Refine Search

  •  
  •  
Laptops a favorite with thieves

...her laptop 18 months ago to a thief who broke into her car, Miami computer consultant Sandra Hernandez Adams uses encryption devices to protect the data on her machine. "Security-wise, I'm doing a whole lot more," she says. "But probably...

http://chronicle.augusta.com/stories/1999/03/10/tec_255782.shtml
XXX Technology
Internet access to articles, songs, research could be limited

...expensive, adequately protects the public," said Adam Eisgrau of the Chicago-based association. Opponents of encryption devices say they block access even for those who could legally use the material, and those people would be breaking the...

http://chronicle.augusta.com/stories/1998/09/29/tec_240397.shtml
XXX Technology
Encryption controls declared unconstitutional

...like music and mathematical equations." The revised regulations let U.S. companies sell slightly more powerful encryption devices abroad, if the companies guarantee that law enforcement agencies would be able to intercept the communications...

http://chronicle.augusta.com/stories/1997/08/27/tec_213671.shtml
XXX Technology
Computer heavyweights to lobby for export rights

...Smiroldo. Despite opposition from the Clinton administration, legislation to liberalize U.S. export policy for encryption devices has advanced through key committees in the House. House Republicans have been working with the administration on...

http://chronicle.augusta.com/stories/1997/06/04/tec_209410.shtml
XXX Technology
Clinton liberalizes export policy on computer coding devices

...policy to allow companies to sell more powerful encryption devices abroad. But companies first would have to assure...year. Current policy permits companies to export encryption devices with electronic key lengths of up to 40 bits. Devices...

http://chronicle.augusta.com/stories/1996/11/16/tec_200607.shtml
XXX Technology
Laptops targets for theft

...her laptop 18 months ago to a thief who broke into her car, Miami computer consultant Sandra Hernandez Adams uses encryption devices to protect the data on her machine. "Security-wise, I'm doing a whole lot more," she says. "But probably...

http://chronicle.augusta.com/stories/1999/03/14/bus_256110.shtml
Business
FBI wants permission to decode computer transmissions

...disadvantage," Freeh said. The best solution would include setting up a key recovery system where developers of encryption devices deposit "keys" with a third party that can unscramble their codes, he said. As with wiretaps, authorities would...

http://chronicle.augusta.com/stories/1997/07/10/tec_211142.shtml
XXX Technology
Computer groups intensify lobbying efforts over message privacy

...front-burner issues," said trade group spokeswoman Diane Smiroldo. Bills that would let companies export more-powerful encryption devices than allowed by the Clinton administration have advanced through key committees. And, unlike the administration's...

http://chronicle.augusta.com/stories/1997/06/05/tec_209451.shtml
XXX Technology
1