![]() ![]() However, “it was not possible to retrofit security,” so no system is immune to intrusion, theft, and damage. In the 1980s, when experts discovered how easily hackers could penetrate computers, they began designing patches, firewalls, and other defenses. No one designed operating systems for security. In response, and also to detect the activity of terrorists, security organizations such as the National Security Agency sweep up immense quantities of information, including that of their own citizens, and filter it for suspicious activity. By the end of the Cold War, technical advances enabled hackers and spies to steal “data at rest” inside a computer rather than struggle to intercept “data in motion” traveling from one place to another. Computers remain essential to espionage and other dubious activities, writes BBC security correspondent Corera ( The Art of Betrayal: The Secret History of MI6: Life and Death in the British Secret Service, 2013, etc.) in this engrossing history of the dark side of the information revolution. ![]() Built to decipher German codes, it performed brilliantly. In 1944, the first programmable electronic computer began operation in Britain’s Bletchley Park. ![]() ![]() The history of cyberespionage, combining “related stories like encryption and code-breaking the rise of the computer industry and its complex relationship with the secret world.” ![]()
0 Comments
Leave a Reply. |