Building in Big Brother

Building in Big Brother

Author: Lance J. Hoffman

Publisher: Springer Science & Business Media

ISBN: 9781461225249

Category: Computers

Page: 560

View: 331

Download BOOK »

The announcement of the Clipper chip by the U.S. Government in April 1993 set off a frenzy of discussions about cryptography policy in the technological community. The shock waves from it ultimately included front page treatment in The New York Times, repeated questions to the Vice President, creation of several new newsgroups on the Internet, and some very productive public discussions about striking the balance between national security, law enforcement, and civil liberties. We still don't have good answers for some of the questions that have been raised. As the Global Information Infrastructure is being built, we are writing portions of the Constitution for Cyberspace. I've been fortunate to have a front row seat and to share much of this with my students. The original reading and selection of materials was made by the first cohort of students* in The George Washington University Accel erated Master of Science Program in Telecommunications and Com puters at the Ashburn, Virginia campus. They worked many long hours-reading, debating, and selecting materials for this book. In addition, Bob Patton spent a great deal of time scanning and editing the material. Nestor Torres prepared the index. And Harish Nalinak shan provided an enormous amount of technical and administrative assistance and kept the project on track as new developments took place in the debate and new papers and legislation reflected these. As with most readings books, some of the selections cover similar material. We have tried to hold this duplication to an acceptable level.
Building in Big Brother
Language: en
Pages: 560
Authors: Lance J. Hoffman
Categories: Computers
Type: BOOK - Published: 2012-12-06 - Publisher: Springer Science & Business Media

The announcement of the Clipper chip by the U.S. Government in April 1993 set off a frenzy of discussions about cryptography policy in the technological community. The shock waves from it ultimately included front page treatment in The New York Times, repeated questions to the Vice President, creation of several
Privacy-Law of Civil Liberties
Language: en
Pages: 356
Authors: Sally Ramage
Categories: Law
Type: BOOK - Published: 2007 - Publisher: iUniverse

The right to privacy, or the right to private life, is at the heart of individual freedom and the right to be free from arbitrary government interference. The United Kingdom, although part of the European Union, has privacy issues unlike EU member states of Germany and France, for example, and
Burdens of Proof
Language: en
Pages: 288
Authors: Jean-Francois Blanchette
Categories: Computers
Type: BOOK - Published: 2012-04-27 - Publisher: MIT Press

An examination of the challenges of establishing the authenticity of electronic documents—in particular the design of a cryptographic equivalent to handwritten signatures. The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized
Cryptography: Policy and Algorithms
Language: en
Pages: 325
Authors: Edward Pyle Dawson
Categories: Computers
Type: BOOK - Published: 1996-01-24 - Publisher: Springer Science & Business Media

This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995. Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose
Telecommunications Law in the Internet Age
Language: en
Pages: 516
Authors: Sharon K. Black
Categories: Computers
Type: BOOK - Published: 2001-10-17 - Publisher: Elsevier

For companies in and around the telecommunications field, the past few years have been a time of extraordinary change-technologically and legally. The enacting of the Telecommunications Act of 1996 and the development of international trade agreements have fundamentally changed the environment in which your business operates, creating risks, responsibilities, and