Cryptography Reference
In-Depth Information
feb97 state.txt
Report on the negotiations between the FBI and
the EU on a global telephone monitoring system.
Rather shocking!
fuev.txt
Telecommunications Surveillance Directive
(Fernmeldeverkehr- Uberwachungs-Verordnung;
F UV) of May 18, 1995.
globuberwachung.txt
Discussion of modern surveillance possibilities
based on the Schengen Treaty and the Sirene
System. The example of the destiny of Norwegian
Jews in World War II is used to show how 'useful'
data harvesting in stock can be in such cases.
ic2kreport.txt
The STOA report of the EU, mentioned in
Section 8.2.1, which deals in detail with the
technical possibilities of intelligence agencies.
Information
Awareness
Office.html
Wikipedia page of November 2006 on IAO,
formerly TIA, the extensive surveillance system
planned for fight against terror.
kahn.txt
David Kahn's backing of key escrow; author of
the fascinating topic [KahnCode].
madsen.txt
A highly interesting contribution on the obvious
involvement of the NSA in Crypto AG
(Switzerland). The affair became public in 1992
when an alleged Swiss spy was bailed out from
Iraqi prison. This is the only use of 'real Trojan
cryptography' I know of (see Section 6.7). The
article is a must-read for every cryptologist who is
interested in more than mathematics!
nsa-hersh.txt
Text on the discussion in Section 8.2.1 as to how
'fatal' cryptography and modern data-transmission
methods might have become for intelligence
agencies — certainly useful to prevent becoming
paranoid, but one shouldn't underestimate the
NSA.
nsaabout.txt
Presentation of the NSA on itself on its
homepage; among other things, it mentions that
the NSA produces hardware, and that it is the
largest employer of mathematicians.
Search WWH ::




Custom Search