National Security on the Line
نویسنده
چکیده
INTRODUCTION................................................................................... 409 I. FEDERAL WIRETAPPING LAWS: A SHORT HISTORY............ 412 II. EXTENDING CALEA --WHAT DOES LAW ENFORCEMENT WANT? .......................................................... 418 III. HOW DOES NETWORK-SWITCHING TECHNOLOGY WORK?....................................................................................... 423 IV. TECHNOLOGY RISKS POSED BY THE FBI’S PROPOSAL......... 426 A. The End-to-End Rule in Internet Architecture ................ 427 B. The Internet and Critical Infrastructure............................. 428 C. Network Architecture and Wiretapping............................. 430 D. The Threats are Real .......................................................... 431 E. Enabling Surveillance by the Bad Guys.............................. 432 F. We’ve Had This Battle Before ........................................... 434 V. SECURITY FROM A BROADER VIEWPOINT............................. 437 CONCLUSION....................................................................................... 445
منابع مشابه
The United States National Security Strategy under Bush and Obama: Continuity and Change
The foreign policy of states determines the way they behave in the international arena. Accurate analysis of official foreign policy documents of a country is helpful in that it shows what the international priorities of a country are at specific periods. This article reviews the U.S. National Security Strategy documents published in 2002, 2006, 2010 and 2015 from the perspective of the percept...
متن کاملTrade and National Security: A Test for Best-Known Hypothesis
National security depends on soft power, the ability of a country to generate and use its economic power and to project its national values. It also depends on long-term factors that contribute to economic growth and increase the total resources base available not only for defense but to provide economic security in the form of income and business opportunities for individuals. The economic iss...
متن کاملThe Impact of Youth Identity Crisis on National Security of the Islamic Republic of Iran
In this study, the impact of youth identity crisis is investigated on the national security of the Islamic Republic of Iran. The research method is qualitative; the library method is used for data collection; and data analysis is carried out with descriptive-analytical method. The main research question is how does the identity crisis in youth affect the national security of the Islamic Republi...
متن کاملThe Impact of Syria and Iraq's Internal Conflicts on the National Security of the Islamic Republic of Iran
Controversial construction of the Middle East and the range of interests and national security of the Islamic Republic of Iran as well as the internal conflicts of Syria and Iraq affected national security of the Islamic Republic of Iran. In this regard, the central question of this study is "what has been the impact of the new regional security actions (the Syria andIraq conflicts) on the nati...
متن کاملNational Resilience As A Determinant Of National Security Of Ukraine
The purpose of this study is theoretical and methodological substantiation, deepening of conceptual provisions and development of scientific and practical recommendations for the formation of an integrated sector of national security and defense based on the principles of national resilience. The relevance of this study is due to the need to build national resilience to address the main problem...
متن کاملNational Security and Economic Growth
D uring the past few decades, national security plays a central role in the process of economic development. Also, foreign investment and trade have rapidly increased worldwide and have enhanced economic growth in developing countries. Although foreign investment and trade bring huge economic benefits, many developing countries fear that by opening up markets to competition and forei...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JTHTL
دوره 4 شماره
صفحات -
تاریخ انتشار 2006