Susan Landau, Stephen Kent, Clint Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffe, Anthony Lauck, Doug Miller, Peter G. Neumann, David Sobel,
Codes, Keys and Confilicts: Issues in U.S. Crypto
Abstract: In this report, the author attempt to remove teh rhetotic, lay bare the facts, and frame teh issues. It examine the issues of communication security from a variety of viewponits: (I) explain the technical consideration of communications security; (II) considers the dual-edged sword cryptography presents to both law enforcment and national security; (III) presents the history of wiretap law in the United States; (IV) puts the current policy on crytopgraphy in the context of decisions over the last twenty years.
Gordon R. Meyer,
The Social Organization Of The Computer Underground
Abstract: This paper examines the social organization of the "computer underground" (CU). The CU is composed of actors in three roles, "computer hackers," "phone phreaks," and "software pirates." These roles have frequently been ignored or confused in media and other accounts of CU activity. By utilizing a data set culled from CU channels of communication this paper provides an ethnographic account of computer underground organization. It is concluded that despite the widespread social network of the computer underground, it is organized primarily on the level of colleagues, with only small groups approaching peer relationships.
Built by Mark Crosbie and Ivan Krsul.
Security Archive Homepage.
COAST Project (CERIAS)Page.
Purdue CS Dept page.