The Assault on Anonymity and its Consequences
Plan of Talk
Communication “Anonymity” Defined
Tracing the ‘Untraceable’
Types of Communications Monitoring
Not All Comms Data Is Equal
Why Bother
State Security Concerns
State Crime Concerns
Private Concerns
Modalities of the Assault on Anonymity
Infrastructure Targets
Financial Targets
Examples of Financial Constraints at Work
National Law/Regulation
Sample Anti-Anonymous National Legislation/Regs
Sample Transnational Financial Initiatives
Consequences of Anonymity Piercing Technologies
Holes Breed Holes
Intellectual Property Consequences
Removes a Defense Against Profiling
Case Study: E$ as “Speech”
The Half-Measure Fallacy
Difficult Issues
Synergies
Thank You
Email: froomkin@law.tm
Home Page: http://www.law.tm