[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[fwd] Hiding Crimes in Cyberspace (from: firstname.lastname@example.org)
- To: email@example.com
- Subject: [fwd] Hiding Crimes in Cyberspace (from: firstname.lastname@example.org)
- From: Thomas Roessler <email@example.com>
- Date: Thu, 12 Aug 1999 10:52:30 +0200
- Comment: This message comes from the debate mailing list.
- Mail-Followup-To: firstname.lastname@example.org
- Sender: email@example.com
- User-Agent: Mutt/0.96.3i
----- Forwarded message from Dorothy Denning <firstname.lastname@example.org> -----
Date: Wed, 11 Aug 1999 17:36:33 -0400
From: email@example.com (Dorothy Denning)
Subject: Hiding Crimes in Cyberspace
Content-Type: text/plain; charset=us-ascii
John Young has just posted a copy of my paper Hiding Crimes in
Cyberspace, coauthored with William E. Baugh, Jr., on his Cryptome site:
Or, go straight to http://cryptome.org/hiding-db.htm
This version does not have the endnotes. If you want the endnotes,
you can get an MS Word version from my Web site
or go straight to
This version has the full text, but not the figures.
The paper is scheduled to appear in Information, Communication and
Society, Vol. 2, No 3, Autumn 1999, and in Cybercrime, B. D. Loader
and D. Thomas (eds.), Routledge, 1999.
It covers the use of encryption and other concealment technologies
and anonymity services by criminals and terrorists. It is a
January 1999 update of the report we did for the National Strategy
Information Center in 1997. That report is also on my Web page
I apologize if someone already posted this information to the list.
I have not been tracking the messages carefully.
----- End forwarded message -----