Privacy on the line : : the politics of wiretapping and encryption / / Whitfield Diffie and Susan Landau.

Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to us...

Full description

Saved in:
Bibliographic Details
Superior document:The MIT Press
:
TeilnehmendeR:
Year of Publication:2010
Edition:Updated and expanded ed.
Language:English
Series:The MIT Press
Physical Description:1 online resource (496 p.)
Notes:Description based upon print version of record.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993546857004498
ctrlnum (CKB)2670000000544767
(EBL)3338688
(SSID)ssj0000283143
(PQKBManifestationID)11236298
(PQKBTitleCode)TC0000283143
(PQKBWorkID)10336817
(PQKB)10178254
(CaBNVSL)mat06267248
(IDAMS)0b000064818b4200
(IEEE)6267248
(OCoLC)731211540
(OCoLC-P)731211540
(MaCbMITP)5572
(OCoLC)1053171939
(MdBmJHUP)muse70624
(Au-PeEL)EBL3338688
(CaPaEBR)ebr10185594
(CaONFJC)MIL209626
(OCoLC)939263700
(MiAaPQ)EBC3338688
(oapen)https://directory.doabooks.org/handle/20.500.12854/78482
(EXLCZ)992670000000544767
collection bib_alma
record_format marc
spelling Diffie, Whitfield.
Privacy on the line : the politics of wiretapping and encryption / Whitfield Diffie and Susan Landau.
Updated and expanded ed.
Cambridge, Mass. ; London : MIT Press, 2010.
1 online resource (496 p.)
text txt
computer c
online resource cr
The MIT Press
Description based upon print version of record.
English
Also available in print.
Includes bibliographical references (p. [401]-443) and index.
Cryptography -- Cryptography and public policy -- National security -- Law enforcement -- Privacy : protections and threats -- Wiretapping -- Communications in the 1990s -- Cryptography in the 1990s -- And then it all changed -- Apres le deluge.
Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original - and prescient - discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.
OCLC-licensed vendor bibliographic record.
Creative Commons Attribution-NoDerivatives 4.0 International CC BY-ND 4.0 https://creativecommons.org/licenses/by-nd/4.0/legalcode
Unrestricted online access star
Data encryption (Computer science) Law and legislation United States.
Electronic intelligence United States.
Electronic surveillance Political aspects United States.
Privacy, Right of United States.
Telecommunication Political aspects United States.
Wiretapping United States.
INFORMATION SCIENCE/Communications & Telecommunications
INFORMATION SCIENCE/Technology & Policy
0-262-04240-1
0-262-51400-1
Landau, Susan Eva.
language English
format eBook
author Diffie, Whitfield.
spellingShingle Diffie, Whitfield.
Privacy on the line : the politics of wiretapping and encryption /
The MIT Press
Cryptography -- Cryptography and public policy -- National security -- Law enforcement -- Privacy : protections and threats -- Wiretapping -- Communications in the 1990s -- Cryptography in the 1990s -- And then it all changed -- Apres le deluge.
author_facet Diffie, Whitfield.
Landau, Susan Eva.
author_variant w d wd
author2 Landau, Susan Eva.
author2_variant s e l se sel
author2_role TeilnehmendeR
author_sort Diffie, Whitfield.
title Privacy on the line : the politics of wiretapping and encryption /
title_sub the politics of wiretapping and encryption /
title_full Privacy on the line : the politics of wiretapping and encryption / Whitfield Diffie and Susan Landau.
title_fullStr Privacy on the line : the politics of wiretapping and encryption / Whitfield Diffie and Susan Landau.
title_full_unstemmed Privacy on the line : the politics of wiretapping and encryption / Whitfield Diffie and Susan Landau.
title_auth Privacy on the line : the politics of wiretapping and encryption /
title_new Privacy on the line :
title_sort privacy on the line : the politics of wiretapping and encryption /
series The MIT Press
series2 The MIT Press
publisher MIT Press,
publishDate 2010
physical 1 online resource (496 p.)
Also available in print.
edition Updated and expanded ed.
contents Cryptography -- Cryptography and public policy -- National security -- Law enforcement -- Privacy : protections and threats -- Wiretapping -- Communications in the 1990s -- Cryptography in the 1990s -- And then it all changed -- Apres le deluge.
isbn 0-262-26251-7
0-262-25601-0
1-282-09626-5
9786612096266
0-262-04240-1
0-262-51400-1
callnumber-first K - Law
callnumber-subject KF - United States
callnumber-label KF9670
callnumber-sort KF 49670
geographic_facet United States.
illustrated Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 340 - Law
dewey-ones 342 - Constitutional & administrative law
dewey-full 342.730858
dewey-sort 3342.730858
dewey-raw 342.730858
dewey-search 342.730858
oclc_num 731211540
1053171939
939263700
work_keys_str_mv AT diffiewhitfield privacyonthelinethepoliticsofwiretappingandencryption
AT landaususaneva privacyonthelinethepoliticsofwiretappingandencryption
status_str c
ids_txt_mv (CKB)2670000000544767
(EBL)3338688
(SSID)ssj0000283143
(PQKBManifestationID)11236298
(PQKBTitleCode)TC0000283143
(PQKBWorkID)10336817
(PQKB)10178254
(CaBNVSL)mat06267248
(IDAMS)0b000064818b4200
(IEEE)6267248
(OCoLC)731211540 (OCoLC)939263700 (OCoLC)1059008778
(OCoLC-P)731211540
(MaCbMITP)5572
(OCoLC)1053171939
(MdBmJHUP)muse70624
(Au-PeEL)EBL3338688
(CaPaEBR)ebr10185594
(CaONFJC)MIL209626
(OCoLC)939263700
(MiAaPQ)EBC3338688
(oapen)https://directory.doabooks.org/handle/20.500.12854/78482
(EXLCZ)992670000000544767
carrierType_str_mv cr
hierarchy_parent_title The MIT Press
is_hierarchy_title Privacy on the line : the politics of wiretapping and encryption /
container_title The MIT Press
author2_original_writing_str_mv noLinkedField
_version_ 1797653545536716800
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04748cam a2200841Ma 4500</leader><controlfield tag="001">993546857004498</controlfield><controlfield tag="005">20240424230214.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">101005r20102007maua ob 001 0 eng </controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-262-26251-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-262-25601-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-282-09626-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786612096266</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)2670000000544767</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)3338688</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000283143</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11236298</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000283143</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10336817</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10178254</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)mat06267248</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(IDAMS)0b000064818b4200</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(IEEE)6267248</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)731211540</subfield><subfield code="z">(OCoLC)939263700</subfield><subfield code="z">(OCoLC)1059008778</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC-P)731211540</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MaCbMITP)5572</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1053171939</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MdBmJHUP)muse70624</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL3338688</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10185594</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL209626</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)939263700</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC3338688</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/78482</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)992670000000544767</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OCoLC-P</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OCoLC-P</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">KF9670</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">075000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">342.730858</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Diffie, Whitfield.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy on the line :</subfield><subfield code="b">the politics of wiretapping and encryption /</subfield><subfield code="c">Whitfield Diffie and Susan Landau.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Updated and expanded ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Cambridge, Mass. ;</subfield><subfield code="a">London :</subfield><subfield code="b">MIT Press,</subfield><subfield code="c">2010.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Cambridge, Mass. ;</subfield><subfield code="a">London :</subfield><subfield code="b">MIT Press,</subfield><subfield code="c">2010.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (496 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">The MIT Press</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. [401]-443) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cryptography -- Cryptography and public policy -- National security -- Law enforcement -- Privacy : protections and threats -- Wiretapping -- Communications in the 1990s -- Cryptography in the 1990s -- And then it all changed -- Apres le deluge.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original - and prescient - discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">OCLC-licensed vendor bibliographic record.</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">Creative Commons Attribution-NoDerivatives 4.0 International</subfield><subfield code="f">CC BY-ND 4.0</subfield><subfield code="u">https://creativecommons.org/licenses/by-nd/4.0/legalcode</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="f">Unrestricted online access</subfield><subfield code="2">star</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic intelligence</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic surveillance</subfield><subfield code="x">Political aspects</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Telecommunication</subfield><subfield code="x">Political aspects</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wiretapping</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">INFORMATION SCIENCE/Communications &amp; Telecommunications</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">INFORMATION SCIENCE/Technology &amp; Policy</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-262-04240-1</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-262-51400-1</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Landau, Susan Eva.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-04-26 03:10:59 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2014-04-05 23:31:26 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338349500004498&amp;Force_direct=true</subfield><subfield code="Z">5338349500004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338349500004498</subfield></datafield></record></collection>