Communications and Computer Surveillance, Privacy, and Security: Hearing Before the Subcommittee on Technology, Environment, and Aviation of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, Second Session, May 3, 1994, Volume 4U.S. Government Printing Office, 1994 - 208 pages |
À l'intérieur du livre
Résultats 1-5 sur 30
Page 23
... APPROACH TO SOLVING THIS PROBLEM IN A TIMELY AND COMPREHENSIVE FASHION . LEGISLATION ALONE CAN ASSURE THAT ALL OF THE IMPEDIMENTS TO AUTHORIZED ELECTRONIC SURVEILLANCE WILL BE REMOVED WITHIN A REASONABLE PERIOD OF TIME . -- THE PURPOSE ...
... APPROACH TO SOLVING THIS PROBLEM IN A TIMELY AND COMPREHENSIVE FASHION . LEGISLATION ALONE CAN ASSURE THAT ALL OF THE IMPEDIMENTS TO AUTHORIZED ELECTRONIC SURVEILLANCE WILL BE REMOVED WITHIN A REASONABLE PERIOD OF TIME . -- THE PURPOSE ...
Page 24
... APPROACH TO THIS ISSUE . IT DEALS WITH THE " DIGITAL TELEPHONY " PROBLEM IN AN IT DOES NOT SIMPLY " BAND- APPROPRIATELY COMPREHENSIVE FASHION -- AID OVER " PAST PROBLEMS ; IT ALSO RESPONSIBLY DEALS WITH NEW SERVICES AND TECHNOLOGIES ...
... APPROACH TO THIS ISSUE . IT DEALS WITH THE " DIGITAL TELEPHONY " PROBLEM IN AN IT DOES NOT SIMPLY " BAND- APPROPRIATELY COMPREHENSIVE FASHION -- AID OVER " PAST PROBLEMS ; IT ALSO RESPONSIBLY DEALS WITH NEW SERVICES AND TECHNOLOGIES ...
Page 33
... approach possible . When you consider that most people currently use no encryption , the key escrow encryption concept presents a system that actually enhances privacy protections . Widespread use of CLIPPER will make it easy for people ...
... approach possible . When you consider that most people currently use no encryption , the key escrow encryption concept presents a system that actually enhances privacy protections . Widespread use of CLIPPER will make it easy for people ...
Page 40
... approach as the most desirable alternative for protecting voice communications without impairing the ability of law enforcement agencies to continue to conduct wiretaps . For data communication the long - standing Data Encryption ...
... approach as the most desirable alternative for protecting voice communications without impairing the ability of law enforcement agencies to continue to conduct wiretaps . For data communication the long - standing Data Encryption ...
Page 46
... approaches . 5. Key Government Policies on Unclassified / Commercial Encryption Encryption is an important tool to protect privacy and confidentiality . As I discussed earlier , encryption is powerful technology that can protect the ...
... approaches . 5. Key Government Policies on Unclassified / Commercial Encryption Encryption is an important tool to protect privacy and confidentiality . As I discussed earlier , encryption is powerful technology that can protect the ...
Autres éditions - Tout afficher
Expressions et termes fréquents
ability Administration Administration's authorized call setup information Clipper Chip Committee common carrier compliance Computer Security Act concerns Congress cordless telephone cost court orders court-authorized electronic surveillance crime criminal cryptographic cryptographic policy Data Encryption Standard decryption devices differential cryptanalysis Digital Telephony electronic communications Electronic Frontier Foundation encryption policy encryption products Encryption Standard encryption systems encryption technology enforcement and national ensure escrow agents export controls government agencies impediments implementation intercept investigations issue Kallstrom Kammer key escrow encryption key escrow system key escrow/Skipjack key-escrow law enforcement law enforcement agencies law enforcement's legislation meeting national cryptographic national security National Security Agency needs networks NIST NSA's pen register privacy and security privacy protection problem proposal requirements ROHRABACHER security and privacy SJ(k SKIPJACK algorithm solution Subcommittee technical techniques terrorists transmission trap and trace unique key users VALENTINE voluntary wiretaps
Fréquemment cités
Page 52 - Materials, a major international society for the development of voluntary standards for materials, products, systems, and services. His awards include both the Gold and Silver Medals of the Department of Commerce, the William A. Jump Award for Exceptional Achievement in Public Administration, the Federal Government Meritorious Executive Award, and the Roger W. Jones Award for Executive Leadership. Mr. Kammer received his Bachelor of Arts degree from the University of Maryland in 1969.
Page 80 - they that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.
Page 52 - Kammer has chaired several important evaluation committees for the Department of Commerce, including reviews of satellite systems for weather monitoring and the US LANDSAT program, and of the next generation of weather radar used by the US government.
Page 103 - The act also established a Computer System Security and Privacy Advisory Board within the Department of Commerce, and required Commerce to promulgate regulations based on NIST guidelines.
Page 52 - ... ability to enhance the competitiveness of American industry while maintaining its traditional function as lead national laboratory for providing the measurements, calibrations, and quality assurance techniques which underpin United States commerce, technological progress, improved product reliability and manufacturing processes, and public safety...
Page 103 - (b) The duties of the Board shall be— "(1) to identify emerging managerial, technical, administrative, and physical safeguard issues relative to computer systems security and privacy...
Page 197 - ... Identifies the origin and destination of a wire or electronic communication placed to, or received by, the facility or service that is the subject of the court order or lawful authorization, including information associated with any telecommunications system dialing or calling features or services. For voice communications, this information is typically the electronic pulses, audio tones, or signaling messages that identify the numbers dialed or otherwise transmitted, or caused to be transmitted....
Page 183 - ... landlord, custodian or other person shall furnish the applicant forthwith all information, facilities, and technical assistance necessary to accomplish the interception...
Page 103 - (1) to identify emerging managerial, technical, administrative, and physical safeguard issues relative to computer systems security and privacy; "(2) to advise the Bureau of Standards and the Secretary of Commerce on security and privacy issues pertaining to Federal computer systems; and "(3) to report its findings to the Secretary of Commerce, the Reports.
Page 103 - Board shall be composed of twelve additional members appointed by the Secretary of Commerce as follows: "(1) four members from outside the Federal Government who are eminent in the computer or telecommunications industry, at least one of whom is representative of small or medium sized companies in such...