Communications plan draws mixed reaction
Article Abstract:
Computer industry cryptographers offer mixed reactions to the Clinton Administration's Clipper plan that is meant to insure both privacy and the government's ability to eavesdrop on electronic communications. The security devices will encode data and voice communications to maintain privacy but will also include a computer code 'trapdoor' to allow federal agencies to listen in to conversations if given permission by a court. To unlock the Clipper code, two separate keys that have unique long numbers, must be obtained. Different organizations will maintain the keys, to be combined only when access is allowed. Cryptographers are worried that the keys will not remain secret, thereby risking widespread unauthorized access. Others are enthusiastic about the longer key length. The Attorney General's office will soon install several thousands of these devices to illustrate their effectiveness.
Publication Name: The New York Times
Subject: News, opinion and commentary
ISSN: 0362-4331
Year: 1993
User Contributions:
Comment about this article or add new information about this topic:
Here comes the fiber-optic home: experts worry that new technology will encourage formation of a communications elite
Article Abstract:
Experts fear that the increasing use of fiber-optic technology in residential dwellings will create an information elite. The amount of audio, video and computer data is significantly increased by fiber-optic cables, and such futuristic services as on-line shopping, home banking, picture telephones and electronic mail are envisioned. Fiber-optic technology, however, creates a social problem: it is expensive, and only the wealthy will be able to afford it. Studies show that inner city areas are already behind in new telephone developments. Fiber-optic networks may also further isolate rural from urban areas. Analysts believe that universal fiber-optic services will never be realized if the implementation of the technology is determined by market forces alone. Government should address the issue.
Publication Name: The New York Times
Subject: News, opinion and commentary
ISSN: 0362-4331
Year: 1989
User Contributions:
Comment about this article or add new information about this topic:
Caller says he broke into U.S. computers to taunt the experts
Article Abstract:
The New York Times receives a telephone call from a man identifying himself as the person responsible for recent intrusions into computers on the Internet network. The man identifies himself as an Australian named Dave. He says he is calling from outside the US, and he says his motivation for his break-ins is to taunt security experts. The man offers details about the break-ins, but authorities are not sure Dave is the guilty party. Experts say the intruder uses a program that scans the network looking for weak links. When a weak spot is found, the intruder steals passwords. Later, he erases files to cover his entry.
Publication Name: The New York Times
Subject: News, opinion and commentary
ISSN: 0362-4331
Year: 1990
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Standardized college exam is customized by computers. Mega-network: strength in numbers. Nortel makes inroads in building wireless world in Latin America
- Abstracts: Another GM Canada plant halts production. Daimler asks chairman to extend his contract. Labour Congress sanctions auto union
- Abstracts: Marathon man of hope. Year 2000 or bust: controversy dogs a B.C. program. Devotion to the ancient game
- Abstracts: So who's talking: human or machine? 'Talking' on the computer redefines human contact. Whole Earth state-of-art rapping
- Abstracts: An industrial policy, piece by piece. Pushing the envelope at Boeing; designing the 777 by computer saves time and money. But can it help fend off rivals?