See Richard Field, '1996: Survey of the Year's Developments in Electronic Cash Law and the Laws Affecting Electronic Banking in the United States,' 46
21.
See A. Michael Froomkin, 'It Came from Planet Clipper: The Battle over Crypto graphic Key `Escrow,''
22.
Anick Jesdanun, 'Attacks Renew Debate Over Encryption Software,'
23.
Jay P. Kesan and Rajiv C. Shah, Shaping Code, 18
24.
Former Attorney General Richard Thornburgh, for example, has called a national ID card 'an infringement on rights of Americans'; see Ann Devroy, 'Thornburgh Rules Out Two Gun Control Options; Attorney General Objects to Registration Card for Gun Owners, National Identification Card,'
25.
Jack Goldsmith and Timothy Wu, 'Digital Borders,'
26.
Notice that this would be an effective end-run around the protections that the Court recognized in
27.
Arthur Cordell and T. Ran Ide have proposed the consideration of a bit tax; see Arthur J. Cordell et al.,
28.
Countries with such a requirement have included Argentina, Australia, Belgium, Greece, Italy, and Switzerland; see Richard L. Hasen, 'Symposium: Law, Economics, and Norms: Voting Without Law?'
29.
See the description in Scott Bradner, 'The Internet Engineering Task Force,' in
30.
Michael Froomkin makes a similar point: 'Export control rules have had an effect on the domestic market for products with cryptographic capabilities such as e-mail, operating systems, and word processors. Largely because of the ban on export of strong cryptography, there is today no strong mass-market standard cryptographic product within the U.S. even though a considerable mathematical and programming base is fully capable of creating one'; 'It Came from Planet Clipper,' 19.
31.
See 'Network Associates and Key Recovery,' available at http://web.archive.org/web/19981207010043/http://www.nai.com/products/security/key.asp (cached: http://www.webcitation.org/5KytMd1L8).
32.
Cisco has developed products that incorporate the use of network-layer encryption through the IP Security (IPSec) protocol. For a brief discussion of IPSec, see Cisco Systems, Inc., 'IP Security–IPSec Overview,' available at http://web.archive.org/web/19991012165050/http://cisco.com/warp/public/cc/cisco/mkt/ios/tech/security/prodlit/i