Preview

Phil Zimmermann's Pgp Export

Good Essays
Open Document
Open Document
553 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Phil Zimmermann's Pgp Export
Philip Zimmermann’s PGP Export
Emily Campbell
Rasmussen College

Author Note
This research is being submitted on May 19, 2013 for Mr. Haynes’ ISM 2321 course at Rasmussen College by Emily Campbell.

Pretty Good Privacy, or PGP as it is called, was a great advance for normal people. Phil Zimmermann’s cryptography program provided everyone with the ability to keep their electronic transmissions private. Typically this type of privacy had been the domain of governments and corporations. In 1991, Zimmermann’s creation made it onto the World Wide Web where it spread all over the world.
The US government had a problem with PGP spreading outside the country. “Using such software is not restricted or illegal within the United States, but export control laws treat the software as a weapon and place strict prohibition on its export. The Government opposes the scrambling because it wants to be able to check on the activities of criminals overseas and hostile foreign governments.” (Markoff, 1996). The PGP software was not easy to crack and that made the US government nervous.
Phil Zimmermann denied making PGP available worldwide. However once more than just he had a copy of it, it was inevitable that it would end up outside the country. He was investigated by US Customs under the accusation that he exported munitions. This was a big case because it could have set a precedent that made what you post on the Internet an export. This could have led to government control of Internet related companies, software design, or other computer or privacy related products. That type of control would not be acceptable in this country.
Phil Zimmermann did what he had a right to do, he created a program that allowed others to encrypt and keep safe their communications online. Distributing cryptographic software free to the masses means that some will use it for less than moral acts. However, this does not mean that the creator of the software is responsible for those immoral acts.



References: Markoff, John (1996). Data-secrecy export case dropped by U.S. New York Times. Retrieved on May 19, 2013 from: http://search.proquest.com.ezproxy.rasmussen.edu/nytimes/docview/430473274/fulltext/13E24AF949764AF2651/1?accountid=40836

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This information was hidden from the public and was noted safe for public release. Some of the problems that this causes is that not only has it demonstrated…

    • 176 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In this examination of United States v. Warshak 631 F.3d 266 (6th Cir. 2010), the primary focus will be on the constitutional issues regarding this case. First, an analysis of the defendant’s expectation of privacy, regarding e-mail communication. Next, an examination of the government argument concerning the potential invasion of the defendant’s Fourth Amendment right to privacy. Finally, an analysis of the case’s conclusion, and how the Stored Communication Act factored into the constitutionality of more than 27,000 items of e-mail evidence.…

    • 628 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The Court saw Groksters actions as an infringement by promoting internet software designed to let users download copyrighted material. Users began sharing copyrighted music and video files without authorization. There was no evidence of an effort made by the defendant to filter copyrighted material from users downloads or interrupt the sharing of copyrighted files. The courts evidence is that the defendants had no desire to reduce user’s infringement because filters would have reduced users and filters would have reduced the software attractiveness to its users. The defendants had a financial interest in the infringing activity that occurred, as a result of their distribution of the software and because of their receipt of revenue from…

    • 138 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The Electronic Communications Privacy Act, an extension of the Federal Wiretap Statute, was endorsed in 1986 (Justice Information Sharing, 2010). This was a necessary implementation with how technology was diversifying ways to communicate and share information. In order to oversee and safeguard technological advancements such as email, cordless and cell phone communications, and electronically stored data the federal government had to amend and sometimes put into operation new policies. These policies, like the Electronic Communications Privacy Act, minimize many ethical issues that came along with the development of these advancements.…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1984 current event

    • 270 Words
    • 2 Pages

    promoted it” (Guynn). However, privacy watchdogs say that this new feature is an example of…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    (article consists of 10 pages) Published by: University of North Carolina Press Stable URL: http://www.jstor.org/stable/2576942…

    • 1189 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    References: Solove, D. (2011). “Why Privacy Matters even if You Have ‘Nothing to Hide’”. The Chronicle Review.…

    • 2748 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    We have a fundamental need for privacy because all of us have things that we want to hide from others. For example, we may be involved in a crime intentionally sometimes. When we download songs online and share them to others, we are violating the Digital Millennium Copyright Act. This will surely cause a lot of troubles for us. Fortunately, with the aid of privacy, we can hide our transgressions and get rid of the trouble. Not only can privacy help us hide something bad, but it can also help us hide something secret. In the article “Why Privacy Matters Even If You Have Nothing To Hide,” Daniel J. Solove shares an example that all of us will not want to show others our naked photos (342). This is a strong example to show we need privacy for hiding things other than bad things from others. It is impossible for a human being to have nothing to hide and our lives are surely being bothered by government’s…

    • 1062 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The two giant publishing companies would meet up and start talking about terms and numbers. “’The British publishers asked their U.S. colleagues to think not only of best sellers but of the whole business they do with Great Britain’ and to be content, if needs be, to sacrifice these occasional plums for the good of the sale of the majority of American books” (219). The British were asking the U.S. to let them publish these books to help them boost their sells and allow them to recover. This happened but after a few years the United States wanted its freedom back. The Two sides came to yet another agreement but this one was to be final. “The agreement divided world markets into two categories- home markets…and other markets” (223). This would give certain rights and set regulations that both sides would have to follow. Other than what was mostly surrounded by the countries everywhere else was considered ‘other markets’ or open markets in the rest of the world…

    • 2739 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    software. This is true, not just here in the USA but all over the world.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When P&G moved to electronic documents, it had to ensure that it could authenticate digital signatures and build signing and storage processes into its daily workflow. Further, P&G’s legal department wanted to ensure that it had a legally enforceable signature on file.…

    • 508 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    a. Why did PTB believe it was not violating copyright laws? What did the Swedish court rule?…

    • 164 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    1. PGP (Pretty Good Privacy) and PKI (Public Key Infrastructure) afford security to many Digital signature or e-signatures which provides encrypt document and digitally signed.…

    • 782 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Pub Case Study

    • 473 Words
    • 2 Pages

    On Friday, June 30, 2000, however, researchers at AT&T Labs announced the creation Publius, a software program that enables Web users to encrypt (translate into a secret code) their files – text, pictures or music – break them up like the pieces of a jigsaw puzzle, and store the encrypted pieces on many different servers scattered all over the globe on the World Wide Web. As a result, anyone wanting to examine or censor the files or wanting to trace the original transaction that produced the file would find it impossible to succeed because they would have to examine the contents of dozens of different servers all over the world, and the files in the servers would be encrypted and fragmented in a way that would make the pieces impossible to identify without the help of the person who created the file. A person authorized to retrieve the file, however, would look through a directory of his files posted on a Publius-affiliated website, and the Publius network would reassemble the file for him at his request. Researchers published a description of Publius at www.cs.nyu.edu/waldman/publius.…

    • 473 Words
    • 2 Pages
    Good Essays