Demons, drugs and pornography

August 1997
Network World;08/04/97, Vol. 14 Issue 31, p6
Trade Publication
Announces the release of the report `Encryption and Evolving Technologies: Tools of Organized Crime and Terrorism,' by the National Strategy and Information Center.


Related Articles

  • Tales from the encrypt. Holzmann, Gerard J. // Inc.;1997 Inc. Technology 4, Vol. 19 Issue 17, p168 

    Focuses on the history of encryption devices. Background on the scytale and the wheel cypher; How they worked; Explanation of a dongle.

  • Know the code. Henderson, Rick // Reason;Jun96, Vol. 28 Issue 2, p16 

    Focuses on the dispute between President Bill Clinton's Administration and high-technology companies and privacy advocates over electronic data encryption. Use of Cold War-era regulations for encryption; Introduction of bills that would guarantee the right of Americans to use or sell any...

  • Lack of encryption: Huge losses. Fassett, Anne M.; Bazzy, Jared // Telecommunications - Americas Edition;Dec95, Vol. 29 Issue 12, p20 

    Reports on the use of cryptography by business enterprises in the United States.

  • U.S. cryptography policy: Strategic hamlets. Stapleton-Gray, Ross // Telecommunications - Americas Edition;Jan96, Vol. 30 Issue 1, p29 

    Reports on the availability of encryption techniques in the commercial marketplace in the United States. Announcement of the Clipper chip; Restrictions on encryption exportation.

  • White House relaxes encryption export controls. Weaver, Heather Forsgren // RCR;09/21/98, Vol. 17 Issue 38, p69 

    Reports that the intensity in the controversial encryption export policy has been reduced by the Clinton Administration to allow for strong encryption products to be shipped overseas. What are encryption products; Comments from John Podesta, White House deputy chief of staff; Information on the...

  • SAFE and sound?  // Network World;09/29/97, Vol. 14 Issue 39, p10 

    Reports on the US House of Representatives Commerce Committee's rejection of the Oxley-Manton amendment to the Security and Freedom Through Encryption Act (SAFE) aimed at liberalizing export of products that use encryption. Opposition to the amendment from the software and telecommunications...

  • Encryption compromise fails.  // Seybold Report on Desktop Publishing;12/11/95, Vol. 10 Issue 4, p34 

    Reports on the failure on the efforts by the Bill Clinton administration to create a standard for data encryption that is acceptable to industry, civil-liberties and law-enforcement groups. Rejection of the compromise proposal by 37 technology companies; Opposition in the use of strong...

  • Hewlett-Packard to ship crypto hardware. Rodger, Will // Inter@ctive Week;11/25/96, Vol. 3 Issue 27, p16 

    Reports on the unveiling of a data-scrambling initiative that computer hardware and software companies' claim to lead to the pervasive use of encryption technology worldwide. Response to the struggle between law enforcement and cyber-rights and industry groups; Oppositions on Hewlett-Packard's...

  • Can suits crack Crypto policy? Rodger, Will // Inter@ctive Week;01/13/97, Vol. 4 Issue 1, p63 

    Presents information on suits filed against the Clinton administration's position on encryption technology. Information on the suits filed by Daniel Bernstein, Phil Karn and Peter D. Junger; Reason for the suits; Comments from Junger. INSET: Three voices of opposition..


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics