3,298
Views
0
CrossRef citations to date
0
Altmetric
Article

Project Spaceman: early British computer security and automatic data processing

References

  • Agar, J. The Government Machine: A Revolutionary History of the Computer. Cambridge MA: MIT Press, 2003.
  • Agar, J. “Putting the Spooks Back In? The UK Secret State and the History of Computing.” Information & Culture 51, no. 1 (2016): 102–124. doi:10.7560/IC51105.
  • Aldrich, R. J. “Whitehall Wiring: The Communications-Electronics Security Group and the Struggle for Secure Speech.” Public Policy and Administration 28, no. 2 (2013): 178–195. doi:10.1177/0952076712458111.
  • Aldrich, R. J. ”GCHQ and Computing: Teddy Poulden, IBM and ICL.” In Shaping British Foreign and Defence Policy in the Twentieth Century, edited by M. Murfett, pp. 240–253. London: Palgrave, 2014.
  • Anderson, J. P. “Computer Security Technology Planning Study.” US Air Force, Systems Command, Electronic Systems Division, ESD-TR-73-51, October, 1972.
  • Anderson, R. “Why Cryptosystems Fail.” Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS), December, 1993: 215–227. doi: 10.1145/168588.168615.
  • Andrew, C. M. Defend the Realm: The Authorized History of MI5. New York: Knopf, 2009.
  • Astrahan, M. M., and J. F. Jacobs. “History of the Design of the SAGE Computer-The AN/FSQ-7.” IEEE Annals of the History of Computing 5, no. 4 (1983): 340–349. doi:10.1109/MAHC.1983.10098.
  • Baumard, P. Cybersecurity in France. London: Springer International Publishing, 2017.
  • Bell, M. J. V. “Management Audit in the Ministry of Defence.” Public Administration 62, no. 3 (1984): 311–321. doi:10.1111/j.1467-9299.1984.tb00565.x.
  • Broad, W. J. “Computers and the US Military Don’t Mix: After 9 Years and More Than $1 Billion, the Pentagon’s Global Computer Network is Still on the Blink.” Science 207, no. 4436 (1980): 1183–1187.
  • Brown, T. “Modernisation or Failure? IT Development Projects in the UK Public Sector.” Financial Accountability & Management 17, no. 4 (2001): 363–381.
  • Brunner, J. The Shockwave Rider. New York: Harper & Row, 1975.
  • ””Bureau West” Centre.” Computer News.
  • Campbell, D., and S. Connor. 1981. “The Monster That Keep on Growing.” New Statesman, March 5.
  • Campbell-Kelly, M. ICL: A Business and Technical History. Oxford: Oxford University Press, 1989.
  • Campbell-Kelly, M. “ICL and the Evolution of the British Mainframe.” The Computer Journal 38, no. 5 (1995): 400–412. doi:10.1093/comjnl/38.5.400.
  • ”CESG: UK Systems Confidence Levels.” CESG Computer Security Memorandum no. 3, Issue 1/1, February, 1989.
  • Clarke, B., and W. Baker. “Bureau West Devizes, Wiltshire: An Early Component of the British Computer Landscape.” Wiltshire Archaeological & Natural History Magazine 113, no. 1 (2020): 251–261.
  • Conn, R. W., and R. H. Yamamoto. “A Model Highlighting the Security of Operating Systems.” Proceedings of the Association for Computing Machinery annual conference, January, 1974, 174–179. doi: 10.1145/800182.810399.
  • Davies, P. H. “The Problem of Defence Intelligence.” Intelligence and National Security 31, no. 6 (2016): 797–809. doi:10.1080/02684527.2015.1115234.
  • Department of Defence'5200.28-STD: Trusted Computer Systems Evaluation Criteria. Port George Meade, MD: National Computer Security Center, December, 1985.
  • Dullien, T. “Weird Machines, Exploitability, and Provable Unexploitability.” IEEE Transactions on Emerging Topics in Computing 8, no. 2 (2020): 391–403. doi:10.1109/TETC.2017.2785299.
  • Easter, D. “Protecting Secrets: British Diplomatic Cipher Machines in the Early Cold War, 1945–1970.” Intelligence and National Security 34, no. 2 (2019): 157–169. doi:10.1080/02684527.2018.1543749.
  • Eberle, S. J. A Life on the Ocean Wave. Durham: Roundtrip, 2006.
  • Farquhar, G. “The Defence Research Information Centre: Services and New Developments.” ASLIB Proceedings 41, no. 5 (1989): 169–178. doi:10.1108/eb051137.
  • Ferris, J. Behind the Enigma: The Authorised History of GCHQ - Britain’s Cyber-Intelligence Agency. London: Bloomsbury, 2020.
  • Gioe, D. V., M. S. Goodman, and T. Stevens. “Intelligence in the Cyber Era: Evolution or Revolution?” Political Science Quarterly 135, no. 2 (2020): 191–224. doi:10.1002/polq.13031.
  • Hicks, M. Programmed Inequality: How Britain Discarded Women. Cambridge MA: MIT Press, 2017.
  • Howard, H., and E. Wight. “For Your Eyes Only: MI5 Shares Unseen Images of Its Former Mayfair HQ, Where “Registry Queens” Carried Out Phone-Tapping.” Daily Mail, July 9, 2021. https://www.dailymail.co.uk/news/article-9769759/MI5-shares-unseen-images-former-Mayfair-HQ-Registry-Queens-carried-phone-tapping.html
  • Jones, A. K., and R. J. Lipton. “The Enforcement of Security Policies for Computation”, Proceedings of the fifth Association for Computing Machinery symposium on operating systems principles (SOSP), November, 1975, 197–206. doi: 10.1145/800213.806538.
  • Lavington, S. Moving Targets: Elliott-Automation and the Dawn of the Computer Age. London: Springer, 2011.
  • Lavington, S. Early Computing in Britain: Ferranti Ltd. and Government. London: Springer, 2019.
  • Lean, T. Electronic Dreams: How 1980s Britain Learned to Love the Computer. London: Bloomsbury, 2016.
  • Mercuri, R. T., and P. G. Neumann. “Security by Obscurity.” Communications of the ACM 46, no. 11, November (2003): 160. doi:10.1145/948383.948413.
  • New Scientist, MoD Computer Post Advertisements, September 6, 1979.
  • Norman, A. R. D. Computer Insecurity. London: Chapman & Hall, 1983.
  • Parker, T. A. “Security in a Large General-Purpose Operating System: Icl’s Approach in VME/2900.” ICL Technical Journal 3, no. 1 (1982): 28–42.
  • Parker, T. A. ”The VME High Security Option.” ICL Technical Journal 6, no. 4 (November, 1989): 657–670.
  • Rice, M. A., and A. J. Sammes. Communications and Information Systems for Battlefield Command and Control. London: Brassey’s, 1989.
  • Rice, M. A., and A. J. Sammes. Command and Control: Support Systems in the Gulf War: An account of the Command and Control Information Systems Support to the British Army Contribution to the Gulf War. London: Brassey’s, 1994.
  • Schneider, F. B., and S. M. Bellovin. “Inside Risks: Evolving Telephone Networks.” Communications of the ACM 42, no. 1, January (1999): 160. doi:10.1145/291469.291485.
  • Slater, J. B. “Budgeting in a Time of Inflation and Austerity-Some UK Experiences.” Proceedings of the 8th annual ACM SIGUCCS conference on User services, 1980. https://dl.acm.org/doi/pdf/10.1145/800086.802741.
  • Subramanian, R. “Historical Consciousness of Cyber Security in India.” IEEE Annals of the History of Computing 42, no. 4 (2020): 71–93. doi:10.1109/MAHC.2020.3001215.
  • Tan, S. J., S. Bratus, and T. Goodspeed. “Interrupt-Oriented Bugdoor Programming: A Minimalist Approach to Bugdooring Embedded Systems Firmware.” Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 08 - 12, 2014
  • Thomas, S. L., and A. Francillon. “Backdoors: Definition, Deniability and Detection.” In Research in Attacks, Intrusions, and Defenses (RAID). Lecture Notes in Computer Science, edited by M. Bailey, T. Holz, M. Stamatogiannakis, and S. Ioannidis. Vol. 11050, p. 1-21. Cham: Springer, 2018.
  • Ware, W. “Security Controls for Computer Systems.” RAND, Defense Science Board Task Force on Computer Security, R-609-PR. DECLASSIFIED, 1972.
  • Warner, P. The Vital Link: The Story of Royal Signals 1945-1985. London: Leo Cooper, 1989.
  • Warner, M. “Cybersecurity: A Pre-History.” Intelligence and National Security 27, no. 5 (2012): 781–799. doi:10.1080/02684527.2012.708530.
  • Wells, P. “The Military Scientific Infrastructure and Regional Development.” Environment & Planning A 19, no. 12 (1987): 1631–1658. doi:10.1068/a191631.
  • Work, J.D. “Early Intelligence Assessments of COMBLOC Computing.” Journal of Intelligence History 21, no. 2 (2022): 172–190. doi:10.1080/16161262.2021.1884791.
  • Yost, J. R. “Computer Security, Part 2.” IEEE Annals of the History of Computing 38, no. 4 (2016): 10–11. doi:10.1353/ahc.2016.0040.