Reinforcing paranoia

Bradner, Scott
September 1999
Network World;09/06/99, Vol. 16 Issue 36, p40
Trade Publication
Comments on issues pertaining to computer network security in the United States. Federal Communications Commission's (FCC) requiring of telecommunication companies to support wiretapping powers requested by the Federal Bureau of Investigation (FBI); Department of Justice's request for authority from Congress to empower it to disable encryption systems of computer users.


Related Articles

  • PROMISE OF SECURITY. Coffee, Peter // eWeek;1/20/2003, Vol. 20 Issue 3, p37 

    Reports on the efforts of the U.S. government in implementing effective computer network security. Concern of private-sector information technology firms about the impact of government rules for network security; Problem threatening the effectiveness of all perimeter-focused security systems;...

  • A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense. Clinton, Larry // Journal of Strategic Security;May2011, Vol. 4 Issue 2, p97 

    Cyber security is a complex issue that requires a smart, balanced approach to public-private partnership. However, there is not a simple gold standard or mandatory minimum standard of cyber security, which can cause friction in the relationship between government and private industry. There are...

  • Playing Defense. Ben-David, Alon // Aviation Week & Space Technology;6/27/2011, Vol. 173 Issue 23, p57 

    The article examines computer security management by Israel's government. The creation of a national civilian computer security agency in response to an increase in hacking of computer networks in that country is examined. The establishment of a unit of the Israeli Defense Forces (IDF) devoted...

  • Beijing makes great leap forward in cyber-warfare capabilities. Lam, Willy // East-Asia-Intel Reports;1/20/2010, p6 

    The article focuses on the move of the Communist Party administration for cyber-warfare capabilities in Beijing, China. In relation to the cyber attacks that hit Google Inc. and Yahoo! Inc., the administration has made the 2009 and 2010 Internet-based warfare capabilities as their foremost...

  • PM's anti-encryption plans cause fury.  // PC Pro;Apr2015, Issue 246, p12 

    The article reports on the response of computer security experts on the proposal of Great Britain Prime Minister David Cameron to ban encryption, particularly in messaging apps. Digital-rights advocate Cory Doctorow believes that the government's plan to ban encryption will endanger the public...

  • The path to safety? Carlson, Caron // eWeek;3/8/2004, Vol. 21 Issue 10, p32 

    The article reports on IT industry's cyber network security initiative in the U.S. IT companies are set to submit recommendations to strengthen cyber-infrastructure and pre-empting governments effort on legislation. The move was made to avoid Congress from imposing expensive security obligations...

  • Security funds close to being slashed. English, Erin // Australian Personal Computer;Jun95, Vol. 16 Issue 6, p20 

    Reports on the US Congress' plan to reduce funding for computer security research and development programs. Security research cuts' impact on advances in electronic commerce and the United States' success in the world market; Budget cuts in the area of cryptography and encryption.

  • Hackers of the world, unite! Schwartz, J. // Newsweek;7/2/1990, Vol. 116 Issue 1, p36 

    Reports on the government crackdown on computer tampering and the announcement due next week of a new foundation intended to combat computer phobia and provide legal aid from some people snared in the `hacker dragnet.' Investigation is out of proportion; Mitch Kapor, founder of Lotus...

  • Security termed critical component of upcoming digital revolution. McGuire, Mike // PC Week;7/19/93, Vol. 10 Issue 28, p135 

    Reports on the warning issued by a group of industry executives participating in a panel on security and copyright protection at Seybold Digital World Conference. Protection of intellectual property against pranksters and computer criminals; RSA Data Security Inc.'s encryption technology;...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics