Cyber Insecurity by Richard Harrison & Trey Herr

Cyber Insecurity by Richard Harrison & Trey Herr

Author:Richard Harrison & Trey Herr
Language: eng
Format: epub
Publisher: Rowman & Littlefield Publishers


NOTES

1. David Kahn, The Codebreakers: The Story of Secret Writing (New York: Scribner, 1996).

2. David W. Gaddy, “Rochford’s Cipher: a Discovery in Confederate Cryptography,” Cryptologia, 16 (4), 1994.

3. J. H. Maurer and C. M. Bell, At the Crossroads between Peace and War: The London Naval Conference of 1930 (Annapolis: Naval Institute Press, 2014).

4. F. H. Hinsley and A. Stripp, Codebreakers: The Inside Story of Bletchley Park, Oxford England (New York: Oxford University Press, 1994).

5. Nick Sullivan, “A (relatively Easy to Understand) Primer on Elliptic Curve Cryptography,” Arstechnica, October 24, 2014, accessed March 28, 2016, http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/.

6. National Software Council, “A White Paper on U.S. Encryption Policy,” Alexandria, VA, 1995, https://saltworks.stanford.edu/assets/druid:tx020jf4250.pdf.

7. For more on public versus private key, see chapter 11—“Understanding Internet Security Governance.”

8. Whitfield Diffie and Susan Landau, “Privacy on the Line: The Politics of Wiretapping and Encryption,” MIT Press, 2010.

9. Executive Order 13026 of November 19, 1996, Administration of Export Controls on Encryption Products, Vol. 61, Washington, D.C., https://www.gpo.gov/fdsys/pkg/FR-1996-11-19/pdf/96-29692.pdf.

10. Information obtained from presentation by Major Natalie Vanetta, 01/10/2016 given at the 2016 Law Enforcement Summit, New York. Major Vanetta was a student at the time and was told upon entering classes with books containing works on encryption that she was not allowed to travel externally to the country. Students from foreign classes complained about not being able to participate in certain classes.

11. Fact Sheet: Public Encryption Management, White House, 1994, https://epic.org/crypto/clipper/white_house_factsheet.html; Earnest F Brickell, Dorthy E Denning, Stephen T. Kent, David P. Maher, and Walter Tuchman, 1993, SKIPJACK Review, NIST, https://epic.org/crypto/clipper/skipjack_interim_review.html.

12. Matt Blaze, Protocol Failure in the Escrowed Encryption Standard, the 2nd ACM Conference (New York: ACM, 1994).

13. Whitfield Diffie, “The Impact of a Secret Cryptographic Standard on Encryption, Privacy, Law Enforcement and Technology” (hearings before the Subcommittee on Telecommunications and Finance of the Committee on Energy and Commerce, U.S. House of Representatives, 103rd Congress, 1st Session, April 19 and June 9, 1993).

14. There are still certain communications platforms inaccessible to CALEA. Certain forms of data in transit and certain forms of data at rest fall outside of CALEA.

15. Nate Anderson, “Deep Packet Inspection Meets ‘Net Neutrality, CALEA,” Ars Technica, July 25, 2007, http://arstechnica.com/gadgets/2007/07/deep-packet-inspection-meets-net-neutrality/; “FAQ on the CALEA Expansion by the FCC,” September 19, 2007, https://www.eff.org/pages/calea-faq.

16. See https://howsecureismypassword.net; Elaine Barker, William Barker, William Burr, William Polk, and Miles Smid, 2012, Recommendation for Key Management - Part 1: General. National Institute of Standards, http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf.

17. Bruce Schneier, Kathleen Seidel, and Saranya Vijayakumar, 2016, “A Worldwide Survey of Encryption Products,” 1st ed.

18. Aaron F. Brantley and Muhammad Al-‘Ubaydi, “Extremist Forums Provide Digital OpSec Training,” CTC Sentinel, May 2015, 1–11.

19. Ibid.

20. Jay Yarrow, “Amazon Was Selling 306 Items Every Second at Its Peak This Year,” Business Insider, December 27, 2012, http://www.businessinsider.com/amazon-holiday-facts-2012-12.

21. Jason Dedrick and Kenneth Kraemer, “Globalization of Innovation: The Personal Computing Industry,” April 24, 2008, accessed March 28, 2016. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1125025.

22. Proposed Assembly Bill 8093, New York State Senate, 2015-2016 Regular Session, June 6, 2015, http://legislation.nysenate.gov/pdf/bills/2015/A8093; Cyrus Farivar, “Yet Another Bill Seeks to Weaken Encryption-by-Default on Smartphones,” Ars Technica, January 21, 2016, http://arstechnica.com/tech-policy/2016/01/yet-another-bill-seeks-to-weaken-encryption-by-default-on-smartphones/.

23. Claire Cain Miller, “Revelations of N.S.A. Spying Cost U.S. Tech Companies,” The New York Times, March 21, 2014, http://www.nytimes.com/2014/03/22/business/fallout-from-snowden-hurting-bottom-line-of-tech-companies.html.

24. Cara McGoogan, “The FBI Director Wants to Stop End-to-End Encryption (Wired UK),” Wired.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.