Narrow your search
Listing 1 - 10 of 10
Sort by

Book
Eavesdropping
Author:
ISBN: 0191613665 1282613286 9786612613289 0191576190 9780191576195 9780199236138 0199236135 Year: 2010 Publisher: Oxford Oxford University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Why we can't resist listening in on our neighboursEavesdropping has a bad name. It is a form of human communication in which the information gained is stolen, and where such words as cheating and spying come into play. But eavesdropping may also be an attempt to understand what goes on in the lives of others so as to know better how to live one's own. John Locke's entertaining and disturbing account explores everything from sixteenth-century voyeurism to Hitchcock's 'Rear Window'; from chimpanzee behaviour to Parisian caf--eacute--; society; fromprivate eyes to Facebook and Twitter. He uncover


Book
Wiretaps and electronic eavesdropping : federal law and legal ethics
Authors: ---
ISBN: 1622579933 Year: 2013 Publisher: New York : Nova Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Privacy : an overview of federal law governing wiretapping and electronic eavesdropping
Author:
ISBN: 1536113824 9781536113822 9781607416548 1607416549 Year: 2010 Publisher: New York : Nova Science Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Foreign Intelligence Surveillance Act issues
Author:
ISBN: 1631171674 9781631171673 9781631171567 Year: 2014 Publisher: New York

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The Foreign Intelligence Surveillance Act and its ramifications
Author:
ISBN: 1613240503 Year: 2010 Publisher: New York : Nova Science Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Technological Surveillance of Communication in American, German and Chinese Criminal Procedure..
Author:
Year: 2022 Publisher: Berlin : Duncker & Humblot,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Due to the rise of organized crime and the rapid development of surveillance technologies, such technologies are increasingly used for the purpose of criminal investigation. However, the proliferation of such highly intrusive measures can jeopardize the individual right to privacy and the constitutionally protected secrecy of private telecommunication. It is therefore necessary to devise a legal framework that balances the need for efficient law enforcement with individuals' privacy rights. In this study, the author discusses the laws on covert surveillance as an investigative measure in the criminal process of the United States, Germany, and the P.R. China from theoretical and empirical perspectives. The author then provides a horizontal comparison of the three legal systems, with the aim of identifying solutions that achieve a proper balance between the protection of the right to privacy and the effective combat of crime.Due to the rise of organized crime and the rapid development of surveillance technologies, such technologies are increasingly used for the purpose of criminal investigation. However, the proliferation of such highly intrusive measures can jeopardize the individual right to privacy and the constitutionally protected secrecy of private telecommunication. It is therefore necessary to devise a legal framework that balances the need for efficient law enforcement with individuals' privacy rights. In this study, the author discusses the laws on covert surveillance as an investigative measure in the criminal process of the United States, Germany, and the P.R. China from theoretical and empirical perspectives. The author then provides a horizontal comparison of the three legal systems, with the aim of identifying solutions that achieve a proper balance between the protection of the right to privacy and the effective combat of crime.


Periodical
Surveillance & society.
Author:
Year: 2002 Publisher: [Newcastle upon Tyne?] : [United Kingdom] : [University of Newcastle upon Tyne?], Surveillance Studies Network

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Redesigning wiretapping : the digitization of communications interception
Author:
ISBN: 3030399192 3030399184 Year: 2020 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11. It pays particular attention to the 1990s, which marked one of the most dramatic turns in the history of telecommunications interception. During that time, fiber optic and satellite networks rapidly replaced the copper-based analogue telephone system that had remained virtually unchanged since the 1870s. That remarkable technological advance facilitated the rise of the networked home computer, cellular telephony, and the Internet, and users hailed the dawn of the digital information age. However, security agencies such as the FBI and MI5 were concerned. Since the emergence of telegraphy in the 1830s, security services could intercept private messages using wiretaps, and this was facilitated by some of the world's largest telecommunications monopolies such as AT&T in the US and British Telecom in the UK. The new, digital networks were incompatible with traditional wiretap technology. To make things more complicated for the security services, these monopolies had been privatized and broken up into smaller companies during the 1980s, and in the new deregulated landscape the agencies had to seek assistance from thousands of startup companies that were often unwilling to help. So for the first time in history, technological and institutional changes posed a threat to the security services’ wiretapping activities, and government officials in Washington and London acted quickly to protect their ability to spy, they sought to force the industry to change the very architecture of the digital telecommunications network. This book describes in detail the tense negotiations between governments, the telecommunications industry, and civil liberties groups during an unprecedented moment in history when the above security agencies were unable to wiretap. It reveals for the first time the thoughts of some of the protagonists in these crucial negotiations, and explains why their outcome may have forever altered the trajectory of our information society.

Eavesdropping in the novel from Austen to Proust
Author:
ISBN: 1107126002 1280159723 0511120761 0511042604 0511157916 0511329865 0511484801 0511045824 9780511042607 9780511120763 9780511045820 9780511484803 9780521815857 0521815851 9780521038904 0521038901 Year: 2002 Publisher: Cambridge, U.K. ; New York : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Eavesdropping in the Novel from Austen to Proust investigates human curiosity and its representation in eavesdropping scenes in nineteenth-century English and French novels. Ann Gaylin argues that eavesdropping dramatizes a primal human urge to know and offers a paradigm of narrative transmission and reception of information among characters, narrators and readers. Gaylin sheds light on the social and psychological effects of the nineteenth-century rise of information technology and accelerated flow of information, as manifested in the anxieties about - and delight in - displays of private life and its secrets. Analysing eavesdropping in Austen, Balzac, Collins, Dickens and Proust, Gaylin demonstrates the flexibility of the scene to produce narrative complication or resolution; to foreground questions of gender and narrative agency; to place the debates of privacy and publicity within the literal and metaphoric spaces of the nineteenth-century novel. This 2003 study will be of interest to scholars of nineteenth-century English and European literature.

Keywords

English fiction --- Eavesdropping in literature. --- Comparative literature --- French fiction --- History and criticism. --- English and French. --- French and English. --- Austen, Jane, --- Collins, Wilkie, --- Balzac, Honoré de, --- Proust, Marcel, --- de Balzac, Honoré --- de Balzac, H. --- Balzac, Honoré de --- Collins, William Wilkie, --- Collins, William Wilkie --- Kollinz, Uilki, --- Collins, W., --- Collins, W. Wilkie, --- Коллинз, Уилки, --- קולינס, וילקי, --- 柯林斯威尔基, --- Ao-ssu-ting, --- Ao-ssu-ting, Chien, --- Aosiding, --- Aosiding, Jian, --- Āsṭin̲, Jēn̲, --- Austenová, Jane, --- Osten, Dzheĭn, --- Ostin, Dzhein, --- Lady, --- Author of Sense and Sensibility, --- Остен, Джейн, --- Остен, Джейм, --- אוסטן, ג׳יין --- אוסטן, ג׳יין, --- أوستن، جين، --- Views on eavesdropping. --- Prust, Marselʹ, --- Proust, Valentin Louis Georges Eugène Marcel, --- Pʻŭrusŭtʻŭ, Marŭsel, --- Pʻu-lu-ssu-tʻe, --- Пруст, Марсель, --- פרוסט, מארסל --- פרוסט, מרסל --- ,פרוסט, מרסל --- بروست، مارسيل،, --- Criticism and interpretation. --- Ba'erzhake, --- Balzac, H. de --- Balzac, Honorato, --- Balzak, --- Balʹzak, Onore, --- Balzaḳ, Onoreh deh, --- Balzāk, Ūnūrīh dī, --- Banzăc, Hônôrê đơ, --- Baruzakku, --- de Balzac, Honorato, --- Jeune célibataire, --- Pa-erh-cha-kʻo, --- Бальзак, Оноре де, --- באלזאק, אנארע דע, --- באלזאק, אונורה דה, --- באלזאק, האָנאָרע דע, --- בלזק, אונורה דה, --- בלזק, הונורה דה-, --- דע־באלזאק, האָנאָרע, --- بالزاك، انوره دو --- バルザック, --- 巴爾札克, --- 巴爾扎克, --- R'Hoone, --- Saint-Aubin, Horace de, --- Cloteaux, Aurore --- Arts and Humanities --- Literature --- Proust, Marcel --- Balzac, Honore de,


Book
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Author:
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.

Listing 1 - 10 of 10
Sort by