Wiretapping and Electronic Surveillance
نویسندگان
چکیده
منابع مشابه
Surveillance Or Security? The Risks Posed by New Wiretapping Technologies
The United States has moved large portions of business and commerce, including the control of critical infrastructure, onto IP-based networks. This reliance on information systems leaves the U.S. highly exposed and vulnerable to cyberattack. Yet despite this, U.S. law enforcement and national security policy remain firmly focused on building wiretapping systems within communications infrastruct...
متن کاملWiretapping a Hidden Network
We consider the problem of maximizing the probability of hitting a strategically chosen hidden virtual network by placing a wiretap on a single link of a communication network. This can be seen as a twoplayer win-lose (zero-sum) game that we call the wiretap game. The value of this game is the greatest probability that the wiretapper can secure for hitting the virtual network. The value is show...
متن کاملWiretapping the Net
enforcement agencies to place wiretaps on the Internet. While there are certainly legitimate reasons for wanting this ability, it is an area that is fraught with technical difficulty and legal ambiguity. In light of these problems, new legal and technical approaches to wiretapping are in order. In this article, we examine wiretapping problems from several perspectives—statutory, jurisdictional,...
متن کاملEthical Dilemma of Governmental Wiretapping
USA Government wiretapping activities is a very controversial issue. Undoubtedly this technology can assist law enforced authority to detect / identify unlawful or hostile activities; however, this task raises severe privacy concerns. In this paper, we have discussed this complex information technology issue of governmental wiretapping and how it effects both public and private liberties. Legis...
متن کاملNation-State Routing: Censorship, Wiretapping, and BGP
The treatment of Internet traffic is increasingly affected by national policies that require the ISPs in a country to adopt common protocols or practices. Examples include government enforced censorship, wiretapping, and protocol deployment mandates for IPv6 and DNSSEC. If an entire nation’s worth of ISPs apply common policies to Internet traffic, the global implications could be significant. F...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Criminal Law, Criminology, and Police Science
سال: 1964
ISSN: 0022-0205
DOI: 10.2307/1140461