LDR | | 06191cmm u2200661Ii 4500 |
001 | | 000000317123 |
003 | | OCoLC |
005 | | 20230525181919 |
006 | | m d |
007 | | cr cnu---unuuu |
008 | | 180429s2018 dcu ob 000 0 eng d |
019 | |
▼a 1036204716
▼a 1037006239 |
020 | |
▼a 9780309471541
▼q (electronic book) |
020 | |
▼a 0309471540
▼q (electronic book) |
020 | |
▼a 9780309471565
▼q (electronic bk.) |
020 | |
▼a 0309471567
▼q (electronic bk.) |
020 | |
▼z 0309471532 |
020 | |
▼z 9780309471534 |
024 | 8 |
▼a DOI:10.17226/25010 |
035 | |
▼a 1823567
▼b (N$T) |
035 | |
▼a (OCoLC)1032788096
▼z (OCoLC)1036204716
▼z (OCoLC)1037006239 |
040 | |
▼a DID
▼b eng
▼e rda
▼e pn
▼c DID
▼d CUS
▼d EBLCP
▼d YDX
▼d XFF
▼d YDX
▼d OCLCF
▼d MERUC
▼d IDB
▼d EZ9
▼d INT
▼d OCLCQ
▼d LVT
▼d OCLCQ
▼d UKAHL
▼d N$T
▼d 248032 |
043 | |
▼a n-us--- |
049 | |
▼a MAIN |
050 | 4 |
▼a QA76.9.A25
▼b N37 2018 |
082 | 04 |
▼a 005.8/24
▼2 23 |
110 | 2 |
▼a National Academies of Sciences, Engineering, and Medicine (U.S.).
▼b Computer Science and Telecommunications Board,
▼e author. |
245 | 10 |
▼a Decrypting the encryption debate :
▼b a framework for decision makers /
▼c Committee on Law Enforcement and Intelligence Access to Plaintext Information, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences. |
260 | |
▼a Washington, DC :
▼b The National Academies Press,
▼c [2018] |
300 | |
▼a 1 online resource (xiv, 104 pages) |
336 | |
▼a text
▼b txt
▼2 rdacontent |
337 | |
▼a computer
▼b c
▼2 rdamedia |
338 | |
▼a online resource
▼b cr
▼2 rdacarrier |
347 | |
▼a text file
▼2 rda |
347 | |
▼b PDF |
490 | 1 |
▼a A consensus study report of the National Academies of Sciences, Engineering, Medicine |
504 | |
▼a Includes bibliographical references. |
505 | 0 |
▼a Summary. -- 1. Introduction. 1.1 Government options. 1.2 Scope and context for access. 1.3 Evaluation framework. -- 2. Encryption and its applications. 2.1 What is encryption? 2.2 Designing encryption. 2.3 Applications of encryption. 2.4 Encryption and the expanding cyber threat. -- 3. The role of encryption in protecting privacy and civil liberties. -- 5. Information needs of law enforcement and the intelligence community. 4.1 Goals of law enforcement officials and intelligence analysts. 4.2 The volume and diversity of information relevant to law enforcement and the intelligence community. 4.3 Encryption as an impediment to investigations. 4.4 The pracical utility of alternatives to exceptional access. 5. Opetions for accessing plaintext. 5.1 Options for accessing plaintext. 5.2 Legal tools for obtaining plaintext within the current legislative framework. 5.3 Technological approaches for accessing plaintext, limitations, and alternatives. 5.4 Enhanced financial and technical support. 5.5 Legislation mandating access. -- 6. International dimensions. 6.1 Effects of U.S. actions on other countries and the international market for U.S. goods and services. 6.2 Global norms. 7. A framework for evaluating approaches to access plaintext. -- Appendixes. -- Biographies of committee and staff. -- Briefers to the committee. |
520 | |
▼a "Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool. At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators. Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information"--Publisher's description. |
588 | 0 |
▼a Online resource; title from digital title page (viewed on June 19, 2018). |
590 | |
▼a Added to collection customer.56279.3 |
650 | 0 |
▼a Data encryption (Computer science) |
650 | 0 |
▼a Civil rights
▼z United States. |
650 | 0 |
▼a Privacy, Right of
▼z United States. |
650 | 0 |
▼a Computer networks
▼x Security measures
▼x Social aspects. |
650 | 7 |
▼a Civil rights.
▼2 fast
▼0 (OCoLC)fst00862627 |
650 | 7 |
▼a Data encryption (Computer science)
▼2 fast
▼0 (OCoLC)fst00887935 |
650 | 7 |
▼a Privacy, Right of.
▼2 fast
▼0 (OCoLC)fst01077444 |
651 | 7 |
▼a United States.
▼2 fast
▼0 (OCoLC)fst01204155 |
655 | 4 |
▼a Electronic books. |
776 | 08 |
▼i Print version:
▼a National Academies of Sciences, Engineering, and Medicine (U.S.). Computer Science and Telecommunications Board.
▼t Decrypting the encryption debate.
▼d Washington, DC : The National Academies Press, [2018]
▼z 0309471532
▼z 9780309471534
▼w (OCoLC)1035823333 |
830 | 0 |
▼a Consensus study report. |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1823567 |
938 | |
▼a Askews and Holts Library Services
▼b ASKH
▼n AH36618497 |
938 | |
▼a EBL - Ebook Library
▼b EBLB
▼n EBL5389609 |
938 | |
▼a YBP Library Services
▼b YANK
▼n 15365548 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 1823567 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b N$T |