.


:




:

































 

 

 

 


: ,




 

[264]

 

- , . . , [] Red and Black Revolution, , . 1995 .

RBR: , , . , 1970 , , . , . ?

: , , , , . , , . , , . , , , , (, , , ) . , , : , , . . . , , , . , . . , , , . , , . . , , , . . , , , .

RBR: , , - . , . , ? , , , , . , , , ? ?

: , , , , , . . , . , [] , . , , , , , , . . , , , [265]. , , , , , .

RBR: , , . . , ? ?

: . , , . . , - . , , , , , . ; , . , , . , , , . .

? , , . , . , , , , , , , , , , , , , . , . , , , , .

, . , [ ] .

RBR: , ? ?

: , , , , [] . , . . , , . ( , ) , , , , , . , , . , , ( ). , , - .

RBR: , , . ? ? , . ?

: , , , , . , . , , . , , , . . . , , , , . , , , . , , - , , , , , , , .

 

RBR: , , . , , . , , , . , , , , . ? ?

: , , . , . , , . , , . , , . , , , , , , , .

RBR: , . , . . , , , ? : . , , , ( , ), , , ( , , ).

 

RBR: . , , . , , . , , , , - . , ?

: , , . , , , , , . , 1787 , . , , , , , , - , , ( , ). , , . , : , , . , .

 

RBR: , , . . -, : , -, , . , , , - , -. , , , . , , , ! ?

: , . , , , . , , , . , . , , , , . , . , , . , , , , , . , , . , , , , , . , ?

, : ... , , , , , , , .

RBR: . [1992], [1989] , . , ( ) , , . , , , ... [] . , . , . , , ! , ?

: , , : . , , , , , - . , . , . , , , , . , , , . , , , .

RBR: , , . , ? ?

: , , , - . , , ; [266], [267], [268] , -. 118 . , , . . , , , , , .

RBR: ( Discussion Bulletin). , . , : , .

: , , , , , , . , . , - , , , , . .

RBR: , . , , , . , , , . -? ?

: , . , , , . . , , , , , . [ ] , , . .

, , . , , , ? , , , , , . , ? , . , , , . , , .

, , , , , . , , , , , . , , , , , , - ( ). .

, , , . , ; , , , . , , , . ? . ? . , , .

? , , . , , , . . , , .

, , ? , - . , .

 

RBR: [ ], . , , . , , . , . ? ?

: . . , . , , , , , . , , .

, , . , , , , , . . , , . , 1917 , . , - . , , - , , u i , ( - , ). , .

. , , , , . , .

, . , . General Motors Volkswagen (, , , , , ), , , . , , .

, ( ), , , . , , , . , , .

, , , . . , . , .

, , , , .

 

RBR: , , , . , , . , , , , , , . , , . ? , ? , ?

: , . , , , , , . , , . , . , . , . . , , , , , . , , , , . , , , , , , , . ( ). , , , , . . . .

, . , . , , 80% , , , . , ( ); , ; ; , , . . , .

RBR: , . , ? ?

: , , , , . , , . , , .

 

 

, Royallib.ru


[1]I Am A Member Of A Civilization . . . , - . . . .

 

[2] . . John Perry Barlow, 1996. [ . . .]

 

[3] . . David Brin, 1997. [ . .]

 

[4] - . .

 

[5] , , . , .

 

[6] (176071843) , 85 . , , . .

 

[7]Peter Schwartz and Peter Leyden, The Long Boom: A History of the Future, 19802020, Wired (July 1997). , , .

 

[8]Jaron Lanier, rm Vertigo: Or Considering the Excessive Responsibilities Placed on US by the Dawn of the Information Infrastructure (1994), http://www.advanced.org/Jaron/essay.html.

 

[9]I Am A Member Of A Civilization . . . , - . . . .

 

[10] . . David S. Bennahum, 1996. [ . .]

 

[11] - HyperMedia Research Centre ( ) C-Theory. . Richard Barbrook, 1996. [ . .]

 

[12] : , , (tune in, turn on, drop out).

 

[13]. , 23.

 

[14] , ; , , , , , , .

 

[15] , . : .

 

[16] . . Timothy . May, 1992. [ .

 

[17]., , : http://www.totse.com/en/privacy/encryption/crypglos.html.

 

[18] 10,712,750 , .

 

[19] . . Timothy . May, 1994. [ . .]

 

[20]RSA Data Security Inc., Redwood Shores, California .

 

[21] . Applied Cryptography (NewYork: Wiley, 1996). . Crypto Proceedings (Berlin: Springer-Verlag). - - Eurocrypt Auscrypt .

 

[22]David Chaum, Untraceble Electronic Mail, Return Addresses, and Digital Pseudonymes, Communications of the Association for Computing Machinery 24 (February 2, 1981): 8488 ( - , ); David Chaum, Security without Identification: Transaction Systems to Make Big Brother Obsolete, Communications of the Association for Computing Machinery 28 (October 10,1985) ( ; ).

 

[23] , PGP, ( ) Pretty Good Privacy ,

 

[24]# David Friedman, The Machinery of Freedom: Guide to a Radical Capitalism (Ashland, Olt: Open Court, 1989). , .

 

[25] -, . . : cipher. , , subscribe cypherpunks ( ) [email protected]. 50 . 600 .

 

[26] , . - RSA Data Security, Inc. Usenet. , ,

 

[27]# The Economist, 26 1994, . 2123. Wired ( 1994).

 

[28] , .

 

[29]Key escrow - , .

 

[30]. , Out of Control: The Rise of Neo-Biological Civilization (Reading, MA: Addison Wesley, 1994) ( . : wiki.xref.ru/OutOfControl).

 

[31] , , ( 500 ).

 

[32]Magic Money . PrOduct Cypher, -. , . , , , ( ) , .

 

[33] , . . . Extropian 19921993 .

 

[34] . . Eric Hughes, 1993. [ . .]

 

[35] Joint Australian/OECD Conference on Security, Privacy and Intellectual Property Protection in the Global Information Infrastructure ( [] , ) 1996 . . Dorothy E. Denning, 1996. [ . .]

 

[36]Tim May, Crypto Anarchy and Virtual Communities, Internet Security (April 1995): p. 412 ( 7 ).

 

[37]Friedrich Hayek, The Fatal Conceit: The Errors of Socialism, ed. by W. W. Bart-ley III (Chicago: University of Chicago Press, 1988).

 

[38]Jim Warren, Is PhilZimmermann Being Presecuted?Why? By Whom, Internet Security (April 1995): p. 1521.

 

[39]Secure Computing Corporation, , Roseville, MN, October 1994; William R. Ches-wick and Stephen M. Belovin, Firewalls and Internet Security: Repelling the Wily Hacker (Reading, MA: Addison-Wesley, 1994).

 

[40] - .

 

[41]Louis J. Freech, Keynote talk at International Cryptography Institute, , , 1995, http:// www.fbi.gov/crypto.html.

 

[42] : Dorothy E. Denning Dennis . Branstad, A Taxonomy of Key Escrow Encryption, Communications of the Association for Computing Machinery (March 1996). http://www.cosc.georgetown.edu/ ~denning/crypto. : Dorothy E. Denning, Key Escrow Encryption: The Third Paradigm, Computer Security Journal (Summer 1995), Dorothy E. Denning, Critical Factors of Key Escrow Encryption Systems, Proceedings of the Eighteenth National Information Systems Security Conference, Baltimore, October 1995.

 

[43] -, , 16 1993 .

 

[44] , , . . http://www.cosc.georgetown.edu/~denning/ crypto: Ernest F. Brickel, Dorothy E. Denning, Stephen T. Kent, David P. Maher, Walter Tuchman, The SKIPJACK Review, Interim Report: The SKIPJACK Algorithm, July 28, 1993

 

[45]# Clipper .: Dorothy E. Denning and Miles Smid, Key Escrowing Today, IEEE Communications 32, no. 9 (September 1994): p. 5868. Clipper .: Dorothy E. Denning The Case for Clipper, MIT Technology Review (July 1995): p. 4855. http://www.cosc.georget.own. edu/~denning/crypto.

 

[46]Bankers Trust Electronic Commerce, Private Key Escrow System, , Software Publishers Association and Advanced Engineering Applications Cryptography Policy Workshop, 17 1995 .

 

[47]Silvio Micali, Fair Cryptosystems, MIT/LCS/TR-579.C, Laboratory for Computer Science, MIT, Cambridge, MA, August 1994.

 

[48]Thomas Beth, Hans-Joachim Knoblock, Marcus Otten, Gustavus J. Simmons, Peer Wichmann, Clipper Repair Kit: Towards Acceptable Key Escrow Systems, Proceedings of the Second Association for Computing Machinery Conference on Communications and Computer Security, 1994.

 

[49] INFOSEC Business Advisory Group (IBAG) http://www.cosc.georgetown.edu/~denning/crypto.

 

[50] EUROBIT-ITAC-ITI-JEIDA http://www.cosc. georgetown.edu/~denning/crypto.

 

[51] . Dorothy . Denning, 2001. [ . .]

 

[52] . . Duncan Frissell, 1996. ( 9 ), 6 1996 , (Duncan Frissell). [ . .]

 

[53] .

 

[54], , .

 

[55] (.).

 

[56] (.).

 

[57] Information, Communication and Society 2, no. 3 (Autumn 1999) : . D. Loader and D.Thomas, eds., Cybercrime: Law Enforcement in the Information Age (New York: Routledge, 1999). . 1999, Routledge. [ . .]

 

[58] . ,

 

[59] , , 18 1998 .

 

[60] CART 9 1998

 

[61] , , , , 97-157, 8 1997 ; , , , , , 97-179, 9 1998 .

 

[62]Byron Thompson, HTCIA-FBI Training Seminar Perspectives on Computer Crime, 1213 1998 .

 

[63] , , .

 

[64] , SEARCH Group, Inc. , PGP .

 

[65]http://www.hiwaay.net/boklr/bsw_crak.html ( 1997 ).

 

[66]- , .

 

[67]

 

[68] , .

 

[69] 22 1997 , -. 10 1998 .

 

[70] , 15 1998

 

[71]http://jya.com/jimbell3.htm.

 

[72] Stanford Law Review, 48, First Monday (http://www.firstmonday.dk/issues/issuel/ index.html). . 1996, David R. Johnson and David G. Post. [ . .]

 

[73]American Banana Co. v. United Fruit Co., 213 U.S. 347, 357 (1909) ( , ).

 

[74]Dawn Donut Co. v. Hart's Food Stores, 267 F.2d 358 (2d Cir. 1959) (, , ).

 

[75], , , , . , , , , . .: Henry H. Perritt Jr., Jurisdiction in Cyberspace (October 28, 1995) ( , Stanford Law Review); Henry H. Perritt Jr. Law and the Information Superhighway, ch. 12 (1996).

 

[76], : , , - , - . , , , .

 

[77] , . , . .: . Ethan Katsh, The Electronic Media and the Transformation of Law, 9294 (1989); M. Ethan Katsh, Law in a Digital World 57-59, 218 (1995).

 

[78].: Jon Auerbach, Fences in Cyberspace: Governments Move to Limit Free Flow of the Internet, Boston Globe, Feb. 1, 1996, p. 1 ( ); Seth Faison, Chinese Cruise Internet, Wary of Watchdogs, N. Y Times, Feb. 5,1995, Al; . . 20 ( Usenet); .: Anne Wells Branscomb, Jurisdictional Quandaries for Global Networks, Linda M. Harasim (ed.), in Global Networks: Computers and International Communication (1993) ( ).

 

[79]Anthony Paul Miller, Teleinformatics, Transborder Data Flows and the j Emerging Struggle for Information: An Introduction to the Arrival of the New Information Age, 20 Colum. J. L &Soc. Probs. 89,107108,127 132 (1986) ( , ).

 

[80]Id., p. 105107, 111118 (, ).

 

[81]Id., p. 109111 ( , , , ); . : Book Publishers Worry About Threat of Internet, N.YTimes, Mar. 18,1996, Al ( , , , ).

 

[82], . , -, , , . .: Gregory Spears, Cops and Robbers on the Net, Kiplinger's Pers. Fin. Mag., Feb. 1995, p. 56 ( ). , ,

 

[83] . . Peter Martin, New-juris Electronic Conference 13, (Sept. 22, 1993) ( ). , , , . , , . , , , , , .

 

[84]# .: Information Infrastructure Task Force, Intellectual Property and the National Information Infrastructure: The Report of the Working Group on Intellectual Property Rights, 221 (1995) (White Paper) ( , , ): , , , , , . , , , , , 1948 . John Schwartz, Over the Net and Around the Law, Wash. Post, Jan. 14,1995, C1.

 

[85].: Walter B.Wriston, The Twilight of Sovereignty (1992) ( , ): "" . , , . , , , . , (Id., . 6162). , , , , 5 1933 ., . . 90 ; . 903 ( , , , , , ... ); 902()(1) ( , , ). , , (., : Therese H. Maynard, What Is an e-Exchange? Proprietary Electronic Securities Trading Systems and the Statutory Definition of an Exchange, 49 Wash. & Lee L Rev., 833, 362 [1992]; Lewis D. Solomon & Louise Corso, The Impact of Technology on the Trading of Securities, 24J. MarshallL. Rev.299,318319[1991]),- . ? , , , ? . : Solomon &Corso, p. 330. , , The Political Economy of Statutory Reach: U.S. Disclosure Rules for a Globalizing Market for Securities (Georgetown University Law Center, March 6,1996), .

 

[86], , , CompuServe Usenet. .: Karen Kaplan, Germany Forces Online Service to Censor Internet, L. A. Times, Dec. 29,1995, Al; Why Free-Wheeling Internet Puts Teutonic Wall over Pom, Christian Sci. Monitor, Jan. 4,1996, p. 1; Cyberporn Debate Goes International: Germany Pulls the Shade on CompuServe, Internet, Wash. Post, Jan. 1, 1996, F13 ( , CompuServe , , , - ). , , . . . 12,Auerbach,p. 15. , CompuServe , , , . CompuServe Ends Access Suspension: It Reopens All But Five Adult-Oriented Newsgroups. Parents Can Now Block Offensive Material, L A. Times, Feb. 14, 1996, Dl. infn ( , , ) , , , . .: United States v. ThomasF.3d, 1996 W.L 30477 (6th Cir. 1996) ( , , , ). .: Electronic Frontier Foundation, A Virtual Amicus Brief in the Amateur Action Case (Aug. 11, 1995), http://www.eff.org/pub/Legal/Cases/ AABBS_Thomases_Memphis/Old/aa_eff_vbrief.html. . , . , , , , , ,

 

[87] ( http://www.state.mn.us/cbranch/ag/memo/txt), , , , , . , , , ... , , . Minn. Stat. Ann. sec. 609.025 (1987). Wagernet, , . .: Complaint, Minnesota v. Granite Gate Resorts (1995) (No. 9507227), http://www.state.mn.us/ebranch/ag/ggcom.txt. , , ,





:


: 2016-11-23; !; : 420 |


:

:

, , . , .
==> ...

1767 - | 1606 -


© 2015-2024 lektsii.org - -

: 0.261 .