Abstract
We live in perilous times. We live in times where a dirty bomb going off in lower Manhattan is not unimaginable. We live in times where the CIA interrogations of al Qaeda leaders were so harsh that the FBI would not let its agent participate [36]. We live in times when security and liberty are both endangered.
We also live in times of unimaginable technical creativity. It is faster to use Instant Messaging to query a colleague halfway across the world than it is to walk down the hallway and ask the question, when Google can search four billion web pages faster than the time it takes to pull the right volume of the Oxford English Dictionary off the library shelf. We live surrounded by a plethora of communicating and computing devices – telephones, PDAs, cell phones, laptops, PCs, Computers – and this is only the beginning of the communications revolution.
Chapter PDF
References
Administrative Office of the U.S. Courts, Washington D.C., 1995 Wiretap Report
Administrative Office of the U.S. Courts, Washington D.C., 2003 Wiretap Report
Anderson, B., Buchholz, T.: Memo for Jim Jukes. In: [16] (May 22, 1992)
Brandeis, L.: Dissenting opinion in Olmstead v. United States, 277 U.S. 438 (1928)
Brooke, J.: Prosecutors in Bomb Trial Focus on Time Span and Truck Rental. New York Times, Al–A10 (May 10, 1997)
Brooks, J.: Telephone: the First Hundred Years. Harper and Row (1975)
Campbell, D.: Interception 2000: Development of Surveillance Technology and Risk of Abuse of Economic Information, Report to the Director General for Research of the European Parliament, Luxembourg (April 1999)
Clark, R.: (1967). In: 44, pp. 285–321
Congressional Quarterly Weekly 1968b Congressional Quarterly Weekly, vol. 26, Washington, D.C., July 19 (1968b)
Dam, K., Lin, H. (eds.): Committee to Study National Cryptography Policy, Computer Science and Telecommunications Board, National Resource Council, Cryptography’s Role in Securing the Information Society, National Academy Press (1996)
Dempsey, J.X.: Communications Privacy in the Digital Age: Revitalizing the Federal Wiretap Laws to Enhance Privacy. Albany Law Journal of Science and Technology 8(1) (1997)
Dempsey, J.X., Cole, D.: Terrorism and the Constitution: Sacrificing Civil Liberties in the Name of National Security. In: First Amendment Foundation (1999)
Dime, W., Landau, S.: Privacy on the Line: The Politics of Wiretapping and Encryption. MIT Press, Cambridge (1998)
Department of Commerce, Bureau of Export Administration: 15 CFR Parts 734, 740, 742, 770, 772, and 774, Docket No. RIN: 0694-ACll, Revisions to Encryption Items. Effective (January 14, 2000)
Electronic Frontier Foundation, Analysis of the FBI Proposal Regarding Digital Telephony (September 17, 1992)
Electronic Privacy Information Center. In: Banisar, D. (ed.) 1994 Cryptography and Privacy Sourcebook: Primary Documents on U.S. Encryption Policy, the Clipper Chip, the Digital Telephony Proposal, and Export Controls, Diane Publishing, Upland, PA (1994)
Electronic Privacy Information Center, 1996 EPIC Cryptography and Privacy Sourcebook: Documents on Wiretapping, Cryptography, the Clipper Chip, Key Escrow and Export Controls. Diane Publishing Co., Upland, PA (1996)
Federal Bureau of Investigation: Benefits and Costs of Legislation to Ensure the Government’s Continued Capability to Investigate Crime with the Implementation of New Telecommunications Technologies. In: [16]
Letter to Telecommunications Industry Liaison Unit, Federal Bureau of Investigation. In: 17, pp. B14–B20 (November 13, 1995)
Federal Bureau of Investigation, Implications of Section 104 of the Communications Act for Law Enforcement. Federal Register 62(9), 192-1911(January 14, 1997)
Federal Bureau of Investigation, In the Matter of the United States Department of Justice, the Federal Bureau of Investigation, and the Drug Enforcement Agency: Joint Petition for Rulemaking to Resolve Various Outstanding Issues Concerning the Implementation of the Communications Assistance for Law Enforcement Act: Joint Petition for Expedited Rulemaking before the Federal Communications Commission (March 10, 2004)
Federal Communications Commission, Memorandum Opinion and Order (September 10, 1998)
Firestone, D., Canedy, D.: After the Attacks: The Suspects; FBI Documents Detail the Movements of 19 Men Believed to be Hijackers. New York Times, p. Al (September 15, 2001)
Freeh, Louis in United States Senate, Committee on the Judiciary, Subcommittee on Technology and the Law (Senate), and United States House of Representatives, Committee on the Judiciary, Subcommittee on Civil and Constitutional Rights, Digital Telephony and Law Enforcement Access to Advanced Telecommunications Technologies and Services, Joint Hearings on HR 4922 and S. 2375, March 18-August 11 (1994), One Hundred Third Congress, Second Session
Hersh, S.: Annals of National Security: What Went Wrong. The New Yorker (October 8, 2001)
Joint Statement of Industry and Public Interest, In the Matter of Joint Petition for Rulemaking to Resolve Various Outstanding Issues Concerning the Implementation of the Communications Assistance for Law Enforcement Act (April 27, 2004)
Leone, R.C., Anrig Jr., G. (eds.): The War on our Freedoms: Civil Liberties in an Age of Terrorism, Century Foundation (2002)
Levy, R.: Memo for Doug Steiner. In: [16] (May 26, 1992)
Lewis, A.: Robert Kennedy Vows in Georgia to Act on Rights. New York Times, p. 1 (May 7, 1961)
Markoff, J.: Cellular Industry Rejects U.S. Plan for Surveillance. New York Times, p. Al (September 20, 1996)
Mcintosh, D., Gattuso, J.: Memo for Jim Jukes. In: [16] (May 22, 1992)
Neilsen/Net Ratings, Broadband Growth Trend
The President’s Commission on Law Enforcement and the Administration of Justice, The Challenge of Crime in a Free Society, United States Government Printing Office (1967)
Odlyzko, A.: Content is not King, http://www.dtc.umn.edu//szraodlyzko/doc/networks.html
NWG, RFC2804 — IETF Policy on Wiretapping (May 2000)
Risen, J., Johnston, D., Lewis, N.A.: Harsh CIA Methods Cited in Top Qaeda Interrogations. New York Times, p. Al (May 13, 2004)
Rosen, J.: The Naked Crowd. Random House (2004)
Sessions, W.: Testimony in [43]
Stern, J.: Terror in the Name of God. Harper Collins Publishers (2003)
Technology and Privacy Advisory Committee: Department of Defense, Safeguarding Privacy in the Fight Against Terrorism (March 2004)
United States Commission on National Security/Twenty-First Century, Road Map for National Security: Imperative for Change: Phase III Report of the U.S. Commission on National Security/Twenty-First Century (January 31, 2001)
United States, Senate Select Committee to Study Governmental Operations with respect to Intelligence Activities, Intelligence Activities and the Rights of Americans, Final Report, Book II, Report 94-755, Ninety-fourth Congress, Second Session, April 23 (1976)
United States Senate, Select Committee on Intelligence, Senate Select Committe on Intelligence: Inquiry into the FBI Investigation of the Committee in Solidarity wih the People of El Salvador, Hearings on February 23, April 13, September 14 and 29 (1988), One Hundredth Congress, Second Session
United States House of Representatives, Committee on the Judiciary, Subcommittee No. 5, Anti-Crime Program, Hearings on HR 5037, 5038, 5384, 5385 and 5386, March 15, 16, 22, 23, April 5, 7, 10, 12, 19, 20, 26 and 27, 1967, Ninetieth Congress, First Session (1967)
Van Natta Jr., D., Butler, D.: How Tiny Swiss Cellphone Chips Helped Track Global Terror Web. New York Times, p. Al (March 4, 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Landau, S. (2004). Security, Liberty, and Electronic Communications. In: Franklin, M. (eds) Advances in Cryptology – CRYPTO 2004. CRYPTO 2004. Lecture Notes in Computer Science, vol 3152. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28628-8_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-28628-8_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22668-0
Online ISBN: 978-3-540-28628-8
eBook Packages: Springer Book Archive