
Онлайн книга «Великий Китайский Файрвол»
351 Holdstock, China’s Forgotten People, p. 121. 352 R. Kadeer, ‘The real Uyghur story’, The Wall Street Journal, 8 July 2009, https://www.wsj.com/articles/SB124698273174806523 353 Holdstock, China’s Forgotten People, p. 197. 354 T. Ng, ‘Warning over Twitter, YouTube “subversion”: hostile forces exploiting web tools, article says’, South China Morning Post, 2009. 355 H. Szadziewski and G. Fay, ‘Trapped in a virtual cage: Chinese state repression of Uyghurs online’, Uyghur Human Rights Project, 2014, p. 2. 356 Имя изменено. Джесси периодически ездит в Синьцзян, поэтому в интересах собственной безопасности и безопасности своей семьи он попросил не указывать его настоящее имя. 357 Представленное здесь описание принципа работы интернета взято из технического описания проекта Стэнфордского университета (автор Рес Шулер) «Как работает интернет» (2002), а также карт физического интернета TeleGeography. 358 См. карту подводных кабелей по адресу http://www.submarinecablemap.com/#/submarine-cable/asia-america-gateway-aag-cable-system 359 См. http://visitslo.com/ 360 H. Timmons, ‘Ruptures call safety of internet cables into question’, International Herald Tribune, 4 February 2008, https://web.archive.org/web/20080206083645/http://www.iht.com/articles/2008/02/04/technology/cables.php 361 D. Herold, Online Society in China: creating, celebrating, and instrumentalising the online carnival, London: Routledge, 2011, p. 1. 362 Карта сети China Unicom: http://www.chinaunicom.com.sg/network-map. 363 Карта сети China Telecom: http://web.archive.org/web/20170330101644/http://www.chinatelecom.com.hk/www/other/global и http://ipms.chinatelecomglobal.com/resources/images/continents/APAC.jpg 364 Интервью автора с исследователем интернет-инфраструктуры Дагом Мэдори и ученым Локманом Цуем, март 2017 г. 365 Например, IP-адреса провайдера Hong Kong Broadband начинаются с номеров 59.149.207, а номера с 202.160.0 и далее – это IP-адреса брунейского провайдера TelBru. 366 D. Wang, ‘After July 5th, there are no netizens in Xinjiang’, China Digital Times, 24 October 2009, https://chinadigitaltimes.net/2009/10/wang-dahao-%E7%8E%8B%E5%A4%A7%E8%B1%AA-after-july-5th-there-are-no-netizens-in-xinjiang/ 367 D. Grammaticas, ‘Trekking 1,000km in China for e-mail’, BBC News, 11 February 2010, http://news.bbc.co.uk/2/hi/asia-pacific/8506601.stm 368 B. Cao, ‘A year without internet in Xinjiang’, Xinhua, 20 April 2014, https://web.archive.org/web/20140430043736/http://news.xinhuanet.com/english/indepth/2014-04/20/c_133276600.htm 369 Harris and Isa, ‘“Invitation to a mourning ceremony”’, p. 29. 370 M. Abdilim, ‘Uyghur webmasters sentenced’, Radio Free Asia, 28 July 2010, https://www.rfa.org/english/news/uyghur/webmasters-07282010170425.html 371 Szadziewski and Fay, ‘Trapped in a virtual cage’, p. 78. 372 J. Garnaut, ‘Obama behind release of Chinese activists’, The Age, 25 August 2009, https://www.theage.com.au/world/obama-behind-release-of-chinese-activists-20090824-ewhi.html 373 I. Tohti, ‘My ideals and the career path I have chosen’, Uyghur Online, 2011. Глава 13 374 R. Deibert, Black Code: inside the battle for cyberspace, Toronto: McClelland & Stewart, 2013, p. 21. 375 Интервью автора с Грегом Уолтоном, сентябрь 2017 г. 376 M. Kane, ‘“ILOVEYOU” e-mail worm invades PCs’, ZDNet, 4 May 2000, https://web.archive.org/web/20081227123742/http://news.zdnet.com/2100-9595_22-107318.html?legacy=zdnn 377 E. Chien, ‘VBS.LoveLetter.Var’, Symantec, 5 May 2002, https://www.symantec.com/security_response/writeup.jsp?docid=101670-121815-2258-99 378 P. Hayes, ‘No “sorry” from Love Bug author’, The Register, 11 May 2005, https://www.theregister.co.uk/2005/05/11/love_bug_author/ 379 ‘File on 4: Cyber spies’, BBC Radio 4, 25 September 2011, https://www.bbc.co.uk/programmes/b014q04r 380 G. Walton et al., ‘Tracking Ghostnet: investigating a cyber espionage network’, Information Warfare Monitor, 29 March 2009, p. 34. 381 ‘Threat encyclopedia: Ghostrat’, Trend Micro, 21 September 2012, https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ghostrat 382 Security Ninja, ‘Gh0st RAT part 2: packet structure and defense measures’, InfoSec Institute, http://resources.infosecinstitute.com/gh0st-rat-part-2-packet-structure-defense-measures/. 383 Walton et al., ‘Tracking Ghostnet’, pp. 40–4. 384 Walton et al., ‘Tracking Ghostnet’, p. 48. 385 M. Stokes, ‘The Chinese People’s Liberation Army signals intelligence and cyber reconnaissance infrastructure’, Project 2049, 2011, p. 10, https://web.archive.org/web/20180209020355/http://project2049.net/documents/pla_third_department_sigint_cyber_stokes_lin_hsiao.pdf Глава 14 386 Associated Press, ‘New US Embassy in Beijing dedicated’, Los Angeles Times, 8 August 2008, http://articles.latimes.com/2008/aug/08/world/fg-embassy8 387 K. Lee, Making a World of Difference, self-published, 2011. 388 A. Nathan and B. Gilley, China’s New Rulers: the secret files, New York NY: New York Review of Books, 2002, p. 112. 389 D. Piccuta, ‘Google China paying price for resisting censorship’, US Embassy cable, 18 May 2009, WikiLeaks, https://wikileaks.com/plusd/cables/09BEIJING1336_a.html 390 S. Levy, In the Plex: how Google thinks, works, and shapes our lives, New York NY: Simon and Schuster, 2011, p. 306. 391 E. Chang, ‘YouTube blocked in China’, CNN, 26 March 2009, http://edition.cnn.com/2009/TECH/ptech/03/25/youtube.china/ 392 L. Donnelly, P. Foster and A. Andrews, ‘China Google boss departure reignites debate over censorship’, The Telegraph, 5 September 2009, http://www.telegraph.co.uk/news/worldnews/asia/china/6143553/China-Google-boss-departure-reignites-debate-over-censorship.html 393 Lee, Making a World of Difference. 394 ‘Google claims harassment by Chinese government’, US Embassy cable, 12 July 2009, WikiLeaks, https://wikileaks.com/plusd/cables/09BEIJING1957_a.html 395 Levy, In the Plex, p. 309. 396 R. Westervelt, ‘For Google, DNS log analysis essential in Aurora attack investigation’, Search Security, 15 June 2010, http://searchsecurity.techtarget.com/news/1514965/For-Google-DNS-log-analysis-essential-in-Aurora-attack-investigation 397 G. Curtz, ‘Operation “Aurora” hit Google, others’, McAfee, 14 January 2010, https://web.archive.org/web/20120911141122/http://blogs.mcafee.com/corporate/cto/operation-aurora-hit-google-others |