Cybercrime@IPA

Total Page:16

File Type:pdf, Size:1020Kb

Cybercrime@IPA CyberCrime@IPA EU/COE Joint Project on Regional Cooperation against Cybercrime www.coe.int/cybercrime Data Protection and Cybercrime Division Directorate General of Human Rights and Rule of Law Strasbourg, France 29 March 2012 Article 15 Conditions and Safeguards under the Budapest Convention on Cybercrime Discussion paper with contributions by Henrik Kaspersen (Netherlands) Joseph Schwerha (USA) Drazen Dragicevic (Croatia) For further information please contact: Disclaimer: Data Protection and Cybercrime Division This technical report does not necessarily Directorate General of Human Rights and Rule of Law reflect official positions of the Council of Council of Europe Europe or of the European Union or of Strasbourg, France the Parties to the agreements referred to Tel: +33-3-8841-2103 Fax: +33-3-9021-5650 Email: [email protected] www.coe.int/cybercrime 2 CONTENT 1 Background and context.................................................................................................... 4 1.1 Purpose and structure of the report ................................................................................. 4 1.2 Procedural powers provided by the Budapest Convention ................................................... 5 1.3 Conditions and safeguards.............................................................................................. 7 1.3.1 Procedural safeguards under the Budapest Convention .....................................................7 1.3.2 Relevant international human rights standards .............................................................. 10 1.4 Principles and requirements.......................................................................................... 13 2 Henrik Kaspersen: Procedural powers, safeguards and conditions in the Netherlands.... 16 2.1 Introduction to Article 15.............................................................................................. 16 2.1.1 Meaning and purpose................................................................................................. 16 2.1.2 Article 15 explained................................................................................................... 17 2.1.3 Summary................................................................................................................. 19 2.2 Criminal Procedural Law of the Netherlands .................................................................... 19 2.3 Gathering electronic evidence ....................................................................................... 20 2.3.1 Structure of coercive powers....................................................................................... 20 2.3.2 Definitions ............................................................................................................... 21 2.3.3 Search and seizure (Articles 16-19 Cybercrime Convention) ............................................ 21 2.3.4 Implementation of Article 19 Convention on Cybercrime ................................................. 21 2.3.5 Implementation of Article 18 Convention on Cybercrime ................................................. 24 2.3.6 Service Providers and e-communications ...................................................................... 29 2.4 Other legal safeguards ................................................................................................. 31 3 Joseph J. Schwerha: Article 15 from a U.S. perspective................................................... 32 3.1 Introduction................................................................................................................ 32 3.2 Background ................................................................................................................ 32 3.2.1 Context ................................................................................................................... 32 3.2.2 Current U.S. Status ................................................................................................... 33 3.2.3 History and Background of the Budapest Convention ...................................................... 35 3.2.4 History of Article 15................................................................................................... 36 3.2.5 Adjustments in final version of Article 15 ...................................................................... 37 3.2.6 U.S. overarching safeguards and conditions in all criminal proceedings.............................. 38 3.3 Article 15 in relation to specific procedural powers........................................................... 39 3.3.1 Expedited preservation of stored computer data (Article 16)............................................ 39 3.3.2 Expedited preservation and partial disclosure of traffic data (Article 17) ............................ 41 3.3.3 Production Order (article 18) ...................................................................................... 44 3.3.4 Search and seizure of stored computer data (Article 19) ................................................. 46 3.3.5 Real time collection of traffic data (Article 20) and interception of content data (Article 21) .. 49 3.4 Effects on international cooperation ............................................................................... 53 3.5 The future of cyberspace privacy protection? .................................................................. 54 4 Drazen Dragicevic: Conditions and safeguards in Croatia................................................ 57 4.1 Introduction................................................................................................................ 57 4.2 Background and context............................................................................................... 57 4.3 Overview of the implementation of Article 15 in the Croatian legislation ............................. 58 4.3.1 Protection of human rights and liberties in general ......................................................... 58 4.3.2 General approach to data protection and government acquisition of data........................... 59 4.4 Conditions and safeguards in relation to measures concerning computer data in general ...... 60 4.4.1 Search and seizure of computer data (article 19 of the Convention) and preservation of stored computer data (article 16 of the Convention) ................................................................................ 61 4.4.2 Production order (Article 18 of the Convention) ............................................................. 63 4.5 Conditions and safeguards in relation acquisition of data .................................................. 65 4.5.1 Expeditious preservation of traffic data (Articles 16 and 17 of the Convention) ................... 65 4.5.2 Production order for subscriber information (Article 18 of the Convention) ......................... 65 4.5.3 Real-time collection of data ........................................................................................ 66 5 Appendix: ........................................................................................................................ 71 5.1 Extracts of the Budapest Convention and explanatory report............................................. 71 5.1.1 Article 14: Scope of procedural provisions..................................................................... 71 5.1.2 Article 15: Conditions and safeguards .......................................................................... 73 3 1 Background and context 1.1 Purpose and structure of the report The Budapest Convention on Cybercrime not only requires Parties to this treaty to criminalise conduct such as illegal access, data and system interference, child pornography and other offences in their domestic legislation but also to provide their law enforcement authorities with effective tools to investigate cybercrime and collect electronic evidence. According to Article 15, the procedural powers adopted by Parties to the Convention are to be “subject to conditions and safeguards provided for under its domestic law which shall provide for the adequate protection of human rights and liberties...” Article 15 establishes principles and requirements to ensure that governments meet their positive obligation to protect people and their rights against cybercrime while at the same time respecting their fundamental rights when investigating crime. The Council of Europe addresses this question when supporting countries in the implementation of the Budapest Convention through its capacity building programme on cybercrime. This programme includes joint projects of the Council of Europe and the European Union. A major joint project is CyberCrime@IPA on cooperation against cybercrime in South-eastern Europe, covering Albania, Bosnia and Herzegovina, Croatia, Montenegro, Serbia, “The former Yugoslav Republic of Macedonia”, Turkey and Kosovo. 1 CyberCrime@IPA is designed to make sure that policy- and decision-makers are aware of human rights implications when taking measures against cybercrime. Policies, legislation and other measures are to be compliant “with the European Convention on Human Rights, Article 15 of the Budapest Convention and relevant case law of the European Court of Human Rights”. 2 During the inception phase of the project between November 2010 and February 2011, a “situation report” was prepared assessing the state of measures against cybercrime in the eight project areas, including an overview of law enforcement powers
Recommended publications
  • Extragalactic Sources of Rapidly Variable High Energy Gamma Radiation
    Dario Hrupec Extragalactic sources of rapidly variable high energy gamma radiation Doctoral Thesis submitted to the Department of Physics, Faculty of Science, University of Zagreb, for the academic degree of Doctor of Natural Sciences (Physics) Zagreb 2008. This thesis was done at Ruder Boˇskovi´c Institute under the supervision of Professor Daniel Ferenc from the University of California at Davis. ii Acknowledgments I would like to thank my mentor Dr. Daniel Ferenc from the University of California at Davis for his great professional and personal support during my work on this thesis. I have received precious inspiration from him. Finally, he encouraged me to read a lot. It was an invaluable advice. I am thankful to my co-mentor Dr. Silvio Pallua from the Faculty of Science at Zagreb for his support and for the thesis review. I am also thankful to Dr. Kreˇsimir Pavlovski from the Faculty of Science at Zagreb for the thesis review. I am particularly thankful to him for his valuable support. In addition, his terminological arguments impressed me a lot. Many thanks to Dr. Matko Milin from Faculty of Science at Zagreb for the time he spent on reading and commenting my thesis. I really appreciate his being my committee member. I owe many thanks to Dr. Eckart Lorenz from the University of California at Davis and ETH-Zurich who made possible my observations with the Cerenkovˇ telescope 1 (CT1) at La Palma in 2003. His donation of two Cerenkovˇ telescopes to Ruder Boˇskovi´c Institute established a base for the Cosmic Ray Observatory At The Eastern Adriatic (CROATEA) and also for my work in astroparticle physics in Croatia.
    [Show full text]
  • Adaptive Concept Resolution for Document Representation and Its
    Knowledge-Based Systems 74 (2015) 1–13 Contents lists available at ScienceDirect Knowledge-Based Systems journal homepage: www.elsevier.com/locate/knosys Adaptive Concept Resolution for document representation and its applications in text mining ⇑ Lidong Bing a, Shan Jiang b, Wai Lam a, Yan Zhang c, , Shoaib Jameel a a Key Laboratory of High Confidence Software Technologies, Ministry of Education (CUHK Sub-Lab), Department of Systems Engineering and Engineering Management, The Chinese University of Hong Kong, Hong Kong b Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, United States c Department of Machine Intelligence, Peking University, China article info abstract Article history: It is well-known that synonymous and polysemous terms often bring in some noise when we calculate Received 28 February 2014 the similarity between documents. Existing ontology-based document representation methods are static Received in revised form 21 July 2014 so that the selected semantic concepts for representing a document have a fixed resolution. Therefore, Accepted 6 October 2014 they are not adaptable to the characteristics of document collection and the text mining problem in hand. Available online 1 November 2014 We propose an Adaptive Concept Resolution (ACR) model to overcome this problem. ACR can learn a con- cept border from an ontology taking into the consideration of the characteristics of the particular docu- Keywords: ment collection. Then, this border provides a tailor-made semantic concept representation for a Adaptive Concept Resolution document coming from the same domain. Another advantage of ACR is that it is applicable in both clas- Ontology WordNet sification task where the groups are given in the training document set and clustering task where no Wikipedia group information is available.
    [Show full text]
  • 1984 the Adventures of the Alternative
    As pubished in in “The Long 1980s (Constellations Of Art, Politics, And Identity A Collection Of Microhistories)“, Editors: Nick Aikens, Teresa Grandes, Nav Haq, Beatriz Herráez, Nataša Petrešin- Bachelez, Valiz Books / L’Internationale, 2018. 1984: The Adventures of The Alternative Graph: Google Ngram Viewer: [alternative], 1900-2008 in English, goo.gl/JMCgUB ------------------------------------------------------------------------------------------------------- Alt-2017 After “post-truth” being The Word of The Year 2016, the 2017 arrival of “alternative facts” comes as the natural element, as another corresponding “alt” product of what wants to be called “alt-right”. This is expected - normal - continuation of the process through which the very concept of alternative seems to be appropriated and twisted beyond recognition, to outline today precisely that one worldview that does not allow for any alternative than itself. The debate on the trajectory of “alternative” towards “alt-” is mostly concerned with examining the role of the rising power, sophistication and “uncontrollability” of media, and with the sense of diminishing ability of formal democracies to address this, or any other problem. The process of deconstructing alternative followed the fate of words like avant-garde, revolution, modernism, and many others that used to be the building blocks of so- called “grand narratives” of (mainly) the previous century. This path would indeed be outlined by media, especially television, and by various different “happenings of the people”, both a late remnant of avant-gardist “totalitarian dream” of synchronizing the 1 society in the joint motion forward, and an early reminiscent of the “alt-” sentiment of today. Graph: Guido Alfani, “The top rich in Europe in the long run of history (1300 to present day)”, February 15, 2017, VoxEU.org.
    [Show full text]
  • Yugoslav Home Computers of the 80'S
    Yugoslav home computers of the 80's When the whole world started making home computers, former Yugoslavia had an import law that practically forbade import of such machines. In 1984 the first Yugoslav home computer appeared (completely open source, by today's standards) and started a revolution in home computing... Who am I... ● Passionate about old 8-,16- and 32-bit home computers (not x86 PC!) ● One of the founders of Once Uopn a Byte nonprofit organization, www.onceuponabyte.org Night of Museums Novi Sad, 2012 Night of Museums, Novi Sad, 2013 LUGoNS BarCamp 1,2 BalCCon 2013 Novi Sad More professional background... ● Linux user and promoter since 2006, member of Linux User Group of Novi Sad www.lugons.org – BalCCon, LUGoNS BarCamp ● Teaching assistant/assistant professor at Faculty of Technical Sciences, University of Novi Sad ● zzarko at lugons.org, uns.ac.rs Yugoslavia, 1956 CER-10, 1956-1960 CER-12, 1971 World, 1971-1977 1975 1974 1971 1976 1975, 8080A 1976, 6502 1977, Z80 World, 1977-1984 1982 1983 1981 Z80A 6502 Z80A 1981 1977 9900 6502 1979 6502 1981 6502 1981 1982 6502A 6510 Home computers in Yugoslavia, 1980- 1984 ● 50DM limit on import of any foreign goods ● Relatively poor domestic integrated circuit industry, no microprocessors ● Draconian import charges ● 1982: EL-82, Z80, 16kB RAM, 6000DM So, how could average person (salary) in Yugoslavia obtain a home computer? First solution... CUSTOMS Smuggling, of course! [ It's a dishwasher part... “Spectrum Superwash”... Beleive me... See, it's made of rubber, that's because of all the water... ] ...second... Legally importing foreign computers, and selling them for 2,3 or more times the price outside Yugoslavia … and finally, the third one! A vision of one man – VoJa Antonić 1983 2013 How to make an affordable computer 1.
    [Show full text]
  • Building Computers in Serbia: the First Half of the Digital Century
    DOI: 10.2298/CSIS110505021P Building Computers in Serbia: The First Half of the Digital Century Jelica Protić1 and Dejan Ristanović2 1 University of Belgrade, School of Electrical Engineering, Bulevar kralja Aleksandra 73 11000 Belgrade, Serbia [email protected] 2 PC Press, Osmana Đikića 4 11000 Belgrade, Serbia [email protected] Abstract. In this paper, we describe the early development of CER-10, the first digital computer built in Serbia, honor its inventors, and follow the professional path of its chief designers, prof. Rajko Tomovic and prof. Tihomir Aleksic, who became the first university professor of computer engineering in Serbia. We also give a short overview of CER family of computers that were developed after the CER-10 till mid- seventies. In the early eighties, computer revolution continued with personal computers, so we show the early attempts to produce this kind of computers in Serbia, from "build it yourself" campaigns to the industrial production, and we analyze implications of these attempts to the development of user community and evolution to the information society. Keywords: history of computing, CER family, personal computers, computer industry. 1. Introduction During the Second World War, the interest to speed up computation was driven by the need to decipher codes and to run ballistics calculations. A group of women called "human computers" were employed to use differential analyzer, a mechanical analogue computer designed to solve differential equations at The Moore School of the University of Pennsylvania in Philadelphia. But on the backstage, John W. Mauchly and J. Presper Eckert were developing ENIAC, the first computer that could perform ballistics calculations faster by a factor of 1,440.
    [Show full text]
  • Roland LAPC-1 SNK Neo Geo Pocket Color Ferien Auf Monkey Island
    something wonderful has happened Nr. 1/Juni 2002 interviews mit usern von damals und heute Commodore 64 1982-2002 Seite 3 charles bernstein: Play It Again, Pac-Man Teil 1 Seite 15 das vergessene betriebssystem CP/M Plus am C128 ab Seite 12 windows doch nicht ganz nutzlos: Llamasoft-Remakes am PC Seite 6/7 die rueckkehr der metagalaktischen computer steht bevor Amiga One/Commodore One [email protected] www.lotek64.com Lotek64 Juni 2002 Seite 6/7 Lotek64 2 C0MMODORE-PREISLISTE 1987 Zum 5. März 1987 hat Commodore eine neue Preisliste herausgebracht. Die aufgeführten Preise sind Listenpreise und verstehen sich in Mark inklusive Mehrwertsteuer. PC l0 II ................................................................... 2995,00 PC 20 II .................................................................. 3995,00 PC 40/AT ............................................................... 6995,00 PC 40/AT 40MB .................................................... o. A. Bürosystem S ....................................................... 4995,00 Bürosystem DL..................................................... 6495,00 Bürosystem TTX ................................................ 13695,00 MPS 2000 .............................................................. 1695,00 MPS 2000 C........................................................... 1995,00 Einzelblatt2000 ...................................................... 980,40 Traktor 2000............................................................ 437,76 Liebe Loteks! MPS 2010 .............................................................
    [Show full text]
  • Decor Hardcore This Is Sunbed N02 Doringer Bogomir Bogomir
    THE DEVIL‘S DECOR HARDCORE THIS IS SUNBED N02 DORINGER BOGOMIR 14€ 02 ISSN 2567-0646 772567 064009 9 THINKING IMAGES ČČČAAČF BY ADRIANA RAMIĆ WITH LEO RAMIĆ My parents arrived to the US shortly before my birth: my father from former Yugoslavia (present-day Bosnia), and my mother from Poland via London. Circumstances prevented them from teaching me their respective languages when I was young enough for childhood fluency. Attempting to fill the void by studying Bosnian and Polish as an adult has felt analogous to artificial intelligence techniques — feeding data sets of image-concept pairings into my brain so it could then regurgitate them in unconvincing reconfigurations. LEFT AND TOP: Courtesy of Leo Ramić 3434 35 What did it mean to be human in ADRIANA RAMIĆ How did you get into computation? with in Yugoslavia didn’t know even how to divide or Were the mini-computers or micro-computers LEO RAMIĆ Computers were a novelty when I began round numbers, so I had to write programs for these you mentioned earlier like Voja Antonić’s Galaksija English, and then in Bosnian? studying them, much more so in Yugoslavia than in the elementary things. Programming early computers was build-it-yourself computer that people could make How were these image-concept USA, so computer programmers were an extra rare a tedious and time-consuming affair. There was just themselves at home? species in my area. The use of computers spread rather enough space to do basic calculations, so results had Big computers were very expensive, so only large pairings stand-ins for the reali- quickly and, by the time I graduated, many companies to be stored on magnetic tape or other devices, and companies and banks with access to convertible ties they signify? had some kind of a computer.
    [Show full text]
  • 1900 (Parents: 769, Clones: 1131)
    Supported systems: 1900 (parents: 769, clones: 1131) Description [ ] Name [ ] Parent [ ] Year [ ] Manufacturer [ ] Sourcefile [ ] 1200 Micro Computer shmc1200 studio2 1978 Sheen studio2.c (Australia) 1292 Advanced Programmable Video 1292apvs 1976 Radofin vc4000.c System 1392 Advanced Programmable Video 1392apvs 1292apvs 1976 Radofin vc4000.c System 15IE-00-013 ie15 1980 USSR ie15.c 286i k286i ibm5170 1985 Kaypro at.c 3B1 3b1 1985 AT&T unixpc.c 3DO (NTSC) 3do 1991 The 3DO Company 3do.c 3DO (PAL) 3do_pal 3do 1991 The 3DO Company 3do.c 3DO M2 3do_m2 199? 3DO konamim2.c 4004 Nixie Clock 4004clk 2008 John L. Weinrich 4004clk.c 486-PIO-2 ficpio2 ibm5170 1995 FIC at.c 4D/PI (R2000, 20MHz) sgi_ip6 1988 Silicon Graphics Inc sgi_ip6.c 6809 Portable d6809 1983 Dunfield d6809.c 68k Single Board 68ksbc 2002 Ichit Sirichote 68ksbc.c Computer 79152pc m79152pc ???? Mera-Elzab m79152pc.c 800 Junior elwro800 1986 Elwro elwro800.c 9016 Telespiel mtc9016 studio2 1978 Mustang studio2.c Computer (Germany) A5120 a5120 1982 VEB Robotron a51xx.c A5130 a5130 a5120 1983 VEB Robotron a51xx.c A7150 a7150 1986 VEB Robotron a7150.c Aamber Pegasus pegasus 1981 Technosys pegasus.c Aamber Pegasus with pegasusm pegasus 1981 Technosys pegasus.c RAM expansion unit ABC 1600 abc1600 1985 Luxor abc1600.c ABC 80 abc80 1978 Luxor Datorer AB abc80.c ABC 800 C/HR abc800c 1981 Luxor Datorer AB abc80x.c ABC 800 M/HR abc800m abc800c 1981 Luxor Datorer AB abc80x.c ABC 802 abc802 1983 Luxor Datorer AB abc80x.c ABC 806 abc806 1983 Luxor Datorer AB abc80x.c Acorn Electron electron 1983
    [Show full text]
  • Discovering Eastern European Pcs by Hacking Them. Today
    Discovering Eastern European PCs by hacking them. Today Stefano Bodrato, Fabrizio Caruso, Giovanni A. Cignoni Progetto HMR, Pisa, Italy {stefano.bodrato, fabrizio.caruso, giovanni.cignoni}@progettohmr.it Abstract. Computer science would not be the same without personal comput- ers. In the West the so called PC revolution started in the late ’70s and has its roots in hobbyists and do-it-yourself clubs. In the following years the diffusion of home and personal computers has made the discipline closer to many people. A bit later, to a lesser extent, yet in a similar way, the revolution took place also in East European countries. Today, the scenario of personal computing has completely changed, however the computers of the ’80s are still objects of fas- cination for a number of retrocomputing fans who enjoy using, programming and hacking the old “8-bits”. The paper highlights the continuity between yesterday’s hobbyists and today’s retrocomputing enthusiasts, particularly focusing on East European PCs. Be- sides the preservation of old hardware and software, the community is engaged in the development of emulators and cross compilers. Such tools can be used for historical investigation, for example to trace the origins of the BASIC inter- preters loaded in the ROMs of East European PCs. Keywords: 8-bit computers, emulators, software development tools, retrocom- puting communities, hacking. 1 Introduction The diffusion of home and personal computers has made information technology and computer science closer to many people. Actually, it changed the computer industry orienting it towards the consumer market. Today, personal computing is perceived as a set of devices – from smartphones to videogame consoles – made just to be used.
    [Show full text]
  • Raising the Level of Education and Employment for the Purposes of Creating New Business Opportunities
    EEE 2018 1 RAISING THE LEVEL OF EDUCATION AND EMPLOYMENT FOR THE PURPOSES OF CREATING NEW BUSINESS OPPORTUNITIES RAISING THE LEVEL OF EDUCATION AND EMPLOYMENT FOR THE PURPOSES OF CREATING NEW BUSINESS OPPORTUNITIES Editors: Maja Cogoljevic, Ljiljana Dimitrijević, Snezhana Ilieva Publisher: Silver and Smith Publishers,London,UK Reviewers: Gordana Gavrić, Faculty of Business Economics and Entrepreneurship, Belgrade, Serbia Imani Silver Kyaruzi, Qa Business School, Ulster University, United Kingdom Egyul Tair, Institute for Population and Human Studies - Bulgarian Academy of Sciences, Sofia, Bulgaria ISBN 978-1-9993029-2-4 Copyright© 2018. EEE 2018 3 4 EEE 2018 EEE 2018 5 CONTENTS PREFACE ........................................................................................................... 7 AUTHORITY OF TEACHERS IN EDUCATIONAL EDUCATION................... 1 Stefan Zimonjić ............................................................................................................ 1 Milica Kaliĉanin .......................................................................................................... 1 COST-BENEFIT OF TECHNICAL-VOCATIONAL EDUCATION FOR EMPLOYMENT IN THE FOOD SERVICE INDUSTRY IN THE PHILIPPINES ................................................................................................... 17 David Edward g. Jimenez ........................................................................................... 17 INCLUSIVE EDUCATION FOR CHILDRENWITH SPECIAL NEEDS ........ 29 Nevena Petrović ........................................................................................................
    [Show full text]
  • Кућни Рачунари Made in Serbia
    година дигиталног рачунарства у Србији Дејан Ристановић, главни уредник часописа "PC" [email protected], PC Press, Beograd КУЋНИ РАЧУНАРИ MADE IN SERBIA Сажетак: Иако је тржиште Србије и бивше Југославије било мало и затворено низом административних препрека, на њему се почев од 1983. године појавило неколико оригиналних кућних рачунара од којих је један дистрибуиран у великој серији. У овом тексту анализирамо карактеристике и ток развоја тих рачунара, сагледавајући њихов утицај на едукацију корисника и каснији раст тржишта. Кључне речи: први кућни рачунари, Србија, Југославија, српско тржиште, Галаксија, Лола 8, ТИМ, Пеком, тржиште образовања "Рачунарску револуцију, најзад, можемо остварити само ако будемо имали домаћи рачунар" [1]. Реченица из редакцијског уводника "Рачунара у вашој кући", прве публикације о персоналним рачунарима објављене у бившој Југославији, звучала је логично барем онолико колико данас звучи комично. Али, такво је било време - сматрало се да треба имати домаћи телевизор, домаћу белу технику, домаћи авион па онда, што да не, и домаћи рачунар. Заиста персонални рачунари Најлепше је то што почетком осамдесетих година XX века конструисање домаћег рачунара није представљало немогућу мисију. Хардвер и софтвер рачунара били су довољно једноставни да су их могли пројектовати, направити и тестирати сасвим мали тимови, без скупих ресурса тј. са скромним буџетом. Гледано у светским размерама, први кућни рачунари су углавном настајали у гаражама а конструисали су их млади људи, често без формалних квалификација. Таквих рачунара је било много, али је тек по неки од њих, захваљујући инвентивној конструкцији, квалитетном софтверу, а помало и сплету срећних околности, долазио до широког тржишта. Чак и уз ту селекцију, ситуација на тржишту је била за данашње појмове веома чудна, са десетак међусобно некомпатибилних рачунара који се такмиче за наклоност купаца, спремних да у рачунар који, реално говорећи, не може да обави никакав користан посао уложе доста новца, бескрајно време, па и да развију према њему осећање налик на љубав.
    [Show full text]
  • Replika Mikroracunalnika Galaksija
    Univerza v Ljubljani Fakulteta za elektrotehniko Tomaˇz Solcˇ Replika mikroraˇcunalnika Galaksija Univerzitetno diplomsko delo Mentor prof. dr. Tadej Tuma Ljubljana, 2007 Povzetek Zaradi razliˇcnih dejavnikov je danes obiˇcajno, da je za starejˇse mikroproce- sorske sisteme na voljo le zelo omejena dokumentacija. V takem primeru se pogosto uporabi reverzni inˇzeniring, za uspeˇsnost katerega pa je pomembno poznavanje naˇcrtovalskih postopkov in prijemov iz obdobja nastanka sistema, ki ga raziskujemo. Galaksija je jugoslovanski hiˇsni mikroraˇcunalnik iz 80-ih let 20. sto- letja z zgodovinsko vrednostjo. Zahvaljujoˇcjavni objavi se je do danes ohranil del dokumentacije o strojni opremi in obseˇzna zbirka programske opreme, vkljuˇcno z operacijskim sistemom. Kot tipiˇcen in hkrati relativno preprost mikroprocesorski sistem iz tega obdobja Galaksija omogoˇca enos- taven vpogled v takratne naˇcrtovalske prijeme. V okviru te naloge je bila najprej na podlagi ohranjenih naˇcrtov in rever- znega inˇzeniringa programske opreme izdelana dokumentacija strojne aritek- ture. Na podlagi te pa je bila naˇcrtana in izdelana replika Galaksije, to je elektronsko vezje iz sodobnih komponent, ki je iz programskega vidika kompatibilno z izvirnim mikroraˇcunalnikom in na katerem se izvaja izvirni operacijski sistem. Izdelava replike je bila osnova za dokumentiranje posebnosti v imple- mentaciji izvirnega elektronskega vezja, delujoˇca Galaksija pa je sluˇzila tudi kot orodje pri raziskovanju programerskih prijemov avtorjev operacijskega sistema. Namen te dokumentacije je olajˇsati podobne projekte za obnovo mikroprocesorskih sistemov iz tega obdobja. V okviru naloge je nastalo tudi programsko orodje za reverzni inˇzeniring strojne kode za mikroprocesor Z80 ter razvojno okolje za Galaksijino arhitek- turo. Kljuˇcne besede: Galaksija, mikroraˇcunalniki, mikroprocesorski sistemi, operacijski sistem, reverzni inˇzeniring Abstract Due to various reasons a shortage or even absence of detailed documentation for older microprocessor systems is common today.
    [Show full text]