Por que o Brasil deveria adotar uma distro Linux própria?
DOI:
https://doi.org/10.26792/rbed.v7n2.2020.75248Palavras-chave:
Autonomia tecnológica, Distribuições Linux, Software de Código AbertoResumo
Na tentativa de se escapar da dependência tecnológica externa em sistemas relacionados à defesa, por conseguinte de missão-crítica, bem como de elevados custos de licenciamento, alguns países evitam o uso de softwares comerciais desenvolvidos fora de suas fronteiras, utilizando sistemas abertos ou versões compatíveis desenvolvidas autonomamente. Este artigo argumenta que o Brasil deveria buscar tal autonomia, adotando uma versão própria de sistema operacional, a partir de uma distribuição Linux. É empregada uma metodologia descritiva, baseada em estudos de casos, para análise das opções feitas por diferentes nações. A adoção dessa opção permitiria que o país superasse a desconfiança existente quanto à existência de backdoors criadas por parte de serviços de inteligência estrangeiros nos softwares produzidos em seus países de origem. Adicionalmente, alinha-se à Estratégia Nacional de Defesa, permitindo a aquisição de tecnologia de uso dual pela indústria nacional.
Downloads
Referências
Adams, James. 2001. “Virtual Defense”. Foreign Affairs 80, no. 3: 98. https://doi. org/10.2307/20050154.
Angelo, Cláudio. 2007. “‘Eixo Do Mal’ Científico: Ministério Pede Explicações à Dell Sobre Exigências a Físicos”. Folha de São Paulo (September). http://www1. folha.uol.com.br/fsp/ciencia/fe1409200703.htm.
Astra Linux. n.d. “Astra Linux - Универсальная Операционная Система”. Astra Linux Website. http://www.astralinux.ru/en/.
Banach, William. 2012. “Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE”. https:// intelligence.house.gov/sites/intelligence.house.gov/files/documents/Huawei- ZTE Investigative Report (FINAL).pdf.
CDAC. n.d. “BOSS Linux”. BOSS Linux Website. Accessed June 25, 2020. ht- tps://bosslinux.in/.
Cimpanu, Catalin. 2018. “Cisco Removed Its Seventh Backdoor Account This Year, and That’s a Good Thing”. ZDNet (November). https://www.zdnet.com/article/ cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing/.
Cisco. n.d. “Cisco Prime Home Authentication Bypass Vulnerability - Cisco”. ht- tps://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-20170201-prime-ho- me.html.
Clark, Don. 2015. “U.S. Agencies Block Technology Exports for Supercomputer in China”. The Wall Street Journal. http://www.wsj.com/articles/u-s-agencies-
-block-technology-exports-for-supercomputer-in-china-1428561987.
Eversden, Andrew. 2019. “Why Can’t the Pentagon Use More Open Source Code?” Wired (September). https://www.fifthdomain.com/civilian/omb/2019/09/11/ why-cant-the-pentagon-use-more-open-source-code/.
Figueiredo, Nice. 1986. “Legislação de Informática No Brasil”. Revista de Biblioteconomia de Brasília 34, no. 81.
Finley, Klint. 2016. “Open Source Won. So, Now What?” Wired (November). ht- tps://www.wired.com/2016/08/open-source-won-now/.
Gallagher, Sean. 2013. “The Navy’s Newest Warship Is Powered by Linux”. Ars Technica (October).
Ganguli, Subrata. 2017. “Computer Operating Systems: From Every Palm to the Entire Cosmos in the 21st Century Lifestyle”. CSI Communications: 5–8.
Gates, Bill. 1996. “Unix Expo Remarks by Bill Gates, October 9, 1996”. Wayback Machine (October). https://web.archive.org/web/20010818203946/http:// www.microsoft.com/billgates/speeches/industry&tech/uexpo.asp.
GCHQ. 2016. “GCHQ History”. http://www.gchq.gov.uk/history/Pages/index. aspx.
Gerring, John. 2012. “Mere Description”. British Journal of Political Science 42: 721–46. https://doi.org/10.1017/S0007123412000130.
Goodin, Dan. 2016. “Cisco Confirms NSA-Linked Zeroday Targeted Its Firewalls for Years”. Ars Technica. https://arstechnica.com/security/2016/08/cisco-confir- ms-nsa-linked-zeroday-targeted-its-firewalls-for-years/.
Gooroom. n.d. “Cloud Platform Forum”. Gooroom Website. https://www.goo- room.kr/.
Greenwald, Glenn. 2014. No Place to Hide: Edward Snowden, the NSA and the Surveillance State. Penguin Books.
Hanson, Matt. 2015. “Russia’s Making Its Own Mobile OS to Boot out Apple and Google | TechRadar”. TechRadar (May). https://www.techradar.com/uk/news/ phone-and-communications/mobile-phones/russia-s-making-its-own-new-mo- bile-os-to-boot-out-apple-and-google-1294258.
HarmoniKR. n.d. “Linux Community HarmoniKR”. HarmoniKR Website. ht- tps://hamonikr.org/.
Hoffman, Chris. 2014. “Meet Red Star OS, the North Korean Linux Distro That Apes Apple’s OS X | PCWorld”. PCWorld (December). https://www.pcworld. com/article/2862737/meet-red-star-os-the-north-korean-linux-distro-that-
-apes-apples-os-x.html.
Hosch, William. 2008a. “Linux | Operating System | Britannica”. Encyclopaedia Britannica (November). https://www.britannica.com/technology/Linux.
_____. 2008b. “UNIX | Operating System | Britannica”. Encyclopaedia Britannica
(December). https://www.britannica.com/technology/UNIX.
Karakoç, Mehmet, and Asaf Varol. 2016. “National Distribution Project and Pardus Operating System”. Turkish Journal of Science and Technology 11, no. 2: 25–34.
Kharpal, Arjun. 2020. “US Should Take Stake in Nokia, Ericsson to Counter Huawei in 5G: Barr”. CNBC (February). https://www.cnbc.com/2020/02/07/ us-should-take-stake-in-nokia-ericsson-to-counter-huawei-in-5g-barr.html.
Kirin Software. n.d. “Kirin Software”. KylinOS Website. http://www.kylinos.cn/.
Kumar, Manan. 2015. “Make In India: Now Government to Have Its Own Operating System, May Replace Microsoft Windows in Future”. DNA (September). https:// www.dnaindia.com/india/report-make-in-india-now-government-to-have-its-o- wn-operating-system-may-replace-microsoft-windows-in-future-2125014.
Kumar, Mohit. 2016. “Russia to Get Rid of Android and IOS by Launching Its Own Mobile Operating System”. The Hacker News (June). https://thehackernews. com/2016/06/russian-mobile-os.html.
Li, Jia-Qi, Xiang-Ke Liao, and Jun Ma. 2017. “A Typical Commercial Application for Kylin Operating System”. In 2017 3rd International Conference on Computer Science and Mechanical Automation: 66–70. Wuhan. https://doi.org/10.12783/dt- cse/csma2017/17323.
Lynn, William. 2010. “Defending a New Domain: The Pentagon’s Cyberstrategy”.
Foreign Affairs 89 (5).
Lynx.com. n.d. “LynxOS | POSIX Real Time Operating System | Lynx Software Technologies”. Lynx.Com Website. https://www.lynx.com/products/lynxos-po- six-real-time-operating-system-rtos.
Miller, Greg. 2020. “How the CIA Used Crypto AG Encryption Devices to Spy on Countries for Decades – Washington Post”. The Washington Post (February) https://www.washingtonpost.com/graphics/2020/world/national-security/ cia-crypto-encryption-machines-espionage/?fbclid=IwAR1ydM24snbzKUpH- z1fsNny7LkLVScUwmUNAuiQMDWtsB4LUYTVopqyWOxg.
MITRE. 2003. “Use of Fre and Open-Source Software (FOSS) in the U.S. Department of Defense”.
Moon, Angela. 2019. “Exclusive: Google Suspends Some Business with Huawei after Trump Blacklist - Source - Reuters”. Reuters (May). https://www.reuters. com/article/us-huawei-tech-alphabet-exclusive/exclusive-google-suspends-so- me-business-with-huawei-after-trump-blacklist-source-idUSKCN1SP0NB.
Moreira, José de Albuquerque. 1995. “Informática: O Mito Política Nacional de Informática”. Revista de Biblioteconomia de Brasília 19, no. 1: 23–50.
Pan, Guohua, and Curtis J. Bonk. 2007. “The Emergence of Open-Source Software in North America”. International Review of Research in Open and Distance Learning 8, no. 3: 1–18. https://doi.org/10.19173/irrodl.v8i3.496.
Pardus. n.d. “Pardus – TÜBİTAK ULAKBİM”. Pardus Website. https://www. pardus.org.tr/.
Pauli, Darren. 2015. “North Korea’s Red Star Linux Inserts Sneaky Serial Content Tracker”. The Register (July). https://www.theregister.com/2015/07/20/north_ korea_red_star_linux_inserts_sneaky_serial_content_tracker/.
Rid, Thomas. 2016. Rise of the Machines. London: Scribe Publications.
Schiess, Niklaus. 2017. “Governmental Control of Digital Media Distribution in North Korea: Surveillance and Censorship on Modern Consumer Devices”. ht- tps://dprktech.info/media/governmental_control_of_digital_media_distribu- tion_in_north_korea-nschiess.pdf.
Scott, Tony, and Anne Rung. 2016. “Federal Source Code Policy”. Federal Source Code Policy (August). https://sourcecode.cio.gov/.
Shidong, Zhang. 2019. “China Offers Five-Year Tax Breaks to Chip Makers, Software Developers to Bolster Industry as Trade War Stretches to Tech | South China Morning Post”. South China Morning Post (May). https://www.scmp.com/ business/article/3011377/china-offers-five-year-tax-breaks-chip-makers-soft- ware-developers-bolster.
Singh, Amit. 2007. Mac OS X Internals: A Systems Approach. Boston: Pearson Education.
Strumpf, Dan. 2020. “Huawei’s 5G Dominance Threatened by U.S. Policy on Chips – WSJ”. The Wall Street Journal (June). https://www.wsj.com/articles/hua- wei-struggles-to-escape-u-s-grasp-on-chips-11592740800.
Thomson, Iain. 2012. “US Navy Buys Linux to Guide Drone Fleet”. The Register
(June). https://www.theregister.co.uk/2012/06/08/us_navy_linux_drones/.
Tonooka, Eduardo. 1992. “Política Nacional de Informática: Vinte Anos de Intervenção Governamental”. Estudos Econômicos 22, no. 2: 273–97.
TOP500.org. n.d. “Top500”. TOP500.Org. https://www.top500.org/lists/.
U.S. Dept. of Commerce. 2020. “Department of Commerce Announces the Addition of Huawei Technologies Co. Ltd. to the Entity List | U.S. Department of Commerce”. Dept. of Commerce Press Releases (May). https://www.commer- ce.gov/news/press-releases/2019/05/department-commerce-announces-addi- tion-huawei-technologies-co-ltd.
U.S. DoD. n.d. “DoD Open Source Software (OSS) FAQ”. DOD CIO Web Site. ht- tps://dodcio.defense.gov/Open-Source-Software-FAQ/#Q:_Under_what_con- ditions_can_GPL-licensed_software_be_mixed_with_proprietary.2Fclassified_ software.3F.
Vaughan-Nichols, Steven. 2011. “The Air Force’s Secure Linux Distribution”. ZDNet (September). https://www.zdnet.com/article/the-air-forces-secure-linu- x-distribution/.
_____. 2020. “South Korea’s Government Explores Move from Windows to Linux Desktop”. ZDNet (February). https://www.zdnet.com/article/south-ko- reas-government-explores-move-from-windows-to-linux-desktop/.
Wagstaff, Jeremy, and James Pearson. 2015. “Paranoid: North Korea’s Computer Operating System Mirrors Its Political One – Reuters”. Reuters (December). https://www.reuters.com/article/northkorea-computers-idUSKBN0UA- 0GF20151227.
Wennergren, David. 2009. “Clarifying Guidance Regarding Open Source Software (OSS)”. http://www.defenselink.mil/cio-nii/cio/oss/.
Yang, Yuan, and Nian Liu. 2019. “Beijing Orders State Offices to Replace Foreign PCs and Software | Financial Times”. Financial Times (December). https://www. ft.com/content/b55fc6ee-1787-11ea-8d73-6303645ac406.
Zetter, Kim. 2015. “Suite of Sophisticated NationState Attack Tools Found With Connection to Stuxnet”. Wired. https://www.wired.com/2015/02/kapersky-dis- covers-equation-group/.
Zhongke Hongqi. n.d. “Zhongke Hongqi Website and Application”. Zhongke Hongqi Website. http://www.chinaredflag.cn/.
Downloads
Publicado
Como Citar
Edição
Seção
Licença
Autores que publicam nesta revista concordam com os seguintes termos:1) Autores mantêm os direitos autorais e concedem à revista o direito de primeira publicação, com o trabalho simultaneamente licenciado sob a Licença Creative Commons Attribution que permite o compartilhamento do trabalho com reconhecimento da autoria e publicação inicial nesta revista.
2) Autores têm autorização para assumir contratos adicionais separadamente, para distribuição não-exclusiva da versão do trabalho publicada nesta revista (ex.: publicar em repositório institucional ou como capítulo de livro), com reconhecimento de autoria e publicação inicial nesta revista.
3) Autores têm permissão e são estimulados a publicar e distribuir seu trabalho online (ex.: em repositórios institucionais ou na sua página pessoal) a qualquer ponto antes ou durante o processo editorial, já que isso pode gerar alterações produtivas, bem como aumentar o impacto e a citação do trabalho publicado (Veja O Efeito do Acesso Livre).