-ex-gm-worker_n_656894.html.
Chinese employee of Valspar Corporation: “Cyber Espionage: An Economic Issue,” China Caucus (blog), Congressional China Caucus, November 9, 2011, http://forbes.house.gov/chinacaucus/blog/?postid=268227; Foreign Spies Stealing U.S. Economic Secrets in Cyberspace, Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009 – 2011 , Office of the National Counterintelligence Executive, (October 2011), 3, http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf.
DuPont chemical researcher: “Economic Espionage,” Office of the National Counterintelligence Executive, accessed October 22, 2012, http://www.ncix.gov/issues/economic/index.php.
“The basic premise is that when you have a network disease”: Craig Mundie in discussion with the authors, November 2011.
In Mundie’s vision: Ibid.
10 million lines of code: DARPA, “DARPA Increases Top Line Investment in Cyber Research by 50 Percent over next Five Years,” news release, November 7, 2011, http://www.darpa.mil/NewsEvents/Releases/2011/11/07.aspx; Spencer Ackerman, “Darpa Begs Hackers: Secure Our Networks, End ‘Season of Darkness,’ ” Danger Room (blog), Wired, November 7, 2011, http://www.wired.com/dangerroom/2011/11/darpa-hackers-cybersecurity/.
“We went after the technological shifts”: Regina Dugan, in discussion with the authors, July 2012.
They brought together cybersecurity experts: Cheryl Pellerin, American Forces Press Service, “DARPA Goal for Cybersecurity: Change the Game,” U.S. Air Force, December 20, 2010, http://www.af.mil/news/story.asp?id=123235799.
CHAPTER 4
THE FUTURE OF REVOLUTION
countries coming online have incredibly young populations: See low Internet penetration in 2011 for Ethiopia, Pakistan and the Philippines in “Percentage of Individuals Using the Internet,” International Telecommunication Union (ITU), ICT Data and Statistics (IDS), accessed October 16, 2012, http://www.itu.int/ITU-D/ict/statistics/, and young populations for those countries as of 2011 in “Mid-Year Population by Five Year Age Groups and Sex—Custom Region—Ethiopia, Pakistan, Philippines,” U.S. Census Bureau, International Data Base, accessed October 16, 2012, http://www.census.gov/population/international/data/idb/region.php.
Читать дальшеИнтервал:
Закладка:
Похожие книги на «The New Digital Age»
Представляем Вашему вниманию похожие книги на «The New Digital Age» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «The New Digital Age» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.