Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1997

International Humanitarian Law

Articles 1 - 1 of 1

Full-Text Articles in Computer Law

Cryptography And Liberty: An International Survey Of Encryption Policy, 16 J. Marshall J. Computer & Info. L. 475 (1998), Wayne Madsen, David L. Sobel, Marc Rotenberg, David Banisar Jan 1997

Cryptography And Liberty: An International Survey Of Encryption Policy, 16 J. Marshall J. Computer & Info. L. 475 (1998), Wayne Madsen, David L. Sobel, Marc Rotenberg, David Banisar

UIC John Marshall Journal of Information Technology & Privacy Law

The speedy progress of the "digital revolution" has significantly changed the manner in which individuals and other entities communicate and exchange information. Since traditional paper based media for communication is being replaced by high tech means, new security measures such as cryptographic security techniques are sought to ensure individual privacy. This is a drastic change because encryption technology was traditionally utilized by military and diplomatic communications. Human rights activists, political dissidents and journalists employ encryption technology to protect communication from government surveillance. The Global Internet Liberty Campaign ("GILC") was organized to protect civil liberties and human rights in the on-line …