Chapter 21 E-Policy The debate rages
Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty groups on the other side Export controls PGP Wiretapping Foreign targets Law enforcement data matching
Right from book subpoena Subpoena of Google awsuit/ _ html awsuit/ _ html dyn/content/article/2006/01/19/AR html dyn/content/article/2006/01/19/AR html d= d= Result gle.hearing.ap/
Foreign intelligence HUGE use of communications intelligence NSA Traffic selection
Cryptography National Security Export control Back doors You don’t always need the capability to break it, just make them think you do Clipper
Copyright Distributed systems and international law Effect on internet Freedom of speech Porn Digital Millennium Copyright Act
Data Protection International differences Can force US companies to give up data they really do not want to Germany hard-line data protection US self-regulation Citi-bank must process German card-holder information Will cameras be: Surveillance cams Web cams
Evidential Issues Admissibility of evidence Quality of evidence system produces Reliability of evidence Computer forensics Electronic signatures Burden of proof On person accepting signature Or person supposedly making signature Currently on person accepting Others would like to change this Digital signatures could change this and be bad for customer Risk dumping
Articles Digital Millennium Copyright Act Electronic elections
List of resources Key escrow Cryptography policy _2649_34255_ _1_1_1_1,00.html _2649_34255_ _1_1_1_1,00.html
List of resources Clipper chip Digital Millennium Copyright Act