Шрифт:
Интервал:
Закладка:
351 Holdstock, China’s Forgotten People, p. 121.
352 R. Kadeer, ‘The real Uyghur story’, The Wall Street Journal, 8 July 2009, https://www.wsj.com/articles/SB124698273174806523
353 Holdstock, China’s Forgotten People, p. 197.
354 T. Ng, ‘Warning over Twitter, YouTube “subversion”: hostile forces exploiting web tools, article says’, South China Morning Post, 2009.
355 H. Szadziewski and G. Fay, ‘Trapped in a virtual cage: Chinese state repression of Uyghurs online’, Uyghur Human Rights Project, 2014, p. 2.
356 Имя изменено. Джесси периодически ездит в Синьцзян, поэтому в интересах собственной безопасности и безопасности своей семьи он попросил не указывать его настоящее имя.
357 Представленное здесь описание принципа работы интернета взято из технического описания проекта Стэнфордского университета (автор Рес Шулер) «Как работает интернет» (2002), а также карт физического интернета TeleGeography.
358 См. карту подводных кабелей по адресу http://www.submarinecablemap.com/#/submarine-cable/asia-america-gateway-aag-cable-system
359 См. http://visitslo.com/
360 H. Timmons, ‘Ruptures call safety of internet cables into question’, International Herald Tribune, 4 February 2008, https://web.archive.org/web/20080206083645/http://www.iht.com/articles/2008/02/04/technology/cables.php
361 D. Herold, Online Society in China: creating, celebrating, and instrumentalising the online carnival, London: Routledge, 2011, p. 1.
362 Карта сети China Unicom: http://www.chinaunicom.com.sg/network-map.
363 Карта сети China Telecom: http://web.archive.org/web/20170330101644/http://www.chinatelecom.com.hk/www/other/global и http://ipms.chinatelecomglobal.com/resources/images/continents/APAC.jpg
364 Интервью автора с исследователем интернет-инфраструктуры Дагом Мэдори и ученым Локманом Цуем, март 2017 г.
365 Например, IP-адреса провайдера Hong Kong Broadband начинаются с номеров 59.149.207, а номера с 202.160.0 и далее – это IP-адреса брунейского провайдера TelBru.
366 D. Wang, ‘After July 5th, there are no netizens in Xinjiang’, China Digital Times, 24 October 2009, https://chinadigitaltimes.net/2009/10/wang-dahao-%E7%8E%8B%E5%A4%A7%E8%B1%AA-after-july-5th-there-are-no-netizens-in-xinjiang/
367 D. Grammaticas, ‘Trekking 1,000km in China for e-mail’, BBC News, 11 February 2010, http://news.bbc.co.uk/2/hi/asia-pacific/8506601.stm
368 B. Cao, ‘A year without internet in Xinjiang’, Xinhua, 20 April 2014, https://web.archive.org/web/20140430043736/http://news.xinhuanet.com/english/indepth/2014-04/20/c_133276600.htm
369 Harris and Isa, ‘“Invitation to a mourning ceremony”’, p. 29.
370 M. Abdilim, ‘Uyghur webmasters sentenced’, Radio Free Asia, 28 July 2010, https://www.rfa.org/english/news/uyghur/webmasters-07282010170425.html
371 Szadziewski and Fay, ‘Trapped in a virtual cage’, p. 78.
372 J. Garnaut, ‘Obama behind release of Chinese activists’, The Age, 25 August 2009, https://www.theage.com.au/world/obama-behind-release-of-chinese-activists-20090824-ewhi.html
373 I. Tohti, ‘My ideals and the career path I have chosen’, Uyghur Online, 2011.
Глава 13
374 R. Deibert, Black Code: inside the battle for cyberspace, Toronto: McClelland & Stewart, 2013, p. 21.
375 Интервью автора с Грегом Уолтоном, сентябрь 2017 г.
376 M. Kane, ‘“ILOVEYOU” e-mail worm invades PCs’, ZDNet, 4 May 2000, https://web.archive.org/web/20081227123742/http://news.zdnet.com/2100-9595_22-107318.html?legacy=zdnn
377 E. Chien, ‘VBS.LoveLetter.Var’, Symantec, 5 May 2002, https://www.symantec.com/security_response/writeup.jsp?docid=101670-121815-2258-99
378 P. Hayes, ‘No “sorry” from Love Bug author’, The Register, 11 May 2005, https://www.theregister.co.uk/2005/05/11/love_bug_author/
379 ‘File on 4: Cyber spies’, BBC Radio 4, 25 September 2011, https://www.bbc.co.uk/programmes/b014q04r
380 G. Walton et al., ‘Tracking Ghostnet: investigating a cyber espionage network’, Information Warfare Monitor, 29 March 2009, p. 34.
381 ‘Threat encyclopedia: Ghostrat’, Trend Micro, 21 September 2012, https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ghostrat
382 Security Ninja, ‘Gh0st RAT part 2: packet structure and defense measures’, InfoSec Institute, http://resources.infosecinstitute.com/gh0st-rat-part-2-packet-structure-defense-measures/.
383 Walton et al., ‘Tracking Ghostnet’, pp. 40–4.
384 Walton et al., ‘Tracking Ghostnet’, p. 48.
385 M. Stokes, ‘The Chinese People’s Liberation Army signals intelligence and cyber reconnaissance infrastructure’, Project 2049, 2011, p. 10, https://web.archive.org/web/20180209020355/http://project2049.net/documents/pla_third_department_sigint_cyber_stokes_lin_hsiao.pdf
Глава 14
386 Associated Press, ‘New US Embassy in Beijing dedicated’, Los Angeles Times, 8 August 2008, http://articles.latimes.com/2008/aug/08/world/fg-embassy8
387 K. Lee, Making a World of Difference, self-published, 2011.
388 A. Nathan and B. Gilley, China’s New Rulers: the secret files, New York NY: New York Review of Books, 2002, p. 112.
389 D. Piccuta, ‘Google China paying price for resisting censorship’, US Embassy cable, 18 May 2009, WikiLeaks, https://wikileaks.com/plusd/cables/09BEIJING1336_a.html
390 S. Levy, In the Plex: how Google thinks, works, and shapes our lives, New York NY: Simon and Schuster, 2011, p. 306.
391 E. Chang, ‘YouTube blocked in China’, CNN, 26 March 2009, http://edition.cnn.com/2009/TECH/ptech/03/25/youtube.china/
392 L. Donnelly, P. Foster and A. Andrews, ‘China Google boss departure reignites debate over censorship’, The Telegraph, 5 September 2009, http://www.telegraph.co.uk/news/worldnews/asia/china/6143553/China-Google-boss-departure-reignites-debate-over-censorship.html
393 Lee, Making a World of Difference.
394 ‘Google claims harassment by Chinese government’, US Embassy cable, 12 July 2009, WikiLeaks, https://wikileaks.com/plusd/cables/09BEIJING1957_a.html
395 Levy, In the Plex, p. 309.
396 R. Westervelt, ‘For Google, DNS log analysis essential in Aurora attack investigation’, Search Security, 15 June 2010, http://searchsecurity.techtarget.com/news/1514965/For-Google-DNS-log-analysis-essential-in-Aurora-attack-investigation
397 G. Curtz, ‘Operation “Aurora” hit Google, others’, McAfee, 14 January 2010, https://web.archive.org/web/20120911141122/http://blogs.mcafee.com/corporate/cto/operation-aurora-hit-google-others