6 Surveillance Day 1 6 Surveillance Day 1

6.1 Application Layer Surveillance 6.1 Application Layer Surveillance

6.2 Data v. Metadata 6.2 Data v. Metadata

6.3 Return of the Clipper Chip 6.3 Return of the Clipper Chip

6.4 Time Capsule Cryptography 6.4 Time Capsule Cryptography

6.5 Gov-to-Gov 6.5 Gov-to-Gov

6.6 Corporate Surveillance 6.6 Corporate Surveillance