In this Book

summary

A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world.

Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population.

In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original—and prescient—discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

Table of Contents

Download EPUB Download Full EPUB
  1. Cover
  2. open access
    • View HTML View
  1. Halftitle
  2. open access
    • View HTML View
  1. Front
  2. open access
    • View HTML View
  1. Title
  2. open access
    • View HTML View
  1. Copyright
  2. open access
    • View HTML View
  1. Dedication
  2. open access
    • View HTML View
  1. Content
  2. open access
    • View HTML View
  1. Preface to the Updated and Expanded Edition
  2. open access
    • View HTML View
  1. Preface to the First Edition
  2. open access
    • View HTML View
  1. Acknowledgements
  2. open access
    • View HTML View
  1. 1 Introduction
  2. open access
    • View HTML View
  1. 2 Cryptography
  2. open access
    • View HTML View
  1. 3 Cryptography and Public Policy
  2. open access
    • View HTML View
  1. 4 National Security
  2. open access
    • View HTML View
  1. 5 Law Enforcement
  2. open access
    • View HTML View
  1. 6 Privacy: Protections and Threats
  2. open access
    • View HTML View
  1. 7 Wiretapping
  2. open access
    • View HTML View
  1. 8 Communications in the 1990s
  2. open access
    • View HTML View
  1. 9 Cryptography in the 1990s
  2. open access
    • View HTML View
  1. 10 And Then It All Changed
  2. open access
    • View HTML View
  1. 11 Après le Déluge
  2. open access
    • View HTML View
  1. 12 Conclusion
  2. open access
    • View HTML View
  1. Notes
  2. open access
    • View HTML View
  1. Glossary
  2. open access
    • View HTML View
  1. Bibliography
  2. open access
    • View HTML View
  1. Index
  2. open access
    • View HTML View
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.