240 likes | 355 Views
Laws Concerning Exports of Cryptography Tools. There are no laws on importing cryptography. The U.S. has signed the Waasenaar Arrangement, but does not implement the General Software Note. Laws Concerning Exports of Cryptography Tools. Export Administration Regulations(EAR)
E N D
Laws Concerning Exports of Cryptography Tools • There are no laws on importing cryptography. • The U.S. has signed the Waasenaar Arrangement, but does not implement the General Software Note.
Laws Concerning Exports of Cryptography Tools • Export Administration Regulations(EAR) • Exporting via Internet • Export Case Law
Laws Concerning Exports of Cryptography Tools • Cyberspace Electronic Security Act of 1999 • Domestic Security Enhancement Act of 2003 (Patriot II) • The E-Privacy Act • Communications Privacy and Consumer Empowerment Act
Incidents That Have Happened *Senator Judd Gregg
Incidents That Have Happened *Janet Reno
Incidents That Have Happened *Frank Gaffney
Incidents That Have Happened *Louis Freech
Incidents That Have Happened *Terrorists
Incidents That Have Happened *Osama bin Laden
Two Sides of the Story The government The industry
Two Sides of the Story Dan Bernstein Al Gore
What Happens in Other Countries Cocom Waasenaar Agreement
What Happens in Other Countries The European Union (EU) -Within countries -Outside of the EU
What Happens in Other Countries Australia
Conclusion The laws of cryptography are based on what helps the government. This often causes difficulties, whether from people with bad or good intentions outside the government.
Works Cited Koops, Bert-Jaap. “Crypto Law Survey.” 12 Nov. 2008 <http://rechten.uvt.nl/koops/cryptolaw/>. Mark, Roy. "Crypto manners." eWeek 25.15 (12 May 2008): 8-8. Academic Search Complete. EBSCO. [Library name], [City], [State abbreviation]. 4 Dec. 2008 McCullagh, Declan. “Congress Mulls Stiff Crypto Laws.” Wired.com 13 Sept. 2001. 23 November 2008. <http://www.wired.com/politics/law/news/ 2001/09/46816>.
Works Cited Borzo, Jeanette. "Privacy group blasts new cryptography laws." InfoWorld 21.2 (11 Jan. 1999): 52. Academic Search Complete. EBSCO. [Library name], [City], [State abbreviation]. 4 Dec. 2008 <http://search.ebscohost.com/login.aspx?direct=tr ue&db=a9h&AN=1473840&site=ehost-live>. “Practical UNIX and Internet Security.” <http://www.unix.com.ua/orelly/networking/puis /ch06_07.htm>.