- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
Ships in 1 to 3 days
The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillanceby Bruce Schneier
Synopses & Reviews
Edited by internationally recognized security expert Bruce Schneier and privacy advocate David Banisar, this is the definitive collection of critical and previously classified government and industry documents. It enables you to fully understand government policies and their impact on both individuals and companies involved with the Internet. The Electronic Privacy Papers offers readers a close look at regulatory and technical issues, including:
* The economic and political rationale for demanding digital wire tapping and surveillance
* The legal foundations of, and limitations to, government surveillance?
* Government strategies for soliciting cooperation from telephone companies and equipment manufacturers
* Which policies that industries and individuals can expect the government to pursue in the future
The Electronic Privacy Papers includes excerpts from the House Judiciary Committee report on the digital telephony bill, the final text of the bill, the FBI's wish list for electronic surveillance, U.S. cryptography policy statements from the White House, and many other government documents. The Electronic Privacy Papers is must reading for anyone involved with public policy and the delivery of online information.
Book News Annotation:
A collection of previously classified government and industry documents, including excerpts from the House Judiciary Committee report on the digital telephony bill, the FBI's wish list for electronic surveillance, and White House cryptography policy statements. Material is in sections on privacy and the Information Superhighway, wiretapping, the digital telephony proposal, cryptography, the clipper chip, export controls on cryptography, and banning cryptography. Introductory and overview chapters discuss the economic and political rationale for digital wire tapping, the legal foundations of government surveillance, and policies government may pursue in the future.
Annotation c. Book News, Inc., Portland, OR (booknews.com)
A collection of previously unreleased documents dealing with privacy in the Information Age.
Trying to keep up with the advancements in cryptography and digital telephony, the government has advocated controversial new tools that will allow them to monitor electronic communications. On the other side of the spectrum, privacy advocates are vehemently opposed to any government monitoring whatsoever. This book is a carefully selected and annotated collection of documents from both the government and the industry, enabling readers to fully understand governmental policies and how these will impact individuals and companies involved with the Internet.
Includes bibliographical references (p. 729-734) and indexes.
About the Author
BRUCE SCHNEIER is President of Counterpane Systems, a cryptography and data security firm. He is the author of Applied Cryptography (Wiley) and a contributing editor with Dr. Dobb's Journal.
DAVID BANISAR is an attorney with the Electronic Privacy Information Center (EPIC), editor of The International Privacy Bulletin, and contributing editor with Privacy Times.
Table of Contents
PRIVACY AND THE INFORMATION SNOOPERHIGHWAY. Roadblocks on the Information Superhighway. WIRETAPPING. Overview of Wiretapping. LOBBYING FOR SURVEILLANCE: THE DIGITAL TELEPHONY PROPOSAL. Digital Telephony: The Public Response. CRYPTOGRAPHY. Cryptography: The Cure for the Common Bug. THE BATTLE FOR CONTROL OF CRYPTOGRAPHY. Early Skirmishes. The Clipper Chip Proposal. Clipping the Clipper: Public Response to Desktop Surveillance. PUTTING THE GENIE BACK IN THE BOTTLE: EXPORT CONTROLS ON CRYPTOGRAPHY. Atom Bombs, Fighter Planes, Machines Guns, and Cryptography: Export Controls. BIG BROTHER AS THE KEEPER OF THE KEYS: WILL THE GOVERNMENT TAKE OVER CRYPTO? Banning Cryptography. Software Key Escrow. Epilog. Bibliography of Books and Articles on Wiretapping and Cryptography Index.
What Our Readers Are Saying
Average customer rating based on 1 comment:
Other books you might like