• Complain

Diffie Whitfield - Privacy on the line: the politics of wiretapping and encryption

Here you can read online Diffie Whitfield - Privacy on the line: the politics of wiretapping and encryption full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: London;Cambridge;Mass;United States, year: 2010, publisher: MIT Press, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Diffie Whitfield Privacy on the line: the politics of wiretapping and encryption
  • Book:
    Privacy on the line: the politics of wiretapping and encryption
  • Author:
  • Publisher:
    MIT Press
  • Genre:
  • Year:
    2010
  • City:
    London;Cambridge;Mass;United States
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Privacy on the line: the politics of wiretapping and encryption: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Privacy on the line: the politics of wiretapping and encryption" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Preface to the Updated and Expanded Edition; Preface to the First Edition; Acknowledgements; 1 -- Introduction; 2 -- Cryptography; 3 -- Cryptography and Public Policy; 4 -- National Security; 5 -- Law Enforcement; 6 -- Privacy: Protections and Threats; 7 -- Wiretapping; 8 -- Communications in the 1990s; 9 -- Cryptography in the 1990s; 10 -- And Then It All Changed; 11 -- Aprs le Dluge; 12 -- Conclusion; Notes; Glossary; Bibliography; Index.;Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original - and prescient - discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

Diffie Whitfield: author's other books


Who wrote Privacy on the line: the politics of wiretapping and encryption? Find out the surname, the name of the author of the book and a list of all author's works by series.

Privacy on the line: the politics of wiretapping and encryption — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Privacy on the line: the politics of wiretapping and encryption" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Privacy on the Line

The right of the people to be secure in their persons, houses, papers and effects against unreasonable searches and seizures shall not be violated, and no Warrants shall issue but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Fourth Amendment
United States Constitution

The evil incident to invasion of privacy of the telephone is far greater than that involved in tampering with the mails. Whenever a telephone line is tapped, the privacy of persons at both ends of the line is invaded, and all conversations between them upon any subject, and although proper, confidential and privileged, may be overheard. Moreover, the tapping of one mans telephone line involves the tapping of the telephone of every other person whom he may call or who may call him. As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with wire-tapping.

Justice Louis Brandeis
dissenting opinion in
Olmstead v. United States
(277 US 438, 1928, pp. 475476)

Senator Herman Talmadge: Do you remember when we were in law school, we studied a famous principle of law that came from England and also is well known in this country, that no matter how humble a mans cottage is, that even the King of England cannot enter without his consent.

Witness John Ehrlichman: I am afraid that has been considerably eroded over the years, has it not?

Senator Talmadge: Down in my country we still think of it as a pretty legitimate piece of law.

United States Senate
Select Committee on Presidential
Campaign Activities, Hearings,
Phase 1: Watergate Investigation,
Ninety-Third Congress, First
Session, 1973, p. 2601

Privacy on the Line

The Politics of Wiretapping and Encryption

Updated and Expanded Edition

Whitfield Diffie
Susan Landau

The MIT Press
Cambridge, Massachusetts
London, England

2007 Massachusetts Institute of Technology
First MIT Press paperback edition, 1999
First edition 1998 Massachusetts Institute of Technology
All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher.
After January 1, 2017, this book will enter the public domain under the following terms. Any holder of the work may copy and redistribute the work in its entirety, provided the following notice is included:
You may copy and distribute this work to anyone, whether free or in return for compensation, provided that:
(1) the work is complete, intact, and unmodified, and
(2) this notice is included.

Composed in L A TEX2 by the authors.
Set in Sabon by Loyola Graphics of San Bruno, California.
Printed and bound in the United States of America.

Library of Congress Cataloging-in-Publication Data

Diffie, Whitfield.

Privacy on the line : the politics of wiretapping and encryption / Whitfield

Diffie, Susan Landau. Updated and expanded ed.

p. cm.

Includes bibliographical references and index.

ISBN 978-0-262-04240-6 (hardcover : alk. paper)

1. Electronic intelligenceUnited States. 2. WiretappingUnited States.3. Data encryption (Computer science)Law and legislationUnited States. 4. Electronic surveillanceUnited StatesPolitical aspects. 5. Telecommunication Political aspectsUnited States. 6. Privacy, Right ofUnited States. I. Landau, Susan Eva. II. Title. III. Title: Politics of wiretapping and encryption.

UB256.U6D54 2007 342.7308' 58dc22 2006035514

This book is dedicated to our spouses, Mary Fischer and Neil Immerman.

Contents

Preface to the Updated and Expanded Edition

Preface to the First Edition

Acknowledgements

1 Introduction

2 Cryptography

3 Cryptography and Public Policy

4 National Security

5 Law Enforcement

6 Privacy: Protections and Threats

7 Wiretapping

8 Communications in the 1990s

9 Cryptography in the 1990s

10 And Then It All Changed

11 Aprs le Dluge

12 Conclusion

Notes

Glossary

Bibliography

Index

Preface to the Updated and Expanded Edition

It would be difficult to find a more fundamental theme in the contemporary world than the migration of human activity from physical, face-to-face contact into the virtual world of electronic (and digital) telecommunications. Globalization would not be possible without the high-quality, reliable, and inexpensive telephone service that has been made possible by optical fibers and computerized central offices. In the industrialized world and beyond, governments, businesses, universities, and other institutions have made the World Wide Web a centerpiece of their communications with the public.

One of the critical issues raised by this transformation is what effect it will have on privacy and security. The digitization of the world has made the effortless privacy of interpersonal conversations a thing of the past and enabled spying on a global scale never before seen. The decisions we make as we lay the foundations of the new world will have an impact on the structure of human society that transcends that of any previous technological development. If, in designing our new world, we do not take privacy and security into account in a way that reflects the primacy of the individual, our technology will enforce a social order in which the individual is subordinate to the institutions whose interests were put foremost in the design.

The first edition of Privacy on the Line was written at a time in which the issue seemed simple. The primary technology for protecting telecommunications privacy was cryptography, and the right to use cryptography for the protection of personal and business privacy seemed in jeopardy. The battle had two fronts, and we set out to explore them both.

The more visible front was chronologically second but stood first in most peoples minds. The US governments plan for key escrow sought to use its standard-setting powerbacked by its substantial purchasing powerto make cryptographic systems with built-in government master keys ubiquitous. Had the plan succeeded, it might plausibly have been extended to outlaw systems that did not have this provision.

The less visible but economically more significant front was export control. Exporting of cryptographic products had been tightly controlled for decades but, until the sudden need for cryptography in commercial uses that followed the opening up of the Internet this had, by and large, only the intended effect of inhibiting the exporting of cryptographic equipment intended for military customers. As low-cost integrated circuits brought high-grade cryptography within the reach of many commercial products, its use expanded steadily. Businesses oriented toward making consumer products now found themselves forced by the export laws to bear the unrewarding expense of producing separate products for export and for domestic consumption.

The first edition was written in the midst of this political struggle over whether individuals and commercial enterprises had a right to protect their communications with cryptography or whether governments had the right to limit its use to prevent possible interference with their law-enforcement and intelligence activities. The preface to that edition gives a flavor of the situation as it stood at that time.

A book written in the midst of events will always become outdated, sometimes quite quickly. Just the short interval between the appearance of the original edition and the first paperbound edition saw a striking sequence of events.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Privacy on the line: the politics of wiretapping and encryption»

Look at similar books to Privacy on the line: the politics of wiretapping and encryption. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Privacy on the line: the politics of wiretapping and encryption»

Discussion, reviews of the book Privacy on the line: the politics of wiretapping and encryption and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.