Cryptography Reference
In-Depth Information
policy directory:
Email.Study.txt
The article by Schwartz and Wood on traffic
analysis mentioned in Section 8.2.1. This material
is still current though it is of October 1992!
Privacy.txt
A statement by Professor Cochrane (British
Telecom; see www.labs.bt.com/library/cochrane/
index.htm) on disappearing privacy in the
information age; radical, but interesting (also in
connection with Section 8.2.2).
bbhitech.txt
A discussion on how intelligence agencies can
exploit modern technology for surveillance of large
groups of people, already practiced in some
countries, e.g., Thailand. It is interesting to read
about the 'data traces' US citizens leave behind
already today.
cdt policy.txt
Discussion of the Clipper chip, export restrictions,
key escrow, etc.
claw1996.txt
This is the Crypto-Law Survey by Bert-Jaap Koops
mentioned in Section 8.2.3. It gives an overview on
crypto-laws in many countries (as of July 1996).
The list is merely indicative, since the laws change
constantly.
claw2001.txt
The version of claw.txt in 2001 — a lot has changed
since then!
crptlawwirt.txt
Statement of the business world on the draft law for
digital signatures and regulations of the use of
cryptography (favoring the first law, while
criticizing the second draft). Must read!
cryptverbot.html
Statements of several political parties and
organizations on the regulation of cryptography.
echelon schmid.pdf
Detailed report of the Echelon Commission of the
EU Parliament on the Echelon surveillance system.
eml.txt
Fortune report dated February 3, 1997, on the
practices and possibilities of replaying e-mail,
breaking into computers, etc., in the USA; includes
huge amounts of interesting facts, and deals
intensively with the hacker scene.
Search WWH ::




Custom Search