Abstracts - faqs.org

Abstracts

Business, general

Search abstracts:
Abstracts » Business, general

Clinton continues to stumble over the 'E' word (encryption)

Article Abstract:

Encryption may place a barrier between the Clinton Administration and its otherwise positive relationship with Silicon Valley. The encryption debate has escalated in recent weeks, as Washington is about to receive new legislation initiatives that propose to restrict the unlimited use of encryption. Efforts by the Clinton Administration and a small group of high-technology executives to reach a compromise indicates no simple resolution is in sight. Encryption requires access to a special 'key,' which allows users to decipher techniques that scramble information. Encryption has emerged as a key issue because it is crucial to both Internet commerce growth and privacy protection. Law enforcement officials, supported by national security officials, support requiring users to register such keys with independent authorities. Industry and civil liberties groups oppose the legislation. Clinton has expressed his sympathy to Silicon Valley executives but said he is under pressure to place greater restrictions on encryption.

Author: Markoff, John
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1998
Electronic computers, Electronic Computer Manufacturing, Computers & Auxiliary Equip, Telecommunications regulations, Government communications regulation

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


A compromise on encryption exports seems to unravel

Article Abstract:

A compromise for exporting encryption technology is dissolving as computer companies balk at conditions the Clinton Administration has added to the original agreement. In Oct 1996, the administration agreed to allow computer companies to export more powerful encryption software if the companies developed systems allowing law enforcement officials with warrants to have encryption keys. Although many software companies feared that the possibility of eavesdropping would make their products less attractive, companies such as IBM and HP backed the compromise. A Nov 15 1996 executive order transferring export oversight from the State Dept to the Commerce Dept, however, included new conditions that even IBM hesitates to support. Those conditions include allowing the Justice Dept to consult with the Commerce Dept, the consideration of 56-bit-key export licenses only on a case-by-case basis and greater government participation in developing the key-recovery system.

Author: Markoff, John
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1996
Prepackaged software, Software Publishers, Data Encryption Software Pkgs, Encryption software, Export controls, Government export policy and export regulation

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


A most-wanted cyberthief is caught in his own web

Article Abstract:

The FBI arrested Kevin D. Mitnick at his apartment in Raleigh, NC after an intensive search led by computer security expert Tsutomu Shimomura. Mitnick had been avoiding Federal law enforcement officials since Nov 1992 for Federal parole violations, and has been called the world's most wanted computer hacker. The arrest was made after Mitnick went on a hacking spree in which he broke into Shimomura's home computer on Christmas Day, 1994. Mitnick stole an estimated 20,000 credit card numbers and thousands of data files. After his computer was broken into, Shimomura made it his personal crusade to help the FBI catch the notorious hacker. The investigators used sophisticated techniques to pin down Mitnick's location. They were able to determine that he was using a computer modem attached to a cellular phone in the Raleigh, NC area. Shimomura was present at Mitnick's pre-arraignment hearing.

Author: Markoff, John
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1995
Privacy issue, Privacy, Investigations, Computer crime, Computer crimes, Computer hackers, Industry legal issue, Mitnick, Kevin D.

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Computer industry, Laws, regulations and rules, Encryption, Data encryption
Similar abstracts:
  • Abstracts: Using corporate social responsibility to win the war for talent. How companies become platform leaders
  • Abstracts: Carnegie Mellon, Visa plan to offer payment system for data from Internet. Electronic erotica: too much traffic
  • Abstracts: Drug industry. Chemical/diversified industry
  • Abstracts: NEC and Packard Bell in deal to create the no. 4 PC maker. NEC raising its Packard Bell stake to 49%. AST is in talks with Samsung
  • Abstracts: Judge rejects U.S. plan to settle antitrust case against Microsoft. part 2 Microsoft and U.S. seek to upset judge's decision
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.