LDR | | 03833cmm u2200541Ii 4500 |
001 | | 000000314941 |
005 | | 20230525165603 |
006 | | m d |
007 | | cr mn||||||||| |
008 | | 170213t20172017dcua ob 000 0 eng d |
019 | |
▼a 973770046 |
020 | |
▼a 9781442279964
▼q (electronic bk.) |
020 | |
▼a 1442279966
▼q (electronic bk.) |
020 | |
▼z 9781442279957 (pb) |
020 | |
▼z 1442279958 (pb) |
035 | |
▼a 1472400
▼b (N$T) |
037 | |
▼a 993941
▼b MIL |
040 | |
▼a AWC
▼b eng
▼e rda
▼e pn
▼c AWC
▼d N$T
▼d IDEBK
▼d 248032 |
050 | 4 |
▼a QA76.9.A25
▼b L49 2017 |
072 | 7 |
▼a COM
▼x 083000
▼2 bisacsh |
082 | 04 |
▼a 005.824
▼2 23 |
100 | 1 |
▼a Lewis, James A.,
▼e author. |
245 | 14 |
▼a The effect of encryption on lawful access to communications and data /
▼c authors, James A. Lewis, Denise E. Zheng, William A. Carter.
▼h [electronic resource] |
260 | 1 |
▼a Washington, DC :
▼b Center for Strategic & International Studies ;
▼a Lanham, MD :
▼b Rowman & Littlefield,
▼c [2017] |
300 | |
▼a 1 online resource (v, 39 pages) :
▼b color illustrations |
336 | |
▼a text
▼b txt
▼2 rdacontent |
337 | |
▼a computer
▼b c
▼2 rdamedia |
338 | |
▼a online resource
▼b cr
▼2 rdacarrier |
347 | |
▼a text file
▼b PDF
▼2 rda |
500 | |
▼a "February 2017." |
500 | |
▼a "A report of the CSIS Technology Policy Program." |
504 | |
▼a Includes bibliographical references. |
505 | 0 |
▼a Introduction : encryption's effect on lawful access to communications and data -- How prevalent is unrecoverable encryption? -- Data on going dark -- Global concern, but no global consensus -- Accessing plaintext -- Options for managing the encryption problem -- Balancing individual rights and the social good. |
520 | |
▼a "Many have drawn parallels between today's debate over 'Going Dark' and the 'Crypto Wars' of the 1990s, but much has changed since then. First, the Internet has become central to global economic activity, politics, and security. The security environment has changed, as we face much more aggressive state actors in espionage. The Snowden revelations in 2013 damaged the credibility of U.S. tech companies operating abroad, and any requirement that they facilitate U.S. government access to their customers' communications could affect their international competitiveness. Terrorists and criminals find creative ways to leverage the latest technologies to evade law enforcement. Technology continues to evolve, making unrecoverable encryption easier for individuals to obtain and use. Furthermore, any U.S. policy on encryption might set a precedent that other countries would be tempted to follow. While the debate thus far has pitted privacy and individual security against the critical task of stopping criminals and terrorists, there may be technical and policy solutions that can balance national security and public safety with protection of privacy, civil liberties, and a functioning global Internet ecosystem"--Publisher's web site. |
588 | |
▼a Description based on online resource; title from PDF title page (CSIS, viewed February 13, 2017). |
650 | 0 |
▼a Data encryption (Computer science) |
650 | 0 |
▼a Data encryption (Computer science)
▼x Law and legislation. |
650 | 0 |
▼a Data recovery (Computer science) |
650 | 0 |
▼a Data recovery (Computer science)
▼x Law and legislation. |
650 | 7 |
▼a COMPUTERS / Security / Cryptography
▼2 bisacsh |
655 | 4 |
▼a Electronic books. |
700 | 1 |
▼a Zheng, Denise E.,
▼e author. |
700 | 1 |
▼a Carter, William A.,
▼e author. |
710 | 2 |
▼a CSIS Technology and Public Policy Program,
▼e issuing body. |
710 | 2 |
▼a Center for Strategic and International Studies (Washington, D.C.),
▼e publisher. |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1472400 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 1472400 |
938 | |
▼a Ingram Digital eBook Collection
▼b IDEB
▼n cis37676687 |
990 | |
▼a 관리자 |