Elon University

Unabomber’s Words Find An Audience

Some Internet users say putting the manifesto on the World Wide Web may help the FBI find the Unabomber … People who know each other through electronic messaging and online services – could ferret out the identity of the Unabomber.

Battle for the Soul of the Internet

The danger … is that people will withdraw within their walled communities and never again venture into the Internet’s public spaces. It’s a process similar to the one that created the suburbs and replaced the great cities with shopping malls and urban sprawl. The magic of the Net is that it thrusts people together in a strange, new world, one in which they get to rub virtual shoulders with characters they might otherwise never meet. The challenge for the citizens of cyberspace – as the battles to control the Internet are joined and waged – will be to carve out safe, pleasant places to work, play and raise their kids without losing touch with the freewheeling, untamable soul that attracted them to the Net in the first place.

Full Text of David Chaum’s Congressional Speech

Privacy technology, whether used for electronic payments, voting, or other public expression, is the electronic equivalent of a free market and democracy. People will come to insist on it as an informational human right.

Anonymously Yours – How to Launder Your E-mail

Breakthroughs in modern cryptography indicate that one day it will be universal and simple … Anonymity is scary stuff … What are the benefits and the risks? Even if we don’t want it, can we stop it?

Defining Cyberspace

As the power and scope of cyberspace become more and more obvious, its commercial potential grows … The growth of the Internet will be further boosted by recently passed federal legislation designed to bolster the development of a digital “information infrastructure.”

Achieving Electronic Privacy

If the trend toward identifier-based smart cards continues, personal privacy will be increasingly eroded. But in this conflict between organizational security and individual liberty, neither side emerges as a clear winner. Each round of improved identification techniques, sophisticated data analysis or extended linking can be frustrated by widespread noncompliance or even legislated limits, which in turn may engender attempts at further control.