[264]
- , . . , [] Red and Black Revolution, , . 1995 .
RBR: , , . , 1970 , , . , . ?
: , , , , . , , . , , . , , , , (, , , ) . , , : , , . . . , , , . , . . , , , . , , . . , , , . . , , , .
RBR: , , - . , . , ? , , , , . , , , ? ?
|
|
: , , , , , . . , . , [] , . , , , , , , . . , , , [265]. , , , , , .
RBR: , , . . , ? ?
: . , , . . , - . , , , , , . ; , . , , . , , , . .
? , , . , . , , , , , , , , , , , , , . , . , , , , .
|
|
, . , [ ] .
RBR: , ? ?
: , , , , [] . , . . , , . ( , ) , , , , , . , , . , , ( ). , , - .
RBR: , , . ? ? , . ?
: , , , , . , . , , . , , , . . . , , , , . , , , . , , - , , , , , , , .
RBR: , , . , , . , , , . , , , , . ? ?
|
|
: , , . , . , , . , , . , , . , , , , , , , .
RBR: , . , . . , , , ? : . , , , ( , ), , , ( , , ).
RBR: . , , . , , . , , , , - . , ?
: , , . , , , , , . , 1787 , . , , , , , , - , , ( , ). , , . , : , , . , .
RBR: , , . . -, : , -, , . , , , - , -. , , , . , , , ! ?
|
|
: , . , , , . , , , . , . , , , , . , . , , . , , , , , . , , . , , , , , . , ?
, : ... , , , , , , , .
RBR: . [1992], [1989] , . , ( ) , , . , , , ... [] . , . , . , , ! , ?
: , , : . , , , , , - . , . , . , , , , . , , , . , , , .
|
|
RBR: , , . , ? ?
: , , , - . , , ; [266], [267], [268] , -. 118 . , , . . , , , , , .
RBR: ( Discussion Bulletin). , . , : , .
: , , , , , , . , . , - , , , , . .
RBR: , . , , , . , , , . -? ?
: , . , , , . . , , , , , . [ ] , , . .
, , . , , , ? , , , , , . , ? , . , , , . , , .
, , , , , . , , , , , . , , , , , , - ( ). .
, , , . , ; , , , . , , , . ? . ? . , , .
? , , . , , , . . , , .
, , ? , - . , .
RBR: [ ], . , , . , , . , . ? ?
: . . , . , , , , , . , , .
, , . , , , , , . . , , . , 1917 , . , - . , , - , , u i , ( - , ). , .
. , , , , . , .
, . , . General Motors Volkswagen (, , , , , ), , , . , , .
, ( ), , , . , , , . , , .
, , , . . , . , .
, , , , .
RBR: , , , . , , . , , , , , , . , , . ? , ? , ?
: , . , , , , , . , , . , . , . , . . , , , , , . , , , , . , , , , , , , . ( ). , , , , . . . .
, . , . , , 80% , , , . , ( ); , ; ; , , . . , .
RBR: , . , ? ?
: , , , , . , , . , , .
, Royallib.ru
[1]I Am A Member Of A Civilization . . . , - . . . .
[2] . . John Perry Barlow, 1996. [ . . .]
[3] . . David Brin, 1997. [ . .]
[4] - . .
[5] , , . , .
[6] (176071843) , 85 . , , . .
[7]Peter Schwartz and Peter Leyden, The Long Boom: A History of the Future, 19802020, Wired (July 1997). , , .
[8]Jaron Lanier, rm Vertigo: Or Considering the Excessive Responsibilities Placed on US by the Dawn of the Information Infrastructure (1994), http://www.advanced.org/Jaron/essay.html.
[9]I Am A Member Of A Civilization . . . , - . . . .
[10] . . David S. Bennahum, 1996. [ . .]
[11] - HyperMedia Research Centre ( ) C-Theory. . Richard Barbrook, 1996. [ . .]
[12] : , , (tune in, turn on, drop out).
[13]. , 23.
[14] , ; , , , , , , .
[15] , . : .
[16] . . Timothy . May, 1992. [ .
[17]., , : http://www.totse.com/en/privacy/encryption/crypglos.html.
[18] 10,712,750 , .
[19] . . Timothy . May, 1994. [ . .]
[20]RSA Data Security Inc., Redwood Shores, California .
[21] . Applied Cryptography (NewYork: Wiley, 1996). . Crypto Proceedings (Berlin: Springer-Verlag). - - Eurocrypt Auscrypt .
[22]David Chaum, Untraceble Electronic Mail, Return Addresses, and Digital Pseudonymes, Communications of the Association for Computing Machinery 24 (February 2, 1981): 8488 ( - , ); David Chaum, Security without Identification: Transaction Systems to Make Big Brother Obsolete, Communications of the Association for Computing Machinery 28 (October 10,1985) ( ; ).
[23] , PGP, ( ) Pretty Good Privacy ,
[24]# David Friedman, The Machinery of Freedom: Guide to a Radical Capitalism (Ashland, Olt: Open Court, 1989). , .
[25] -, . . : cipher. , , subscribe cypherpunks ( ) [email protected]. 50 . 600 .
[26] , . - RSA Data Security, Inc. Usenet. , ,
[27]# The Economist, 26 1994, . 2123. Wired ( 1994).
[28] , .
[29]Key escrow - , .
[30]. , Out of Control: The Rise of Neo-Biological Civilization (Reading, MA: Addison Wesley, 1994) ( . : wiki.xref.ru/OutOfControl).
[31] , , ( 500 ).
[32]Magic Money . PrOduct Cypher, -. , . , , , ( ) , .
[33] , . . . Extropian 19921993 .
[34] . . Eric Hughes, 1993. [ . .]
[35] Joint Australian/OECD Conference on Security, Privacy and Intellectual Property Protection in the Global Information Infrastructure ( [] , ) 1996 . . Dorothy E. Denning, 1996. [ . .]
[36]Tim May, Crypto Anarchy and Virtual Communities, Internet Security (April 1995): p. 412 ( 7 ).
[37]Friedrich Hayek, The Fatal Conceit: The Errors of Socialism, ed. by W. W. Bart-ley III (Chicago: University of Chicago Press, 1988).
[38]Jim Warren, Is PhilZimmermann Being Presecuted?Why? By Whom, Internet Security (April 1995): p. 1521.
[39]Secure Computing Corporation, , Roseville, MN, October 1994; William R. Ches-wick and Stephen M. Belovin, Firewalls and Internet Security: Repelling the Wily Hacker (Reading, MA: Addison-Wesley, 1994).
[40] - .
[41]Louis J. Freech, Keynote talk at International Cryptography Institute, , , 1995, http:// www.fbi.gov/crypto.html.
[42] : Dorothy E. Denning Dennis . Branstad, A Taxonomy of Key Escrow Encryption, Communications of the Association for Computing Machinery (March 1996). http://www.cosc.georgetown.edu/ ~denning/crypto. : Dorothy E. Denning, Key Escrow Encryption: The Third Paradigm, Computer Security Journal (Summer 1995), Dorothy E. Denning, Critical Factors of Key Escrow Encryption Systems, Proceedings of the Eighteenth National Information Systems Security Conference, Baltimore, October 1995.
[43] -, , 16 1993 .
[44] , , . . http://www.cosc.georgetown.edu/~denning/ crypto: Ernest F. Brickel, Dorothy E. Denning, Stephen T. Kent, David P. Maher, Walter Tuchman, The SKIPJACK Review, Interim Report: The SKIPJACK Algorithm, July 28, 1993
[45]# Clipper .: Dorothy E. Denning and Miles Smid, Key Escrowing Today, IEEE Communications 32, no. 9 (September 1994): p. 5868. Clipper .: Dorothy E. Denning The Case for Clipper, MIT Technology Review (July 1995): p. 4855. http://www.cosc.georget.own. edu/~denning/crypto.
[46]Bankers Trust Electronic Commerce, Private Key Escrow System, , Software Publishers Association and Advanced Engineering Applications Cryptography Policy Workshop, 17 1995 .
[47]Silvio Micali, Fair Cryptosystems, MIT/LCS/TR-579.C, Laboratory for Computer Science, MIT, Cambridge, MA, August 1994.
[48]Thomas Beth, Hans-Joachim Knoblock, Marcus Otten, Gustavus J. Simmons, Peer Wichmann, Clipper Repair Kit: Towards Acceptable Key Escrow Systems, Proceedings of the Second Association for Computing Machinery Conference on Communications and Computer Security, 1994.
[49] INFOSEC Business Advisory Group (IBAG) http://www.cosc.georgetown.edu/~denning/crypto.
[50] EUROBIT-ITAC-ITI-JEIDA http://www.cosc. georgetown.edu/~denning/crypto.
[51] . Dorothy . Denning, 2001. [ . .]
[52] . . Duncan Frissell, 1996. ( 9 ), 6 1996 , (Duncan Frissell). [ . .]
[53] .
[54], , .
[55] (.).
[56] (.).
[57] Information, Communication and Society 2, no. 3 (Autumn 1999) : . D. Loader and D.Thomas, eds., Cybercrime: Law Enforcement in the Information Age (New York: Routledge, 1999). . 1999, Routledge. [ . .]
[58] . ,
[59] , , 18 1998 .
[60] CART 9 1998
[61] , , , , 97-157, 8 1997 ; , , , , , 97-179, 9 1998 .
[62]Byron Thompson, HTCIA-FBI Training Seminar Perspectives on Computer Crime, 1213 1998 .
[63] , , .
[64] , SEARCH Group, Inc. , PGP .
[65]http://www.hiwaay.net/boklr/bsw_crak.html ( 1997 ).
[66]- , .
[67]
[68] , .
[69] 22 1997 , -. 10 1998 .
[70] , 15 1998
[71]http://jya.com/jimbell3.htm.
[72] Stanford Law Review, 48, First Monday (http://www.firstmonday.dk/issues/issuel/ index.html). . 1996, David R. Johnson and David G. Post. [ . .]
[73]American Banana Co. v. United Fruit Co., 213 U.S. 347, 357 (1909) ( , ).
[74]Dawn Donut Co. v. Hart's Food Stores, 267 F.2d 358 (2d Cir. 1959) (, , ).
[75], , , , . , , , , . .: Henry H. Perritt Jr., Jurisdiction in Cyberspace (October 28, 1995) ( , Stanford Law Review); Henry H. Perritt Jr. Law and the Information Superhighway, ch. 12 (1996).
[76], : , , - , - . , , , .
[77] , . , . .: . Ethan Katsh, The Electronic Media and the Transformation of Law, 9294 (1989); M. Ethan Katsh, Law in a Digital World 57-59, 218 (1995).
[78].: Jon Auerbach, Fences in Cyberspace: Governments Move to Limit Free Flow of the Internet, Boston Globe, Feb. 1, 1996, p. 1 ( ); Seth Faison, Chinese Cruise Internet, Wary of Watchdogs, N. Y Times, Feb. 5,1995, Al; . . 20 ( Usenet); .: Anne Wells Branscomb, Jurisdictional Quandaries for Global Networks, Linda M. Harasim (ed.), in Global Networks: Computers and International Communication (1993) ( ).
[79]Anthony Paul Miller, Teleinformatics, Transborder Data Flows and the j Emerging Struggle for Information: An Introduction to the Arrival of the New Information Age, 20 Colum. J. L &Soc. Probs. 89,107108,127 132 (1986) ( , ).
[80]Id., p. 105107, 111118 (, ).
[81]Id., p. 109111 ( , , , ); . : Book Publishers Worry About Threat of Internet, N.YTimes, Mar. 18,1996, Al ( , , , ).
[82], . , -, , , . .: Gregory Spears, Cops and Robbers on the Net, Kiplinger's Pers. Fin. Mag., Feb. 1995, p. 56 ( ). , ,
[83] . . Peter Martin, New-juris Electronic Conference 13, (Sept. 22, 1993) ( ). , , , . , , . , , , , , .
[84]# .: Information Infrastructure Task Force, Intellectual Property and the National Information Infrastructure: The Report of the Working Group on Intellectual Property Rights, 221 (1995) (White Paper) ( , , ): , , , , , . , , , , , 1948 . John Schwartz, Over the Net and Around the Law, Wash. Post, Jan. 14,1995, C1.
[85].: Walter B.Wriston, The Twilight of Sovereignty (1992) ( , ): "" . , , . , , , . , (Id., . 6162). , , , , 5 1933 ., . . 90 ; . 903 ( , , , , , ... ); 902()(1) ( , , ). , , (., : Therese H. Maynard, What Is an e-Exchange? Proprietary Electronic Securities Trading Systems and the Statutory Definition of an Exchange, 49 Wash. & Lee L Rev., 833, 362 [1992]; Lewis D. Solomon & Louise Corso, The Impact of Technology on the Trading of Securities, 24J. MarshallL. Rev.299,318319[1991]),- . ? , , , ? . : Solomon &Corso, p. 330. , , The Political Economy of Statutory Reach: U.S. Disclosure Rules for a Globalizing Market for Securities (Georgetown University Law Center, March 6,1996), .
[86], , , CompuServe Usenet. .: Karen Kaplan, Germany Forces Online Service to Censor Internet, L. A. Times, Dec. 29,1995, Al; Why Free-Wheeling Internet Puts Teutonic Wall over Pom, Christian Sci. Monitor, Jan. 4,1996, p. 1; Cyberporn Debate Goes International: Germany Pulls the Shade on CompuServe, Internet, Wash. Post, Jan. 1, 1996, F13 ( , CompuServe , , , - ). , , . . . 12,Auerbach,p. 15. , CompuServe , , , . CompuServe Ends Access Suspension: It Reopens All But Five Adult-Oriented Newsgroups. Parents Can Now Block Offensive Material, L A. Times, Feb. 14, 1996, Dl. infn ( , , ) , , , . .: United States v. ThomasF.3d, 1996 W.L 30477 (6th Cir. 1996) ( , , , ). .: Electronic Frontier Foundation, A Virtual Amicus Brief in the Amateur Action Case (Aug. 11, 1995), http://www.eff.org/pub/Legal/Cases/ AABBS_Thomases_Memphis/Old/aa_eff_vbrief.html. . , . , , , , , ,
[87] ( http://www.state.mn.us/cbranch/ag/memo/txt), , , , , . , , , ... , , . Minn. Stat. Ann. sec. 609.025 (1987). Wagernet, , . .: Complaint, Minnesota v. Granite Gate Resorts (1995) (No. 9507227), http://www.state.mn.us/ebranch/ag/ggcom.txt. , , ,