Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 21 E-Policy The debate rages. Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty.

Similar presentations


Presentation on theme: "Chapter 21 E-Policy The debate rages. Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty."— Presentation transcript:

1 Chapter 21 E-Policy The debate rages

2 Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty groups on the other side Export controls PGP Wiretapping Foreign targets Law enforcement data matching

3 Right from book subpoena Subpoena of Google http://news.com.com/Court+date+set+for+Google+l awsuit/2100-1030_3-6031941.html http://news.com.com/Court+date+set+for+Google+l awsuit/2100-1030_3-6031941.html http://www.washingtonpost.com/wp- dyn/content/article/2006/01/19/AR2006011903331. html http://www.washingtonpost.com/wp- dyn/content/article/2006/01/19/AR2006011903331. html http://www.npr.org/templates/story/story.php?storyI d=5165530 http://www.npr.org/templates/story/story.php?storyI d=5165530 Result http://www.cnn.com/2006/TECH/internet/03/14/goo gle.hearing.ap/

4 Foreign intelligence HUGE use of communications intelligence NSA Traffic selection

5 Cryptography National Security Export control Back doors You don’t always need the capability to break it, just make them think you do Clipper

6 Copyright Distributed systems and international law Effect on internet Freedom of speech Porn Digital Millennium Copyright Act

7 Data Protection International differences Can force US companies to give up data they really do not want to Germany hard-line data protection US self-regulation Citi-bank must process German card-holder information Will cameras be: Surveillance cams Web cams

8 Evidential Issues Admissibility of evidence Quality of evidence system produces Reliability of evidence Computer forensics Electronic signatures Burden of proof On person accepting signature Or person supposedly making signature Currently on person accepting Others would like to change this Digital signatures could change this and be bad for customer Risk dumping

9 Articles Digital Millennium Copyright Act Electronic elections

10 List of resources Key escrow http://en.wikipedia.org/wiki/Key_escrow http://www.cdt.org/crypto/risks98/ Cryptography policy http://www.epic.org/crypto/ http://www.oecd.org/document/11/0,2340,en _2649_34255_1814731_1_1_1_1,00.html http://www.oecd.org/document/11/0,2340,en _2649_34255_1814731_1_1_1_1,00.html

11 List of resources Clipper chip http://en.wikipedia.org/wiki/Clipper_Chip Digital Millennium Copyright Act http://en.wikipedia.org/wiki/DMCA http://www.gseis.ucla.edu/iclp/dmca1.htm


Download ppt "Chapter 21 E-Policy The debate rages. Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty."

Similar presentations


Ads by Google