Interesting article on how public-key encryption is used to keep information safe during financial transactions online. The article discusses weakness in basic public-key encryption schemes and how some of these schemes have been improved.
This resource provides access to articles, news, and blog posts regarding military embedded systems, often using cryptography. One article referenced the cryptography used to secure "Data at Rest" and the length at which this information should be held secure. Is it ethical to keep this information from the public when safety is no longer a concern? At what point should these well-kept secrets become accessible?
The Journal of Theoretical Physics and Cryptography is devoted to the rapid publication of fundamental research papers on all fields of theoretical physics and cryptography. All contributions shall be rigorously refereed and selecting on the basis of quality and originality of the work as well as the breadth of interest to readers.
The APWG is the global industry, law enforcement, and government coalition focused on unifying the global response to electronic crime through development of data resources, data standards and model response protocols and systems for private and public sectors.
A pre-WWII NSA document on advanced military cryptography which was declassified in 2014. This leads to the question of what impact disclosing these military secrets has on encryption and decryption of messages in future wars, and also why were these documents released in the first place.
This is the e-text of a book that discusses online network encryption and application. The chapters cover various encryption methods for the transfer of data online, as well as the application of wireless, email, IP network security
Discusses the growth and legal rights of video surveillance in schools. This article contains multiple instances where court cases ruled that there was not a reasonable expectation of privacy.
by Christy Hickman, staff counsel Members often ask whether a school district violates their right to privacy by using video camera surveillance or video recordings of evaluative observations. It is easy to understand the growth of video surveillance in schools, especially with the onslaught of on-campus criminal behavior and the horrendous episodes of violence that we hear of all too frequently.
This is the results of a Pew Research survey in May (of 2015) regarding Americans' opinions of the NSA, surveillance, national security, etc. This could be useful in the security vs. privacy paper, to look at the public opinion on these issues.
This website provides ample information on not only the ins and outs of public information but it also gives helpful suggestions on how to keep things private and why. One interesting suggestion discussed the risks of posting your birthday as identity thieves can predict your Social Security number based off of your place of birth and birthdate.