Conferences related to Law Enforcement

Back to Top

2014 IEEE Sensors Applications Symposium (SAS)

SAS provides a forum for sensor users and developers to meet and exchange information about novel sensors and emergent sensor applications. The main purpose of SAS is to collaborate and network with scientists,engineers, researchers, developers, and end-users through formal technical presentations, workshops, and informal interactions.

  • 2013 IEEE Sensors Applications Symposium (SAS)

    SAS 2013 provides a forum for sensor users and developers to exchange information about novel and emergent applications in smart sensors, homeland security, biology, system health management, and related areas. Suggested topics for SAS 2013 include: Biosensors /Arrays, MEMS and Nanosensors, Sensor Networking, Smart Sensors and Standards, Virtual Sensors, Integrated System Health Management (ISHM), Multisensor Data Fusion, Nondestructive Evaluation and Remote Sensing, Homeland security, and Commercial Development.

  • 2012 IEEE Sensors Applications Symposium (SAS)

    SAS 2012 provides a forum for sensor users and developers to exchange information about novel and emergent applications in smart sensors, homeland security, biology, system health management, and related areas. Suggested topics for SAS 2012 include: Biosensors /Arrays, MEMS and Nanosensors, Sensor Networking, Smart Sensors and Standards, Virtual Sensors, Integrated System Health Management (ISHM), Multisensor Data Fusion, Nondestructive Evaluation and Remote Sensing, Homeland security, and Commercial Development.

  • 2011 IEEE Sensors Applications Symposium (SAS)

    SAS -2010 provides a forum for sensor users and developers to exchange information about novel and emergent applications in smart sensors, homeland security, biology, system health management, and related areas. Suggested topics for SAS -2010 include: Biosensors /Arrays, MEMS and Nanosensors , Wireless and Networked Sensors, Smart Sensors and Standards, Virtual Sensors, Radiation detection and standards, Integrated System Health Management (ISHM), Multisensor Data Fusion.

  • 2010 IEEE Sensors Applications Symposium (SAS)

    SAS-2010 provides a forum for sensor users and developers to exchange information about novel and emergent applications in smart sensors, homeland security, biology, system health management, and related areas. Suggested topics for SAS-2010 include: Biosensors /Arrays, MEMS and Nanosensors , Wireless and Networked Sensors, Smart Sensors and Standards, Virtual Sensors, Radiation detection and standards, Integrated System Health Management (ISHM), Multisensor Data Fusion, Nondestructive Evaluation and Remote

  • 2009 IEEE Sensors Applications Symposium (SAS)

    SAS-2009 provides a forum for sensor users and developers to exchange information about novel and emergent applications in smart sensors, homeland security, biology, system health management, and related areas. Suggested topics for SAS-2009 include: Biosensors /Arrays, MEMS and Nanosensors , Wireless and Networked Sensors, Smart Sensors and Standards, Virtual Sensors, Radiation detection and standards, X-ray detectors and imaging, Integrated System Health Management (ISHM), Multisensor Data Fusion, Nondestr

  • 2008 IEEE Sensors Applications Symposium (SAS)

    SAS-2008 provides a forum for sensor users and developers to exchange information about novel and emergent applications in smart sensors, homeland security, biology, system health management, and related areas. Suggested topics for SAS-2008 include: Biosensors /Arrays, MEMS and Nanosensors , Wireless and Networked Sensors, Smart Sensors and Standards, Virtual Sensors, Radiation detection and standards, X-ray detectors and imaging, Integrated System Health Management (ISHM), Multisensor Data Fusion.

  • 2007 IEEE Sensors Applications Symposium (SAS)

    SAS-2007 provides a unique forum for sensor users and developers to meet and exchange information about novel and emergent applications in smart sensors, homeland security, biosensors, integrated system health management, nondestructive evaluation, and related areas.


2013 IEEE International Conference on Intelligence and Security Informatics (ISI)

Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. The annual IEEE International ISI Conference series was started in 2003. In 2013, the main conference themes are: Big Data, Emergent Threats and Decision-Making in Security Informatics. ISI 2013 will be organized in three main streams focusing on: Big Data in Security Informatics, Emergent Threats, Decision-Making in Security Informatics.

  • 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012)

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners, to support counter-terrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts.

  • 2011 IEEE International Conference on Intelligence and Security Informatics (ISI 2011)

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention.

  • 2010 IEEE International Conference on Intelligence and Security Informatics (ISI 2010)

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field, involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies, local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security s missions of anticipation, interdiction, prevention, preparedness and r

  • 2009 IEEE International Conference on Intelligence and Security Informatics (ISI 2009)

    This conference provides a forum for discussion among academic researchers, law enforcment at all levels, and the intelligence community on current research in intelligence and security informatics, which is the study of advanced information technologies and systems, computer science, and algorithms for national and international security-related applications.

  • 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008)

    The study of the development and use of advanced information technologies and systems, computer science, and algorithms for national, international, and societal security-related applications, through an integrated technological, organizational, and policy based approach.

  • 2007 IEEE Intelligence and Security Informatics (ISI 2007)

    Informatics research has emerged as a key scientific discipline and applications domain supporting counterterrorism and homeland security's missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. ISI 2007 provides a forum for discussions among these vital communities: academic researchers (in information technologies, computer science, public policy, and social studies), local, state, and federal law enforcement and intelligence experts.


2013 International Carnahan Conference on Security Technology (ICCST)

This international conference is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainability. The ICCST facilitates the exchange of ideas and information.

  • 2012 IEEE International Carnahan Conference on Security Technology (ICCST)

    Research, development, and user aspects of security technology, including principles of operation, applications, and user experiences.

  • 2011 International Carnahan Conference on Security Technology (ICCST)

    This annual conference is the world s longest -running, international technical symposium on security technology. This conference is a forum for collaboration on all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainment. The ICCST facilitates the exchange of ideas and sharing of information on both new and existing technology and systems. Conference participants are encouraged to consider the impact of their work on society. The ICCST provides a foundation for support to authorities and agencies responsible for security, safety and law enforcement in the use of available and future technology.

  • 2010 IEEE International Carnahan Conference on Security Technology (ICCST)

    The ICCST is a forum for researchers and practitioners in both new and existing security technology, providing an interchange of knowledge through paper presentations and publication of proceedings that have been selected by the ICCST organizing committee.

  • 2009 International Carnahan Conference on Security Technology (ICCST)

    Conference is directed toward research and development and user aspects of electronic security technology.

  • 2008 International Carnahan Conference on Security Technology (ICCST)

    The ICCST is directed toward the research and development aspects of electronic security technology, including the operational testing of the technology. It establishes a forum for the exchange of ideas and dissemination of information on both new and existing technology. Conference participants are stimulated to consider the impact of their work on society. The Conference is an interchange of knowledge through the presentation of learned papers that have been selected by the ICCST organizing committee.

  • 2007 IEEE International Carnahan Conference on Security Technology (ICCST)

  • 2006 IEEE International Carnahan Conference on Security Technology (ICCST)

  • 2005 IEEE International Carnahan Conference on Security Technology (ICCST)


2012 eCrime Researchers Summit (eCrime 2012)

eCRS 2012 consist of two full days which bring together academic researchers, security practitioners, and law enforcement to discuss all aspects of electronic crime and ways to combat it.

  • 2011 eCrime Researchers Summit (eCrime 2011)

    eCRS 2011 will bring together academic researchers, security practitioners, and law enforcement to discuss all aspects of electronic crime and ways to combat it.

  • 2010 eCrime Researchers Summit (eCrime 2010)

    Academic and professional counter eCrime research and discussions of all aspects of electronic crime and how to combat it.

  • 2009 eCrime Researchers Summit (eCrime 2009)

    A comprehensive venue for the presentation of the state-of-the-art basic and applied research into electronic crime, engaging every aspect of its development (technical, behavioral, social and legal) as well as technologies and techniques for its detection, related forensics and its prevention.

  • 2008 eCrime Researchers Summit (eCrime 2008)

    eCrime '08 will bring together academic researchers, security practitioners, and law enforcement to discuss all aspects of electronic crime and ways to combat it.


2012 IEEE International Conference on Technologies for Homeland Security (HST)

The conference will focus on innovative technologies for deterring and preventing attacks, protecting critical infrastructure and individuals, mitigating damage , expediting recovery and bring together innovators from leading universities, research laboratories, Homeland Security Centers of Excellence, small businesses, system integrators and the end user community and provides a forum to discuss ideas, concepts and experimental results.

  • 2011 IEEE International Conference on Technologies for Homeland Security (HST)

    The conference will focus on innovative technologies for deterring and preventing attacks, protecting critical infrastructure and individuals, mitigating damage , expediting recovery and bring together innovators from leading universities, research laboratories, Homeland Security Centers of Excellence, small businesses, system integrators and the end user community and provides a forum to discuss ideas, concepts and experimental results.

  • 2010 IEEE International Conference on Technologies for Homeland Security (HST)

    The IEEE International Conference on Technologies for Homeland Security (HST) addresses critical technology issues and bringing together innovators from universities, research laboratories, Homeland Security Centers of Excellence, businesses, system integrators, and end users to discuss ideas and experimental results. Featured speakers are from U.S. DHS Science & Technology, (Dr. Starnes Walker, Dir. of Research; Christopher Doyle, Dir., Infrastructure & Geophysical Div.; and Dr. Thomas Cellucci, CCO)


More Conferences

Periodicals related to Law Enforcement

Back to Top

IT Professional

This IEEE Computer Society periodical covers the many rapidly emerging issues facing information technology professionals, developers, and managers of enterprise information systems. IT Professional's coverage areas include: Web services, Internet security, data management; enterprise architectures and infrastructures; organizing and utilizing data; instituting cross-functional systems; using IT for competitive breakthroughs; integrating systems and capitalizing on IT advances; emerging technologies like electronic ...


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Technology and Society Magazine, IEEE

The impact of technology (as embodied by the fields of interest in IEEE) on society, the impact of society on the engineering profession, the history of the societal aspects of electrotechnology, and professional, social, and economic responsibility in the practice of engineering and its related technology.




Xplore Articles related to Law Enforcement

Back to Top

Offline location search using Reverse K-Mean Clustering & GSM communication

Asmita Singh; Devendra Somwanshi 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015

Converting Navigation to Offline thereby designing it more user-friendly with wider accessibility to a wider range of people is the main motivation behind the work. This paper proposes a Reverse K-Mean Clustering approach that utilizes the concept of k-mean clustering of finding centroids and works inversely as the traditional k-mean to search for the locations in the geographical dataset (map). ...


Organized Crime Structures in Co-offending Networks

Mohammad A. Tayebi; Uwe Glasser 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, 2011

This paper aims at a conceptual foundation for the development of advanced computational methods for analyzing co-offending networks to identify organized crime structures -- i.e., any static or dynamic characteristics of a co-offending network that potentially indicate organized crime or refer to criminal organizations. Specifically, we study networks derived from large real-world crime datasets using social network analysis and data ...


Cellular digital packet data network

D. Saha; S. E. Kay IEEE Transactions on Vehicular Technology, 1997

Cellular digital packet data (CDPD) is a data network designed to meet growing mobile data transmission needs. CDPD networks can stand alone or overlay on the cellular voice system by drawing radio resources from the pool of unused or free cellular analog voice channels. Detection as to whether a channel is free or occupied is mechanized through channel sniffers. Once ...


LNG in U.S. Ports

F. Halvorsen; A. Schneider OCEANS '76, 1976

This paper describes the existing and impending movement of large quantities of Liquefied Natural Gas (LNG) through the ports of this country. The role of the U. S. Coast Guard, the primary Federal Agency responsible for maritime safety and law enforcement, is outlined in relation to this movement and attendant storage of LNG in our port areas. The existing, building, ...


Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The New EU Research Agenda

Borka Jerman Blažič; Tomaž Klobučar 2016 European Intelligence and Security Informatics Conference (EISIC), 2016

Cybercrime and cyberterrorism remain important problems of today's society. Insufficient resources for the fight against cybercrime and cyberterrorism require research activities in this field to be allocated where the gaps exist. This paper presents results of the COURAGE project process to identify missing research items in the area of cybercrime and cyberterrorism. In total, 12 main issues that need further ...


More Xplore Articles

Educational Resources on Law Enforcement

Back to Top

eLearning

Offline location search using Reverse K-Mean Clustering & GSM communication

Asmita Singh; Devendra Somwanshi 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015

Converting Navigation to Offline thereby designing it more user-friendly with wider accessibility to a wider range of people is the main motivation behind the work. This paper proposes a Reverse K-Mean Clustering approach that utilizes the concept of k-mean clustering of finding centroids and works inversely as the traditional k-mean to search for the locations in the geographical dataset (map). ...


Organized Crime Structures in Co-offending Networks

Mohammad A. Tayebi; Uwe Glasser 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, 2011

This paper aims at a conceptual foundation for the development of advanced computational methods for analyzing co-offending networks to identify organized crime structures -- i.e., any static or dynamic characteristics of a co-offending network that potentially indicate organized crime or refer to criminal organizations. Specifically, we study networks derived from large real-world crime datasets using social network analysis and data ...


Cellular digital packet data network

D. Saha; S. E. Kay IEEE Transactions on Vehicular Technology, 1997

Cellular digital packet data (CDPD) is a data network designed to meet growing mobile data transmission needs. CDPD networks can stand alone or overlay on the cellular voice system by drawing radio resources from the pool of unused or free cellular analog voice channels. Detection as to whether a channel is free or occupied is mechanized through channel sniffers. Once ...


LNG in U.S. Ports

F. Halvorsen; A. Schneider OCEANS '76, 1976

This paper describes the existing and impending movement of large quantities of Liquefied Natural Gas (LNG) through the ports of this country. The role of the U. S. Coast Guard, the primary Federal Agency responsible for maritime safety and law enforcement, is outlined in relation to this movement and attendant storage of LNG in our port areas. The existing, building, ...


Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The New EU Research Agenda

Borka Jerman Blažič; Tomaž Klobučar 2016 European Intelligence and Security Informatics Conference (EISIC), 2016

Cybercrime and cyberterrorism remain important problems of today's society. Insufficient resources for the fight against cybercrime and cyberterrorism require research activities in this field to be allocated where the gaps exist. This paper presents results of the COURAGE project process to identify missing research items in the area of cybercrime and cyberterrorism. In total, 12 main issues that need further ...


More eLearning Resources

IEEE-USA E-Books

  • Appendix B: Codes of Ethics

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Hiding Crimes in Cyberspace

    This chapter contains sections titled: Introduction, Encryption in Crime and Terrorism, Law Enforcement Options, Other Technologies for Hiding Evidence, Concealing Crimes through Anonymity, Conclusions, Notes, References

  • Appendix C: Pointers to Additional Resources

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Introduction

    Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. InPrivacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

  • Index

    Lawyer and writer Mike Godwin has been at the forefront of the struggle to preserve freedom of speech on the Internet. In Cyber Rights he recounts the major cases and issues in which he was involved and offers his views on free speech and other constitutional rights in the digital age. Godwin shows how the law and the Constitution apply, or should apply, in cyberspace and defends the Net against those who would damage it for their own purposes.Godwin details events and phenomena that have shaped our understanding of rights in cyberspace--including early antihacker fears that colored law enforcement activities in the early 1990s, the struggle between the Church of Scientology and its critics on the Net, disputes about protecting copyrighted works on the Net, and what he calls "the great cyberporn panic." That panic, he shows, laid bare the plans of those hoping to use our children in an effort to impose a new censorship regime on what otherwise could be the most liberating communications medium the world has seen. Most important, Godwin shows how anyone--not just lawyers, journalists, policy makers, and the rich and well connected--can use the Net to hold media and political institutions accountable and to ensure that the truth is known.

  • Bibliography

    Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. InPrivacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

  • Obstacles on the Road to Corporate Data Responsibility

    No issue is more closely identified with big data in public awareness than privacy (Ohm and Peppet, this volume). Many proposals for improving privacy protection focus on national security and law enforcement agencies, or on data brokers and search firms (e.g., Google; Burdon and Andrejevic, this volume). To the extent, however, that every organization today collects, stores, manages, and processes information, every organization has responsibilities for privacy and data protection.

  • Index

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Conclusion

    This chapter contains sections titled: Prospects for Intelligence, Prospects for Law Enforcement, Prospects for Security, What Kind of Society Do We Want?, Cryptography in Context, Where Are We Headed?

  • Index

    Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. InPrivacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.



Standards related to Law Enforcement

Back to Top

No standards are currently tagged "Law Enforcement"