Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
Articles 1 - 2 of 2
Full-Text Articles in Computer Law
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Indiana Law Journal
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …
Key Escrow Encryption Policies And Technologies, Dorothy E. Denning, William E. Baugh Jr.
Key Escrow Encryption Policies And Technologies, Dorothy E. Denning, William E. Baugh Jr.
Villanova Law Review
No abstract provided.