Word: coded
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...everyone sits down for the family meal, the only food many members of the staff will eat until after midnight. Afterward, I'm able to track Kate down again, and I ask her about the decision not to institute a dress-code. "We want people to be as comfortable wearing jeans and a T-shirt as they are in a tuxedo," she explains. At the same time, she acknowledges that Rialto's regulars are more likely to be dressed in the latter than the former. "The average age of the clientele is late forties," Kate estimates. On the other hand...
...know how much damage it has suffered from Groat's alleged spying. Investigators do not think it is as extensive as the havoc caused by CIA mole Aldrich Ames, who was convicted in 1994 of passing intelligence to Moscow over a nine-year span. But the agency's code-breaking capabilities are among its most guarded secrets, and Groat could face death if convicted. A nation hostile to the U.S. that learned of the penetration would quickly change its codes. "This also could be a huge embarrassment," said a CIA source, if the nation Groat leaked to was an ally...
...propositions like Clinton's should not be the basis for litigation. Call this the "no harm, no foul" school, and include among its proponents a majority of the Supreme Court. Justice Antonin Scalia, for instance, recently wrote that sexual-harassment law should not be interpreted as a "general civility code" for the nation. (As the famously brusque Justice surely knows, rudeness is all-American and fully constitutional...
...Gandhi-as-Christ, dying (and, before that, frequently going on hunger strike) so that others might live. His philosophy of nonviolence seemed to work by embarrassing the British into leaving; freedom could be won, the film appeared to suggest, by being more moral than your oppressor, whose moral code could then oblige him to withdraw...
...What this means is that cell phone rustlers can now scan the airwaves, remotely tap into a call and even duplicate the cell phone's digital ID at will. As Marc Briceno, who organized the code-cracking, puts it: "We can clone the phones." What was the crypto technology's fatal weakness? Too much secrecy...