UK Report on Responsibility for the September 11 Terrorist Attacks
This document does not purport to provide a prosecutable case against Usama Bin Laden in a court of law. Intelligence often cannot be used evidentially, due both to the strict rules of admissibility and to the need to protect the safety of sources. But on the basis of all the information available HMG is confident of its conclusions as expressed in this document.
Wednesday, October 10, 2001
Tuesday, October 09, 2001
Men & Mice - Domain Health Survey
Since 1998, Men & Mice has conducted numerous surveys on DNS (Domain Name System) "health" issues. The purpose of these surveys is to increase awareness of DNS security for organizations with on-line presence. The Domain Name System is the heartbeat of the Internet and every task performed using a web browser or email application relies on DNS. Numeous publications have cited our research.
Since 1998, Men & Mice has conducted numerous surveys on DNS (Domain Name System) "health" issues. The purpose of these surveys is to increase awareness of DNS security for organizations with on-line presence. The Domain Name System is the heartbeat of the Internet and every task performed using a web browser or email application relies on DNS. Numeous publications have cited our research.
Monday, October 08, 2001
Crypto Law Survey
This is a survey of existing and proposed laws and regulations on cryptography - systems used for protecting information against unauthorized access. Governments have long restricted export of cryptography for fear that their intelligence activities are hampered by the crypto use of foreign states and scoundrels. Since the rise of crypto use over the past decades, governments increasingly worry about criminals using cryptography to thwart law enforcement. Thus, many countries are considering laws focusing on maintaining law-enforcement and national-security capabilities through regulation of cryptography.
This survey gives an overview of the current state of affairs, with entries per country on import/export controls, domestic laws, developments to restrict cryptography, and developments favoring crypto use.
This is a survey of existing and proposed laws and regulations on cryptography - systems used for protecting information against unauthorized access. Governments have long restricted export of cryptography for fear that their intelligence activities are hampered by the crypto use of foreign states and scoundrels. Since the rise of crypto use over the past decades, governments increasingly worry about criminals using cryptography to thwart law enforcement. Thus, many countries are considering laws focusing on maintaining law-enforcement and national-security capabilities through regulation of cryptography.
This survey gives an overview of the current state of affairs, with entries per country on import/export controls, domestic laws, developments to restrict cryptography, and developments favoring crypto use.
Subscribe to:
Posts (Atom)