laws concerning exports of cryptography tools there are no laws on importing cryptography. the u.s....
TRANSCRIPT
Laws Concerning Exports of Cryptography Tools
•There are no laws on importing cryptography.
•The U.S. has signed the Waasenaar Arrangement, but does not implement the General Software Note.
Laws Concerning Exports of Cryptography Tools
•Export Administration Regulations(EAR)
•Exporting via Internet
•Export Case Law
Laws Concerning Exports of Cryptography Tools
•Cyberspace Electronic Security Act of 1999
•Domestic Security Enhancement Act of 2003 (Patriot II)
•The E-Privacy Act
•Communications Privacy and Consumer Empowerment Act
Incidents That Have Happened
*Senator Judd Gregg
Incidents That Have Happened
*Janet Reno
Incidents That Have Happened
*Frank Gaffney
Incidents That Have Happened
*Louis Freech
Incidents That Have Happened
*Terrorists
Incidents That Have Happened
*Osama bin Laden
Two Sides of the Story
The government
The industry
Two Sides of the Story
Dan Bernstein
Al Gore
What Happens in Other Countries
Cocom
Waasenaar Agreement
What Happens in Other Countries
What Happens in Other Countries
What Happens in Other Countries
What Happens in Other Countries
The European Union (EU)
-Within countries
-Outside of the EU
What Happens in Other Countries
Russia
What Happens in Other Countries
Korea
What Happens in Other Countries
Australia
ConclusionThe laws of cryptography are based on what
helps the government. This often causes
difficulties, whether from people with bad or
good intentions outside the government.
Works CitedKoops, Bert-Jaap. “Crypto Law Survey.” 12 Nov.
2008 <http://rechten.uvt.nl/koops/cryptolaw/>.
Mark, Roy. "Crypto manners." eWeek 25.15 (12 May 2008): 8-8. Academic Search Complete.
EBSCO. [Library name], [City], [State abbreviation]. 4 Dec. 2008
McCullagh, Declan. “Congress Mulls Stiff Crypto Laws.” Wired.com 13 Sept. 2001. 23
November 2008. <http://www.wired.com/politics/law/news/2001/09/46816>.
Works CitedBorzo, Jeanette. "Privacy group blasts new cryptography laws." InfoWorld 21.2 (11 Jan. 1999): 52. Academic Search Complete. EBSCO. [Library name], [City], [State abbreviation]. 4 Dec. 2008 <http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=1473840&site=ehost-live>.
“Practical UNIX and Internet Security.”<http://www.unix.com.ua/orelly/networking/puis/ch06_07.htm>.