INTERNET SECURITY IN LIGHT OF EDWARD SNOWDEN'S REVELATIONS
Abstract
Modern communication and modern business are linked to the massive use of the Internet and mobile communications. However, use of Internet and mobile communications can compromise the integrity and confidentiality of data during both their transmission and their storage. Attackers can be a single hacker, but also the highest government institutions. Remarkably rapid development of IT allows more efficient data protection, but also gives new opportunities for eavesdropping and spying. "Excess" of computing capacities on the attackers' side enables them to cover virtually all Internet users, including individuals. Even in situations with the latest protection there are ways to access data unnoticed. The topic becomes more significant when one considers the recent events related to an affair with wiretapping of internet posts by the NSA, which Edward Snowden revealed in The Guardian in June 2013. The publication of these secrets launched a flood of discussions that have confirmed that many (if not all) countries tapped telecommunication channels, and that the NSA only had the "misfortune" to be discovered first. In addition to collecting data from e-mails, of particular interest are flows of financial transactions. This information has contributed that this problem came to the focus of attention and that new rules and regulations will be created. This paper discusses the current state of the Internet business, and in paricular the protection of electronic mails.
Keywords
Full Text:
PDF (Serbian)References
Ackerman, S. (2013, 08 06). Former NSA chief warns of cyber-terror attacks if Snowden apprehended. Retrieved from theguardian: http://www.theguardian.com/technology/2013/aug/06/nsa-director-cyber-terrorism-snowden
Admin, J. (2011, 07 2). Man In The Middle Attack Using Ettercap. Retrieved from Hackaholic: http://www.101hacker.com/2011/03/man-in-middle-attack-using-ettercap.html
Anon. (2013, 08 01). Email. Retrieved from Surveillance Self-Defense: https://ssd.eff.org/tech/email
Betakit. (2013, 10 29). Number of cell phone plans expected to surpass world’s population in early 2014. Retrieved from Betakit: http://www.betakit.com/number-of-cell-phone-plans-expected-to-surpass-worlds-population-in-early-2014/
Constantin, L. (2011, 11 21). OpenPGP JavaScript Implementation Allows Webmail Encryption. Retrieved from PCWorld: http://www.pcworld.com/article/244406/openpgp_javascript_implementation_allows_webmail_encryption.html
Čekerevac, Z., Čekerevac, P., & Vasiljević, J. (2013, 09 07). Internet safety of SMEs regarding the security of electronic mail. Retrieved 09 19, 2013, from FBIM Transactions: http://www.meste.org/fbim/fbim_srpski/FBIM_najava/III_Cekerevac.pdf
European Central Bank. (2012, 09 10). Payment Statistics for 2011. Retrieved 12 02, 2013, from European Central Bank: http://www.ecb.europa.eu/press/pr/date/2012/html/pr120910.en.html
European Central Bank. (2013, 09 19). Payment statistics for 2012. Retrieved from European Central Bank: http://www.ecb.europa.eu/press/pr/date/2013/html/pr130910.en.html
FISA. (2008, 07 09). H.R. 6304(110th): FISA Amendments Act of 2008. Retrieved from govtrack.us: https://www.govtrack.us/congress/bills/110/hr6304/text
Franceschi-Bicchierai, L. (2013, 06 22). Revealed: British Spy Agency Secretly Taps Global Communications. Retrieved from Mashable: http://mashable.com/2013/06/21/gchq-spy-agency-taps-global-internet/
Galagher, S. (2013, 11 06). Googlers say “F*** you” to NSA, company encrypts internal network. From Ars Technica: http://arstechnica.com/information-technology/2013/11/googlers-say-f-you-to-nsa-company-encrypts-internal-network/
Geier, E. (2012, 04 25). How to encrypt your email. Retrieved from PCWorld: http://www.pcworld.com/article/254338/how_to_encrypt_your_email.html
Gellman, B. (2013, 10 30). NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say. Retrieved from The Washington Post: http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html
Greenwald, G., & MacAskill, E. (2013, 06 07). NSA Prism program taps in to user data of Apple, Google and others. The Guardian. Retrieved 08 04, 2013, from http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
Jungholt, T. (2013, 08 03). FDP-Minister will "Datenuntreue" bestrafen. Die Welt. Retrieved 09 20, 2013, from http://www.welt.de/politik/deutschland/article118648774/FDP-Minister-will-Datenuntreue-bestrafen.html
Mims, C. (2013, 11 14). Cisco’s disastrous quarter shows how NSA spying could freeze US companies out of a trillion-dollar opportunity. From Quartz: http://qz.com/147313/ciscos-disastrous-quarter-shows-how-nsa-spying-could-freeze-us-companies-out-of-a-trillion-dollar-opportunity/
Mirani, L. (2013, 06 11). Think U.S. Snooping Is Bad? Try Italy, India or Canada. Retrieved from Mashable: http://mashable.com/2013/06/11/nsa-privacy-italy-india-canada/
Moore, A. (2013, 08 07). Former NSA boss compares PRISM critics to Al Qaeda. Retrieved from deathandtaxes: http://www.deathandtaxesmag.com/203430/former-nsa-boss-compares-prism-critics-to-al-qaeda/
Nautiyal, A. (2013, 11 18). Google Encrypts Its Network to Counteract NSA Surveillance. From JOLT digest: http://jolt.law.harvard.edu/digest/privacy/google-encrypts-its-network-to-counteract-nsa-surveillance
Nikić, S. (2010, 03 05). Najčešće metode napada cyber kriminalaca i kako se odbraniti. Retrieved from IT Veštak: http://www.itvestak.org.rs/ziteh_10/zbornik_radova/Nikic%20Srdjan%20-%20Metode%20napada.pdf
Oremus, W. (2013, 10 30). To celebrate spying on Google users, the NSA drew a smiley face. Retrieved from Future tense: http://www.slate.com/blogs/future_tense/2013/10/30/nsa_smiley_face_muscular_spying_on_google_yahoo_speaks_volumes_about_agency.html
Osterman Research. (2013, 07). Why Should You Encrypt Email and What Happens if You Don’t? Retrieved from Osterman Research White Paper: http://www.ostermanresearch.com/whitepapers/orwp_0194.pdf
PAA. (2007, 08 05). Protect America Act of 2007. Retrieved from U.S. Government Printing Office: http://www.gpo.gov/fdsys/pkg/PLAW-110publ55/html/PLAW-110publ55.htm
Piermon, E. (2013, 07 12). Microsoft helped the NSA bypass encryption, new Snowden leak reveals. From RT - Russia Today: http://rt.com/usa/microsoft-nsa-snowden-leak-971/
Pramis, J. (2013, 02 28). Number of mobile phones to exceed world population by 2014. Retrieved from Digital trends: http://www.digitaltrends.com/mobile/mobile-phone-world-population-2014/
Radicati, S., & Levenstein, J. (2013, 04). Email Statistics Report, 2013-2017. Retrieved from The Radicati Group, Inc.: http://www.radicati.com/wp/wp-content/uploads/2013/04/Email-Statistics-Report-2013-2017-Executive-Summary.pdf
Rouse, M. (2007, 06). Man in the middle attack (fire brigade attack). Retrieved from SearchSecurity: http://searchsecurity.techtarget.com/definition/man-in-the-middle-attack
Snowden, E. (2013, 06 23). Edward Snowden News. Retrieved from Edward Snowden News: http://edward-snowden.net/category/edward-snowden/
Symantec. (2013, 03 13). Symantec Encryption Solutions for Email, Powered by PGP Technology. Retrieved 08 01, 2013, from Symantec: http://www.symantec.com/content/en/us/enterprise/fact_sheets/b-encryption-solutions-for-email.pdf
The Washington Post. (2013, 10 30). How the NSA's MUSCULAR program collects too much data from Yahoo and Google. Retrieved from The Washington Post - National Security: http://apps.washingtonpost.com/g/page/world/how-the-nsas-muscular-program-collects-too-much-data-from-yahoo-and-google/543/#document/p1/a129319
The World Bank. (2013). Mobile cellular subscriptions (per 100 people). Retrieved from The World Bank: http://data.worldbank.org/indicator/IT.CEL.SETS.P2
USA Patriot Act. (2001, 10 24). Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001. Retrieved 08 03, 2013, from epic.org: http://epic.org/privacy/terrorism/hr3162.html
Wilking, R. (2013, 11 27). Suspicious of NSA spying, Microsoft moves to encrypt internet traffic - report. From RT - Russia Today: http://rt.com/usa/microsoft-encryption-nsa-spying-358/
Refbacks
- There are currently no refbacks.
FBIM Transactions