Search Details

Word: access (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

...critics who wanted to scrap the plan. Finally last week, President Bush called an unusual National Security Council meeting to thrash out the issues. In the end, he decided on a compromise: to go through with the deal but to apply safeguards that will prevent Japanese contractors from getting access to the most important technology. According to presidential spokesman Marlin Fitzwater, Bush has yet to decide on "at least three or four basic issues regarding the agreement," which he is expected to announce this week...

Author: /time Magazine | Title: A Deal That Nearly Came Undone | 3/27/1989 | See Source »

Ironically, Honecker and his elderly colleagues in the ruling Politburo have been able to fend off unpalatable reforms in large part because of huge subsidies from West Germany: some $1 billion a year in bank credits and other transfers. East Germany also profits from back-door access to the rich European Community market through West German middlemen. The special treatment reflects West Germans' strong emotional bond with their countrymen across the Berlin Wall -- and deep-seated hopes that the two Germanys may one day be reunited...

Author: /time Magazine | Title: Rigid But Prosperous | 3/27/1989 | See Source »

...court ordered further lower court hearings to determine whether the Customs Service rules also should apply to workers with access to classified information...

Author: NO WRITER ATTRIBUTED | Title: Supreme Court Approves Some Drug Tests | 3/22/1989 | See Source »

...only one. A previously undisclosed series of high-tech espionage coups have been achieved by both sides. "Foreign intelligence services have gained access to classified information in U.S. computers by remote means," a former senior Government computer expert told TIME. "And we have done the same thing to them...

Author: /time Magazine | Title: Spying And Sabotage by Computer | 3/20/1989 | See Source »

Because the military operates many computers at what is called system high, in which all users are cleared for the highest level of information the network possesses, a sophisticated insider who became a spy would have considerable access. The spy could transmit information to a less closely watched part of the network -- or to an outsider -- without appearing to do so by using what is known as a covert channel. This involves signaling the secret message the agent wants to send in binary code by making minute changes in the speed or the order in which the "bits" of other...

Author: /time Magazine | Title: Spying And Sabotage by Computer | 3/20/1989 | See Source »

Previous | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | Next