Crypto Social Issues
This page is a subsection of the Crypto link farm.
Links to further crypto and security-related information can be found there.
- [1997] 1 Web JCLI
- Analysis of the UK governments policy on encryption.
- Additional Comments of Philip R. Karn, Jr.
- Phil Karn rebuts inaccurate and bizarre government claims in congressional testimony (this is an example of the kind of misinformation which government advisors often provide to their governments).
- Adopt An MP - Homepage
- UK campaign to adopt an MP and enlighten them over problems with crypto restrictions.
- Adopt An MP - Letter to Jack Straw, Home Secretary
- Simple photo essay showing how to get rid of politicians pushing for draconian anti-privacy laws.
- America Online exploits bug in own software
- AOL uses a bug in its own software to run code on users machines.
- Americans for Computer Privacy
- Computer privacy issues.
- Baltimore - Library - UK Crypto Policy
- Comments on UK crypto policy (from the person who tried to sell GAK to the NHS).
- BBC News - Encryption
- BBC news stories on encryption, including "UK Government dithers on encryption regulation".
- Big Brother Incorporated
- Companies which supply surveillance technology to non-democratic regimes.
- Big Brother Inside Homepage
- Privacy concerns about Intel's PIII processor ID (mis)feature.
- Big Brother is watching
- Echelon for do-it-yourselfers.
- Brookings Policy Brief No.21.
- Brookings Institute study of crypto policy (pro-GAK).
- C to English and English to C translator
- Translates crypto code into English to allow it to be exported, then translates it back into code afterwards.
- CACIB
- UK government tactics for deploying GAK.
- Canada's export controls
- Summary of the Canadian crypto export situation.
- Cato Handbook for Congress: Freedom on the Internet and Other Computer Networks
- Cato Institute study of crypto policy (anti-GAK).
- Centre for Democracy and Technology Crypto Page
- CDT information on current US crypto policy
- CIPHR'99 Conference: Cryptography & International Protection of Human Rights
- Conference on crypto and human rights.
- Clipper Roadshow
- US government policy laundering on key escrow.
- CNET features - digital life - privacy in the digital age
- Digital privacy (or more specifically, the lack thereof).
- The Codex Privacy Site
- Surveillance, stalking, privacy invasion, eavesdropping, and anything else related to these categories.
- Comments on Encryption Transfers
- Comments on new US export regulations.
- Comments on Encryption Transfers - HTML
- Easier-to-handle HTML versions of the above.
- Confronting the New Intelligence Establishment: Lessons from the Colorado Experience
- Article on NSA communications interception and attempts to have it stopped.
- Coral
- Traffic monitoring on an OC3 link using a Pentium PC - an example of how this sort of thing would be done.
- Cracking DES
- Cracking DES from the US (made available based on the Ninth Circuit Court of Appeals ruling that the export controls violate the First Amendment).
- Crime, Terror & War: National Security & Public Safety in the Information Age
- The sky is falling! The sky is falling!
- Crypto AG
- Reports of Crypto AG rigging crypto hardware to allow NSA decryption.
- Crypto AG - Der Spiegel (German)
- Allegations of intelligence agencies subverting Crypto AG product security.
- Crypto AG: The NSA's Trojan Whore?
- Possible rigging of Swiss-made crypto gear by the NSA.
- Crypto-Controls Advisory Services
- The one organisation making money out of US export controls.
- Crypto Law Survey
- A survey of crypto laws in various countries.
- Crypto regulation in Europe
- The state of crypto regulation plans in Europe as of May 1997.
- Cryptography and Liberty 1999
- 1999 EPIC report on crypto controls.
- Cryptography's Role in Securing the Information Society
- National Academy of Sciences report on cryptography policy.
- Cryptography, Scientific Freedom, and Human Rights
- American Association for the Advancement of Science page on crypto and human rights.
- Cryptology: Law Enforcement & National Security vs. Privacy, Security & The Future of Commerce
- Good analysis of crypto politics and export control issues.
- Cyberspace Law for Non-Lawyers
- Privacy laws and the Internet.
- Das Ministerium für Wahrheit
- Information and links on Echelon, Europol/Enfopol, and other wide-scale surveillance initiatives.
- Development of Surveillance Technology and Risk of Abuse of Economic Information 1/4
- European parliament report on computer-based industrial espionage.
- DIE ZEIT Nr. 28/1998 Leichtes Spiel
- German news report on NSA industrial espionage leading to $100M loss for German company.
- DIE ZEIT Nr. 39 vom 17. 9. 1998: Hintertür für Spione
- Another report on Enercon industrial espionage.
- Distributing encryption software by the Internet: loopholes in Australian export controls
- Examination of legal implications of electronic export from Australia. Conclusion: It's OK.
- DTI/UK Encryption Policy
- Reply to the DTI Consultation Paper on Licensing of Trusted Third Parties for the Provision of Encryption Services.
- dtype.org - keyanalyze
- PGP keyring statistical analysis.
- E-commerce under threat from encryption deal
- The Australian Financial Review on Wassenaar'98.
- Echelon: Exposing the Global Surveillance System
- Covert Action Quarterly article on wordlwide NSA surveillance.
- ECHELON: America's Secret Global Surveillance Network
- Free Congress Foundation report on Echelon surveillance system.
- ECHELON Research Resources
- Echelon resources and information.
- Echelon--Rights Violation in the Information Age, by Don Lobo Tiggre
- Article on Echelon.
- Echelon Watch
- ACLU site which tracks Echelon information.
- EE Times - White Paper
- White paper on hackers.
- Ekstra Bladet
- Danish newspaper's coverage of Echelon.
- Emerging Japanese Encryption Policy
- How Japan, Inc, handles encryption policy (a real contrast to the US governments attitude).
- Encryption: Impact on Law Enforcement
- FBI's "The sky is falling" speech, revised every year or so (it's been falling since about '92).
- Encryption Policy and Market Trends
- Dorothy Dennings 1997 GAK forecast.
- Encryption Policy for the 21st Century
- Cato Institute study on the future of encryption.
- EPIC Cryptography Policy
- EPIC information on current US crypto policy.
- EPIC Privacy Links
- EPIC privacy resources.
- export-a-crypto-system sig
- Diminuitive crypto hacks (well-known algorithms in a few lines of Perl, Python, or C) and how to use them to poke fun at export laws.
- Export Licensing of Intangibles
- Commentary on likely effects of UK proposal to license export of intangibles.
- Exposing the Global Surveillance System
- Extracts from Nicky Hager's book "Secret Power".
- FinCen
- Big Brother for financial information.
- Former Secrets
- Declassified US government machinations to ban/restrict crypto.
- Framework for Smart Card Use in Government - FIPR Response
- Why multifunction smart cards (and government plans for smart cards in general) won't work.
- French Cryptology: the takeover by force of Jospin
- Article given background details on the liberalisation of crypto in France.
- FUD! Home Page - Crypto legislation
- Contents of and discussion over various US crypto bills.
- GILC -- Cryptography and Liberty
- Survey of encryption policy worldwide.
- Global Monetary
- Electronic implants to "aggressively build a proprietary global system of exchange, customer tracking and profiling". Not sure if these people are for real or not.
- GNN on Crypto
- Global Network Navigator web review: The NSA vs The Net.
- Government, Cryptography, and the Right to Privacy
- Paper documenting the overt and covert regulation and restriction of cryptography by governments.
- Good Privacy Test Sites
- Links to sites which show how easy it is to get information on your and your activities on the net.
- GR Design Principles
- GAK-resistant crypto protocol design guidelines.
- Gray Areas Magazine
- Essays and articles on the computer underground (and all sorts of other things).
- Green light for limited encryption exports
- Australia's interpretation of Wassenaar'98.
- Growing Development of Foreign Encryption Products in the face of U.S. Export Regulations
- 1999 survey of non-US companies producing crypto products.
- IFIP TC11 Position on Cryptopolicies
- IFIP's (very sensible) position on crypto use and crypto regulation.
- Information About PGP & Encryption
- Information on the creeping takeover of GAK.
- Interception
- Technical details on large-scale GSM and ISDN interception techniques.
- Interception Capabilities 2000
- Comprehensive report on worldwide communications surveillance and interception practices.
- International requirements for interception
- The FBI exports CALEA to the rest of the world.
- Internet Privacy Coalition
- Attempts to ensure privacy on the internet.
- Interview with David Herson - SOGIS
- Interview on European crypto policy.
- ITAR Civil Disobedience
- Click on this form to become an international arms trafficker.
- Key Recovery Study
- The risks of key recovery, key escrow, and trusted third party encryption.
- Liberalization 2000
- President's Export Council Subcommittee on Encryption recommendations to pretty much remove export controls.
- Los Angeles County Public Defender's Office
- Information on large-scale illegal wiretaps in LA.
- Menwith Hill letter from Ministry of Defence
- There's nothing going on there... nothing to see... move along, move along...
- Microsoft, the NSA, and You
- Description of NSA backdoor inserted into every (recent) version of Windows.
- NCSA HTTPd/Mosaic: Using PGP/PEM auth
- Early attempts to incorporate PEM and PGP encryption into web browsers torpedoed by the NSA.
- NSA and Crypto-politics
- Huge (1/2MB) writeup on the NSA and crypto politics.
- NSA's Influence on New Zealand Crypto Policy
- NSA influence on New Zealand export policy.
- No Chance for Key Recovery
- Paper on key recovery (GAK) vs human and political rights.
- NSA's keys
- NSA and MS CryptoAPI CSP signing keys.
- Paul Wolf's Echelon Links
- Links to information on Echelon, media coverage, and other information.
- PC Week: Lies and cryptography
- "We've lately had reason to wonder if our nation's cryptography policy is being made by fools. It is a mixed blessing to learn that the people in charge are merely liars [...]".
- PGP 6.0: Cat out of the bag
- Wired article showing just how effective US export controls really are.
- Phil Zimmermann
- Letters to Phil about the use of PGP by human rights groups.
- Phone Tapping
- Information and resources on government phone tapping plans.
- Pressemitteilung - 2. Juni 1999
- Germany government statement affirming the right to use the strongest crypto possible.
- Privacy, Inc.
- Various resources related to the (lack of) privacy, including access to databases and online information search facilities.
- Privacy International Home Page
- Privacy reports, interntional agreements on privacy and human rights, surveillance technologies, ID cards, privacy-related conferences.
- Privacy News
- Privacy news, resources, and links.
- Privacy on the Internet
- Zola Times articles on Internet privacy.
- Privacy on the Net: Practical Issues
- Links and information on various privacy-related issues (cryptography, anonymity, secure communications).
- q/depesche
- Free crypto campaign logos.
- Remailer list
- List of anonymous remailers.
- Report: U.S. Uses Key Escrow To Steal Secrets
- Report on US using crypto restrictions to steal other countries economic secrets.
- Roger Clarke's Privacy Page
- Data surveillance and information privacy information publications, and legislation.
- Roger Clarke's Public Interests on the Electronic Frontier
- Paper discussing various freedoms and rights such as the right to privacy.
- Roxen's General Export Application for Strong 128-bit Encrypted Denied
- Swedish government refusal of export permit for 128-bit SSL.
- RSA as a MIDI file
- RSA encoded as a MIDI file. Technically this is a program and therefore unexportable from the US.
- Self Incrimination and Cryptographic Keys
- Richmond Journal of Law and Technology article on forced disclosure of crypto keys.
- Services Available from Offshore Information Services Ltd.
- Offshore internet services and accounts in Anguilla.
- SOFTWAR Information Security
- Declassified papers and resources on Clipper and key escrow, voice and mail encryption software.
- Solitaire Encryption Algorithm
- How to turn a deck of cards into an export-controlled item.
- Special Investigation: ILETS and the ENFOPOL 98 Affair
- FBI policy laundering: Persuade Europe to adopt wiretapping laws which failed in the US.
- Stille, I svumpukler! Det er en andagtsfuld stund!
- Information on crypto controls, Echelon, and related issues, from a Danish perspective.
- Tapping into CALEA
- Government surveillance server ("delivers intercepted call content and identifying information... capacity for up to 512 simulatneous call intercepts".
- Telekommunikationsgesetz
- East German surveillance state-style laws being applied in the unified Germany.
- Telepolis Enfopol-Papiere
- Documentation relating to EU telecoms surveillance plans (EU-Echelon).
- The Age - Computers
- DSD meddling in Australian crypto exports.
- The European Surveillance Union
- Story on European Enfopol massive-scale wiretapping initiative.
- Threat and Vulnerability Model for Key Recovery
- NSA report on why GAK is bad (yes, you read that right).
- Tools For Privacy: Version 1
- An online book covering threats to privacy, cryptography, PGP, and related issues.
- TruePosition Wireless Location System Home Page
- Cellular phone tracking.
- UK Cryptographic Policy Discussion Group
- ukcrypto mailing list archives.
- Updated UK Proposals for Licensing Encryption Services
- Critique of UK crypto licensing/GAK proposal.
- U.S. Electronic Espionage: A Memoir
- First exposure of the NSA and Echelon
- US Spy Agency Confirms Secret Princess Diana Files
- Echelon in action: APB story on NSA building up 1000+ page file on Princess Diana.
- Walsh Report
- Report on Australian crypto policy, originally suppressed by the government, then released in censored form after a judicial review, finally obtained as the full version by EFA. Provides most interesting reading since the bits they didn't want the public to see are now highlighted in red.
- What your Browser is Sending
- See what information your web browser is sending to remote servers.
- Wiretapping Provisions of Anti-Terrorism Legislation
- Comparison of surveillance measures proposed after the WTC attack.
- World Wide Wiretapping Problem, Illegal Line Wiretapping and Network Eavesdropping around the World
- Links to wiretapping information and news from around the world.