Loading…
Must you make your application wiretap-able?
Law enforcement has a problem, and you may be part of it. If your company makes an Internet application that enables its users to communicate with each other and you do not have away to hand over those communications in real time to law enforcement, then you are part of the problem. Developers of th...
Saved in:
Published in: | Network World 2011-03, Vol.28 (5), p.18 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 5 |
container_start_page | 18 |
container_title | Network World |
container_volume | 28 |
creator | Bradner, Scott |
description | Law enforcement has a problem, and you may be part of it. If your company makes an Internet application that enables its users to communicate with each other and you do not have away to hand over those communications in real time to law enforcement, then you are part of the problem. Developers of these applications rarely consider that law enforcement might be interested in communications among their users. Some of those that do may decide that such interest would violate their users privacy even if those users might be using the communication channel for evil purposes. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_reports_857447731</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2295008851</sourcerecordid><originalsourceid>FETCH-proquest_reports_8574477313</originalsourceid><addsrcrecordid>eNpjYeA0sLAw1zU3MzPkYOAqLs4yMDAwMrQw4mTQ8S0tLlGozC9VyE3MTgUxihQSCwpyMpMTSzLz8xTKM4tSSxILdBOTclLteRhY0xJzilN5oTQ3g6Kba4izh25BUX5haWpxSXxRakF-UUlxvIWpuYmJubmxoTExagBswy_-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>857447731</pqid></control><display><type>article</type><title>Must you make your application wiretap-able?</title><source>EBSCOhost Business Source Ultimate</source><source>Nexis UK</source><source>ABI/INFORM Global</source><creator>Bradner, Scott</creator><creatorcontrib>Bradner, Scott</creatorcontrib><description>Law enforcement has a problem, and you may be part of it. If your company makes an Internet application that enables its users to communicate with each other and you do not have away to hand over those communications in real time to law enforcement, then you are part of the problem. Developers of these applications rarely consider that law enforcement might be interested in communications among their users. Some of those that do may decide that such interest would violate their users privacy even if those users might be using the communication channel for evil purposes.</description><identifier>ISSN: 0887-7661</identifier><language>eng</language><publisher>Southborough: Foundry</publisher><subject>Communication ; Electronic surveillance ; Internet ; Law enforcement ; Privacy ; Software industry</subject><ispartof>Network World, 2011-03, Vol.28 (5), p.18</ispartof><rights>Copyright Network World Inc. Mar 7, 2011</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/857447731?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>312,780,784,791,15316,36062,44363</link.rule.ids></links><search><creatorcontrib>Bradner, Scott</creatorcontrib><title>Must you make your application wiretap-able?</title><title>Network World</title><description>Law enforcement has a problem, and you may be part of it. If your company makes an Internet application that enables its users to communicate with each other and you do not have away to hand over those communications in real time to law enforcement, then you are part of the problem. Developers of these applications rarely consider that law enforcement might be interested in communications among their users. Some of those that do may decide that such interest would violate their users privacy even if those users might be using the communication channel for evil purposes.</description><subject>Communication</subject><subject>Electronic surveillance</subject><subject>Internet</subject><subject>Law enforcement</subject><subject>Privacy</subject><subject>Software industry</subject><issn>0887-7661</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNpjYeA0sLAw1zU3MzPkYOAqLs4yMDAwMrQw4mTQ8S0tLlGozC9VyE3MTgUxihQSCwpyMpMTSzLz8xTKM4tSSxILdBOTclLteRhY0xJzilN5oTQ3g6Kba4izh25BUX5haWpxSXxRakF-UUlxvIWpuYmJubmxoTExagBswy_-</recordid><startdate>20110307</startdate><enddate>20110307</enddate><creator>Bradner, Scott</creator><general>Foundry</general><scope>0U~</scope><scope>1-H</scope><scope>3V.</scope><scope>7RQ</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>883</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L.0</scope><scope>M0C</scope><scope>M0F</scope><scope>M0N</scope><scope>M2O</scope><scope>M2T</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><scope>U9A</scope></search><sort><creationdate>20110307</creationdate><title>Must you make your application wiretap-able?</title><author>Bradner, Scott</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_reports_8574477313</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Communication</topic><topic>Electronic surveillance</topic><topic>Internet</topic><topic>Law enforcement</topic><topic>Privacy</topic><topic>Software industry</topic><toplevel>online_resources</toplevel><creatorcontrib>Bradner, Scott</creatorcontrib><collection>Global News & ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Career and Technical Education</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>ABI/INFORM Trade & Industry (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>eLibrary</collection><collection>ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer science database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>ABI/INFORM Global</collection><collection>ABI/INFORM Trade & Industry</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>Telecommunications Database</collection><collection>Research Library (Corporate)</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Network World</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bradner, Scott</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Must you make your application wiretap-able?</atitle><jtitle>Network World</jtitle><date>2011-03-07</date><risdate>2011</risdate><volume>28</volume><issue>5</issue><spage>18</spage><pages>18-</pages><issn>0887-7661</issn><abstract>Law enforcement has a problem, and you may be part of it. If your company makes an Internet application that enables its users to communicate with each other and you do not have away to hand over those communications in real time to law enforcement, then you are part of the problem. Developers of these applications rarely consider that law enforcement might be interested in communications among their users. Some of those that do may decide that such interest would violate their users privacy even if those users might be using the communication channel for evil purposes.</abstract><cop>Southborough</cop><pub>Foundry</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0887-7661 |
ispartof | Network World, 2011-03, Vol.28 (5), p.18 |
issn | 0887-7661 |
language | eng |
recordid | cdi_proquest_reports_857447731 |
source | EBSCOhost Business Source Ultimate; Nexis UK; ABI/INFORM Global |
subjects | Communication Electronic surveillance Internet Law enforcement Privacy Software industry |
title | Must you make your application wiretap-able? |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T04%3A24%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Must%20you%20make%20your%20application%20wiretap-able?&rft.jtitle=Network%20World&rft.au=Bradner,%20Scott&rft.date=2011-03-07&rft.volume=28&rft.issue=5&rft.spage=18&rft.pages=18-&rft.issn=0887-7661&rft_id=info:doi/&rft_dat=%3Cproquest%3E2295008851%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_reports_8574477313%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=857447731&rft_id=info:pmid/&rfr_iscdi=true |