426
Views
16
CrossRef citations to date
0
Altmetric
Original Articles

HIDING CRIMES IN CYBERSPACE

Pages 251-276 | Published online: 02 Dec 2010

REFERENCES

  • Akdeniz, Y. (1999) 'Regulation of Child Pornography on the Internet', http://www.leeds.ac.uk/law/pgs/yaman/child.htm.
  • Anderson, R., Needham, R. and Shamir, A. (1998) 'The Steganographic File System', presented at the Workshop on Information Hiding, Portland, OR, April 14-17.
  • Cisco Systems Inc. (1998) 'Thirteen High-Tech Leaders Support Alternative Solution to Network Encryption Stalemate', Press Release, July 13.
  • Corcoran, E. (1998) 'Breakthrough Possible in Battle over Encryption Technology,' Washington Post, July 12: A8.
  • CSA (1997) 'Can your crypto be turned against you? An interview with Eric Thompson of AccessData', Computer Security Alert, No. 167, February.
  • Denning, D. E. and Baugh, W. E., Jr. (1997) Encryption and Evolving Technologies as Tools of Organized Crime and Terrorism, National Strategy Information Center, Washington, DC, July.
  • EEF (1998) '"EFF DES Cracker" Machine Brings Honesty to Crypto Debate,' press announcement from the Electronic Frontier Foundation, July 17.
  • FBI Law Enforcement Bulletin (1970) 'Crime and Cryptology', April, 13-14.
  • Grabosky, P. N. and Smith, R. G. (1998) Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities, NY, USA: Transaction Publishers.
  • IINS News Service, (1997) Hamas Using Internet for Attack Instructions, Israel, 28 September.
  • Kaplan, D. E. and Marshall, A. (1996) The Cult at the End of the World, Crown Publishers.
  • Littman, J. (1997) The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulson, NY, USA: Little, Brown and Co.
  • Manning, W. M. (1997) 'Should You Be on the Net?' FBI Law Enforcement Bulletin, January, 18-22.
  • Markoff, J. (1998) 'US Data-Scrambling Code Cracked with Homemade Equipment', New York Times, 17 July.
  • May, T. C. (1996a) 'Introduction to BlackNet', reprinted in, Ludlow, P (ed), High Noon on the Electronic Frontier, MA, USA: MIT Press, pp. 241-243.
  • May, T. C. (1996b) 'BlackNet Worries', in Peter Ludlow, (ed), High Noon on the Electronic Frontier, MA, USA: MIT Press, pp. 245-249.
  • McCullah, D. (1997) 'IRS Raids a Cypherpunk', The Nedy News, 4 April.
  • Minow, M. (1997) 'Swedish Narcotics Police Demand Telephone Card Database', Risks-Forum Digest, 19(7), 14 April.
  • Power, R. (1997) 'CSI Special Report: Salgado Case Reveals Darkside of Electronic Commerce', Computer Security Alert, 174(September).
  • Ramo, J. C. (1996) 'Crime Online', Time Digital, September 23, pp. 28-32.
  • Reitinger, P. R. (1996) 'Compelled Production of Plaintext and Keys'.
  • US Congress (1997a) Statement of Louis J. Freeh, Director FBI, before the Senate Committee on Commerce, Science, and Transportation, regarding the Impact of Encryption on Law Enforcement and Public Safety, 19 March.
  • US Congress (1997b) Jeffrey A. Herig, Special Agent, Florida Department of Law Enforcement, 'The Encryption Debate: Criminals, Terrorists, and the Security Needs of Business and Industry', testimony before the Senate Judiciary Subcommittee on Technology, Terrorism, and Government Information, 3 September.
  • White House (1995) Remarks by the President to Staff of the CIA and Intelligence Community, Central Intelligence Agency, McLean, VA, 14July.
  • White House (1998) 'Administration Updates Encryption Policy', statement by the Press Secretary and fact sheet, September.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.