Back to Results
First PageMeta Content
Espionage / Internet privacy / PGP / Disk encryption / Encryption / Anonymous remailer / Export of cryptography in the United States / Steganography / GNU Privacy Guard / Cryptography / Cryptographic software / Computer security


In recent years, the war over encryption has moved beyond controlling the technology itself. Now, some governments are granting law enforcement agencies new powers and funding the development of new tools td get at comp
Add to Reading List

Document Date: 2011-05-18 07:34:50


Open Document

File Size: 737,94 KB

Share Result on Facebook

City

Washington / D.C. / Washington / New York City / Baltimore / Nelson / /

Company

Naval Research Laboratory / Western European / Web / The New York Times / British Telecom / 3Com / Counterpane Security Inc. / Craig Potton Publishing / /

Continent

Europe / /

Country

United Kingdom / India / New Zealand / Malaysia / United States / Singapore / France / /

/

Facility

University of Geneva / Electronic Privacy Information Center / Naval Research Laboratory / Windows store / Johns Hopkins University / /

IndustryTerm

encryption software / hand-held devices / unreasonable search / Internet telephony / Software tools / word-processing document / Internet-related applications / appropriate software / software requirements / law enforcement agencies new powers / remote site / Internet calls / electronic communications / mere data protocol / search warrants / e - commerce / law enforcement / Internet service / legal systems / information infrastructure / law enforceInent / computer forensics tools / secure site / conventional anonymizer services / steganography software / subsequent reading ofthe law / telecommunications services / electronic surveillance networks / steganography software tools / proxy server / mainstream voice-over-the-Internet services / software programs / encryption algorithm / /

Movie

Hide and Seek / /

OperatingSystem

Unix / Microsoft Windows / DOS / /

Organization

British parliament / Supreme Court / U.S. government / American Civil Liberties Union / German government / European Parliament / House Appropriations Committee / Australian Parliament / U.S. National Security Council / Electronic Privacy Infoonation Center / Clinton administration / Australian Security Organization / European Union / Johns Hopkins University / Congress / D.C.-based Federation of American Scientists / Federal government / University of Geneva in Switzerland / /

Person

Nicky Hager / Wayne Madsen / Lionel Jospin / Duncan Campbell / John Markoff / Jean Kumagai / Michael A. Caloyannides / Brian Gladman / David Sobel / Bob Barr / Bruce Schneier / /

Position

mayor / Prime Minister / prosecutor / AUTHOR / Major / Representative / competent computer forensics investigator / Internatirmal Spy / editor / government official / researcher / general counsel / photographer / Palm Pilot / cannot / musician / /

Product

Atlantic / /

ProvinceOrState

Virginia / Hawaii / California / Arizona / D.c / /

PublishedMedium

The New York Times / /

Technology

symmetric key encryption / IP telephony / elliptic curve encryption / encryption algorithm / html / encryption / 128-bit encryption / cryptography / Unltke encryption / encryption system / ISP / SSL / proxy server / public-key encryption / firewall / voice encryption / mere data protocol / theCl1ppet Chip / /

URL

http /

SocialTag