Рейтинговые книги
Читем онлайн Великий китайский файрвол - Джеймс Гриффитс

Шрифт:

-
+

Интервал:

-
+

Закладка:

Сделать
1 ... 87 88 89 90 91 92 93 94 95 ... 101
Harris and A. Isa, ‘“Invitation to a mourning ceremony”: perspectives on the Uyghur internet’, Inner Asia 13 (2011), p. 30.

347

M. Amir-Ebrahimi, ‘Performance in everyday life and the rediscovery of the “self” in Iranian weblogs’, Bad Jens, 2004.

348

C. Larson, ‘How China wins and loses Xinjiang’, Foreign Policy, 10 July 2009, http://foreignpolicy.com/2009/07/10/how-china-wins-and-loses-xinjiang/

349

Harris and Isa, ‘“Invitation to a mourning ceremony”’, p. 28.

350

Анонимный автор «Шаогуаньский инцидент: трагедия и возможность», сайт «Уйгур Онлайн», в сокращении и в переводе с китайского.

351

Holdstock, China’s Forgotten People, p. 121.

352

R. Kadeer, ‘The real Uyghur story’, The Wall Street Journal, 8 July 2009, https://www.wsj.com/articles/SB124698273174806523

353

Holdstock, China’s Forgotten People, p. 197.

354

T. Ng, ‘Warning over Twitter, YouTube “subversion”: hostile forces exploiting web tools, article says’, South China Morning Post, 2009.

355

H. Szadziewski and G. Fay, ‘Trapped in a virtual cage: Chinese state repression of Uyghurs online’, Uyghur Human Rights Project, 2014, p. 2.

356

Имя изменено. Джесси периодически ездит в Синьцзян, поэтому в интересах собственной безопасности и безопасности своей семьи он попросил не указывать его настоящее имя.

357

Представленное здесь описание принципа работы интернета взято из технического описания проекта Стэнфордского университета (автор Рес Шулер) «Как работает интернет» (2002), а также карт физического интернета TeleGeography.

358

См. карту подводных кабелей по адресу http://www.submarinecablemap.com/#/submarine-cable/asia-america-gateway-aag-cable-system

359

См. http://visitslo.com/

360

H. Timmons, ‘Ruptures call safety of internet cables into question’, International Herald Tribune, 4 February 2008, https://web.archive.org/web/20080206083645/http://www.iht.com/articles/2008/02/04/technology/cables.php

361

D. Herold, Online Society in China: creating, celebrating, and instrumentalising the online carnival, London: Routledge, 2011, p. 1.

362

Карта сети China Unicom: http://www.chinaunicom.com.sg/network-map.

363

Карта сети China Telecom: http://web.archive.org/web/20170330101644/http://www.chinatelecom.com.hk/www/other/global и http://ipms.chinatelecomglobal.com/resources/images/continents/APAC.jpg

364

Интервью автора с исследователем интернет-инфраструктуры Дагом Мэдори и ученым Локманом Цуем, март 2017 г.

365

Например, IP-адреса провайдера Hong Kong Broadband начинаются с номеров 59.149.207, а номера с 202.160.0 и далее – это IP-адреса брунейского провайдера TelBru.

366

D. Wang, ‘After July 5th, there are no netizens in Xinjiang’, China Digital Times, 24 October 2009, https://chinadigitaltimes.net/2009/10/wang-dahao-%E7%8E%8B%E5%A4%A7%E8%B1%AA-after-july-5th-there-are-no-netizens-in-xinjiang/

367

D. Grammaticas, ‘Trekking 1,000km in China for e-mail’, BBC News, 11 February 2010, http://news.bbc.co.uk/2/hi/asia-pacific/8506601.stm

368

B. Cao, ‘A year without internet in Xinjiang’, Xinhua, 20 April 2014, https://web.archive.org/web/20140430043736/http://news.xinhuanet.com/english/indepth/2014-04/20/c_133276600.htm

369

Harris and Isa, ‘“Invitation to a mourning ceremony”’, p. 29.

370

M. Abdilim, ‘Uyghur webmasters sentenced’, Radio Free Asia, 28 July 2010, https://www.rfa.org/english/news/uyghur/webmasters-07282010170425.html

371

Szadziewski and Fay, ‘Trapped in a virtual cage’, p. 78.

372

J. Garnaut, ‘Obama behind release of Chinese activists’, The Age, 25 August 2009, https://www.theage.com.au/world/obama-behind-release-of-chinese-activists-20090824-ewhi.html

373

I. Tohti, ‘My ideals and the career path I have chosen’, Uyghur Online, 2011.

374

R. Deibert, Black Code: inside the battle for cyberspace, Toronto: McClelland & Stewart, 2013, p. 21.

375

Интервью автора с Грегом Уолтоном, сентябрь 2017 г.

376

M. Kane, ‘“ILOVEYOU” e-mail worm invades PCs’, ZDNet, 4 May 2000, https://web.archive.org/web/20081227123742/http://news.zdnet.com/2100-9595_22-107318.html?legacy=zdnn

377

E. Chien, ‘VBS.LoveLetter.Var’, Symantec, 5 May 2002, https://www.symantec.com/security_response/writeup.jsp?docid=2000-121815-2258-99

378

P. Hayes, ‘No “sorry” from Love Bug author’, The Register, 11 May 2005, https://www.theregister.co.uk/2005/05/11/love_bug_author/

379

‘File on 4: Cyber spies’, BBC Radio 4, 25 September 2011, https://www.bbc.co.uk/programmes/b014q04r

380

G. Walton et al., ‘Tracking Ghostnet: investigating a cyber espionage network’, Information Warfare Monitor, 29 March 2009, p. 34.

381

‘Threat encyclopedia: Ghostrat’, Trend Micro, 21 September 2012, https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ghostrat

382

Security Ninja, ‘Gh0st RAT part 2: packet structure and defense measures’, InfoSec Institute, http://resources.infosecinstitute.com/gh0st-rat-part-2-packet-structure-defense-measures/.

383

Walton et al., ‘Tracking Ghostnet’, pp. 40–4.

384

Walton et al., ‘Tracking Ghostnet’, p. 48.

385

M. Stokes, ‘The Chinese People’s Liberation Army signals intelligence and cyber reconnaissance infrastructure’, Project 2049, 2011, p. 10, https://web.archive.org/web/20180209020355/http://project2049.net/documents/pla_third_department_sigint_cyber_stokes_lin_hsiao.pdf

386

Associated Press, ‘New US Embassy in Beijing dedicated’, Los Angeles Times, 8 August 2008, http://articles.latimes.com/2008/aug/08/world/fg-embassy8

387

K. Lee, Making a World of Difference, self-published, 2011.

388

A. Nathan and B. Gilley, China’s New Rulers: the secret files, New York NY: New York Review of Books, 2002, p. 112.

389

D. Piccuta, ‘Google China paying price for resisting censorship’, US Embassy cable, 18 May 2009, WikiLeaks, https://wikileaks.com/plusd/cables/09BEIJING1336_a.html

390

S. Levy, In the Plex: how Google thinks, works, and shapes our lives, New York NY: Simon and Schuster, 2011, p. 306.

391

E. Chang, ‘YouTube blocked in China’, CNN, 26 March 2009, http://edition.cnn.com/2009/TECH/ptech/03/25/youtube.china/

392

L. Donnelly, P. Foster and A. Andrews, ‘China Google boss departure reignites debate over censorship’, The Telegraph, 5 September 2009, http://www.telegraph.co.uk/news/worldnews/asia/china/6143553/China-Google-boss-departure-reignites-debate-over-censorship.html

393

Lee, Making a World of Difference.

394

‘Google claims harassment by Chinese government’, US Embassy cable, 12 July 2009, WikiLeaks, https://wikileaks.com/plusd/cables/09BEIJING1957_a.html

395

Levy, In the Plex, p. 309.

396

R. Westervelt, ‘For Google, DNS log analysis essential in Aurora attack investigation’, Search Security, 15 June 2010, http://searchsecurity.techtarget.com/news/1514965/For-Google-DNS-log-analysis-essential-in-Aurora-attack-investigation

397

G. Curtz, ‘Operation “Aurora” hit Google, others’, McAfee, 14 January 2010, https://web.archive.org/web/20120911141122/http://blogs.mcafee.com/corporate/cto/operation-aurora-hit-google-others

398

J. Markoff, ‘Cyberattack on Google said to hit password system’, The New York Times, 19 April 2010, https://www.nytimes.com/2010/04/20/technology/20google.html

399

B. Girard, The Google Way: how

1 ... 87 88 89 90 91 92 93 94 95 ... 101
На этой странице вы можете бесплатно читать книгу Великий китайский файрвол - Джеймс Гриффитс бесплатно.

Оставить комментарий