litbaza книги онлайнДомашняяВеликий Китайский Файрвол - Джеймс Гриффитс

Шрифт:

-
+

Интервал:

-
+

Закладка:

Сделать
1 ... 83 84 85 86 87 88 89 90 91 ... 100
Перейти на страницу:

351 Holdstock, China’s Forgotten People, p. 121.

352 R. Kadeer, ‘The real Uyghur story’, The Wall Street Journal, 8 July 2009, https://www.wsj.com/articles/SB124698273174806523

353 Holdstock, China’s Forgotten People, p. 197.

354 T. Ng, ‘Warning over Twitter, YouTube “subversion”: hostile forces exploiting web tools, article says’, South China Morning Post, 2009.

355 H. Szadziewski and G. Fay, ‘Trapped in a virtual cage: Chinese state repression of Uyghurs online’, Uyghur Human Rights Project, 2014, p. 2.

356 Имя изменено. Джесси периодически ездит в Синьцзян, поэтому в интересах собственной безопасности и безопасности своей семьи он попросил не указывать его настоящее имя.

357 Представленное здесь описание принципа работы интернета взято из технического описания проекта Стэнфордского университета (автор Рес Шулер) «Как работает интернет» (2002), а также карт физического интернета TeleGeography.

358 См. карту подводных кабелей по адресу http://www.submarinecablemap.com/#/submarine-cable/asia-america-gateway-aag-cable-system

359 См. http://visitslo.com/

360 H. Timmons, ‘Ruptures call safety of internet cables into question’, International Herald Tribune, 4 February 2008, https://web.archive.org/web/20080206083645/http://www.iht.com/articles/2008/02/04/technology/cables.php

361 D. Herold, Online Society in China: creating, celebrating, and instrumentalising the online carnival, London: Routledge, 2011, p. 1.

362 Карта сети China Unicom: http://www.chinaunicom.com.sg/network-map.

363 Карта сети China Telecom: http://web.archive.org/web/20170330101644/http://www.chinatelecom.com.hk/www/other/global и http://ipms.chinatelecomglobal.com/resources/images/continents/APAC.jpg

364 Интервью автора с исследователем интернет-инфраструктуры Дагом Мэдори и ученым Локманом Цуем, март 2017 г.

365 Например, IP-адреса провайдера Hong Kong Broadband начинаются с номеров 59.149.207, а номера с 202.160.0 и далее – это IP-адреса брунейского провайдера TelBru.

366 D. Wang, ‘After July 5th, there are no netizens in Xinjiang’, China Digital Times, 24 October 2009, https://chinadigitaltimes.net/2009/10/wang-dahao-%E7%8E%8B%E5%A4%A7%E8%B1%AA-after-july-5th-there-are-no-netizens-in-xinjiang/

367 D. Grammaticas, ‘Trekking 1,000km in China for e-mail’, BBC News, 11 February 2010, http://news.bbc.co.uk/2/hi/asia-pacific/8506601.stm

368 B. Cao, ‘A year without internet in Xinjiang’, Xinhua, 20 April 2014, https://web.archive.org/web/20140430043736/http://news.xinhuanet.com/english/indepth/2014-04/20/c_133276600.htm

369 Harris and Isa, ‘“Invitation to a mourning ceremony”’, p. 29.

370 M. Abdilim, ‘Uyghur webmasters sentenced’, Radio Free Asia, 28 July 2010, https://www.rfa.org/english/news/uyghur/webmasters-07282010170425.html

371 Szadziewski and Fay, ‘Trapped in a virtual cage’, p. 78.

372 J. Garnaut, ‘Obama behind release of Chinese activists’, The Age, 25 August 2009, https://www.theage.com.au/world/obama-behind-release-of-chinese-activists-20090824-ewhi.html

373 I. Tohti, ‘My ideals and the career path I have chosen’, Uyghur Online, 2011.

Глава 13

374 R. Deibert, Black Code: inside the battle for cyberspace, Toronto: McClelland & Stewart, 2013, p. 21.

375 Интервью автора с Грегом Уолтоном, сентябрь 2017 г.

376 M. Kane, ‘“ILOVEYOU” e-mail worm invades PCs’, ZDNet, 4 May 2000, https://web.archive.org/web/20081227123742/http://news.zdnet.com/2100-9595_22-107318.html?legacy=zdnn

377 E. Chien, ‘VBS.LoveLetter.Var’, Symantec, 5 May 2002, https://www.symantec.com/security_response/writeup.jsp?docid=101670-121815-2258-99

378 P. Hayes, ‘No “sorry” from Love Bug author’, The Register, 11 May 2005, https://www.theregister.co.uk/2005/05/11/love_bug_author/

379 ‘File on 4: Cyber spies’, BBC Radio 4, 25 September 2011, https://www.bbc.co.uk/programmes/b014q04r

380 G. Walton et al., ‘Tracking Ghostnet: investigating a cyber espionage network’, Information Warfare Monitor, 29 March 2009, p. 34.

381 ‘Threat encyclopedia: Ghostrat’, Trend Micro, 21 September 2012, https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ghostrat

382 Security Ninja, ‘Gh0st RAT part 2: packet structure and defense measures’, InfoSec Institute, http://resources.infosecinstitute.com/gh0st-rat-part-2-packet-structure-defense-measures/.

383 Walton et al., ‘Tracking Ghostnet’, pp. 40–4.

384 Walton et al., ‘Tracking Ghostnet’, p. 48.

385 M. Stokes, ‘The Chinese People’s Liberation Army signals intelligence and cyber reconnaissance infrastructure’, Project 2049, 2011, p. 10, https://web.archive.org/web/20180209020355/http://project2049.net/documents/pla_third_department_sigint_cyber_stokes_lin_hsiao.pdf

Глава 14

386 Associated Press, ‘New US Embassy in Beijing dedicated’, Los Angeles Times, 8 August 2008, http://articles.latimes.com/2008/aug/08/world/fg-embassy8

387 K. Lee, Making a World of Difference, self-published, 2011.

388 A. Nathan and B. Gilley, China’s New Rulers: the secret files, New York NY: New York Review of Books, 2002, p. 112.

389 D. Piccuta, ‘Google China paying price for resisting censorship’, US Embassy cable, 18 May 2009, WikiLeaks, https://wikileaks.com/plusd/cables/09BEIJING1336_a.html

390 S. Levy, In the Plex: how Google thinks, works, and shapes our lives, New York NY: Simon and Schuster, 2011, p. 306.

391 E. Chang, ‘YouTube blocked in China’, CNN, 26 March 2009, http://edition.cnn.com/2009/TECH/ptech/03/25/youtube.china/

392 L. Donnelly, P. Foster and A. Andrews, ‘China Google boss departure reignites debate over censorship’, The Telegraph, 5 September 2009, http://www.telegraph.co.uk/news/worldnews/asia/china/6143553/China-Google-boss-departure-reignites-debate-over-censorship.html

393 Lee, Making a World of Difference.

394 ‘Google claims harassment by Chinese government’, US Embassy cable, 12 July 2009, WikiLeaks, https://wikileaks.com/plusd/cables/09BEIJING1957_a.html

395 Levy, In the Plex, p. 309.

396 R. Westervelt, ‘For Google, DNS log analysis essential in Aurora attack investigation’, Search Security, 15 June 2010, http://searchsecurity.techtarget.com/news/1514965/For-Google-DNS-log-analysis-essential-in-Aurora-attack-investigation

397 G. Curtz, ‘Operation “Aurora” hit Google, others’, McAfee, 14 January 2010, https://web.archive.org/web/20120911141122/http://blogs.mcafee.com/corporate/cto/operation-aurora-hit-google-others

1 ... 83 84 85 86 87 88 89 90 91 ... 100
Перейти на страницу:

Комментарии
Минимальная длина комментария - 20 знаков. Уважайте себя и других!
Комментариев еще нет. Хотите быть первым?