psec_ov.htm (cached: http://www.webcitation.org/5Iwt19135). For a more extensive discussion, see Cisco Systems, Inc., 'Cisco IOS Software Feature: Network-Layer Encryption — White Paper'; Cisco Systems, Inc. 'IPSec — White Paper,' available at http://web.archive.org/web/20020202003100/http://www.cisco.com/warp/public/cc/techno/protocol/ipsecur/ipsec /tech/ipsec_wp.htm (cached: http://www.webcitation.org/5Iwt3l7WB); see also Dawn Bushaus, 'Encryption Can Help ISPs Deliver Safe Services,' Tele.Com , March 1, 1997; Beth Davis and Monua Janah, 'Cisco Goes End-to-End,' Information Week, February 24, 1997, 22.

33.

See Internet Architectural Board statement on 'private doorbell' encryption, available at http://www.iab.org/documents/docs/121898.html (cached: http://www.webcitation.org/5Iwt6RMid).

34.

Little, but not nothing. Through conditional spending grants, the government was quite effective initially in increasing Net participation, and it was effective in resisting the development of encryption technologies; see Whitfield Diffie and Susan Eva Landau, Privacy on the Line: The Politics of Wiretapping and Encryption (Cambridge, Mass.: MIT Press, 1998). Steven Levy tells of a more direct intervention. When Richard Stallman refused to passwordprotect the MIT AI (artificial intelligence) machine, the Department of Defense threatened to take the machine off the Net unless the architectures were changed to restrict access. For Stallman, this was a matter of high principle; for the Department of Defense, it was business as usual; see Steven Levy, Hackers: Heroes of the Computer Revolution (Garden City, N.Y.: Anchor Press/Doubleday, 1984), 416–18.

35.

On virtual private networks, see Richard Smith, Internet Cryptography (Boston: Addi son-Wesley, 1997) chs. 6, 7; on biometric techniques for security, see Trust in Cyberspace, edited by Fred B. Schneider (Washington, D.C.: National Academy Press, 1999), 123–24, 133–34.

36.

Jonathan L. Zittrain, 'The Generative Internet,' 119 Harvard Law Review 1974 (2006).

37.

Ibid., 2010.

38.

Ibid., 2012.

39.

Ibid.

40.

Ibid.

41.

Ibid., 2011.

42.

Ibid.

43.

Uniting and Strengthening America by Providing Appropriate Tools Required to Inter cept and Obstruct Terrorism (USA PATRIOT ACT) Act, Pub. L. No. 107–56, 155 STAT. 272 (2001); American Civil Liberties Union, Seeking Truth From Justice: PATRIOT Propaganda-The Justice Department's Campaign to Mislead the Public About the USA PATRIOT Act (American Civil Liberties Union, July 9, 2003).

44.

Roberto Mangabeira Unger, Social Theory: Its Situation and Its Task (New York: Cam bridge University Press, 1987).

45.

In Bruce Ackerman, Social Justice in the Liberal State (New Haven: Yale University Press, 1980), the core analytic device is dialogue: every assertion of power is met with a demand for justification.

46.

William J. Mitchell, City of Bits: Space, Place, and the Infobahn' (Cambridge, Mass.: MIT Press, 1996), 112.

Вы читаете Code 2.0
Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату
×