Search Details

Word: experts (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

...some environmental pluses. Humboldt Bay oysters fed on its nutrients, and Professor Allen, a likable tinkerer whom Klippity Klopp calls Crazy George, raised salmon fingerlings in a mix of sea and wastewater. Other ideas emerged. HSU biologist Stan Harris was for a bird sanctuary. Gearheart came in as an expert on oxidation ponds...

Author: /time Magazine | Title: Arcata Marsh and Wildlife Sanctuary | 3/20/1989 | See Source »

...reduce the possibility of surprise attacks and large-scale offensive operations and to diminish the oppressive levels of firepower and military manpower. Optimally, both NATO and the Warsaw Pact will be restructured along defensive lines, with no country or alliance having the power to attack others. Acknowledges a Soviet expert on conventional arms: "This is the most complicated diplomatic task since the end of World...

Author: /time Magazine | Title: East-West Let's Count Down | 3/20/1989 | See Source »

...only one. A previously undisclosed series of high-tech espionage coups have been achieved by both sides. "Foreign intelligence services have gained access to classified information in U.S. computers by remote means," a former senior Government computer expert told TIME. "And we have done the same thing to them...

Author: /time Magazine | Title: Spying And Sabotage by Computer | 3/20/1989 | See Source »

...number of current or former officials say U.S. intelligence agencies have had considerable success in penetrating classified military computer systems in the Soviet Union and other countries. The rule, explains one expert, is that "any country whose sensitive communications we can read, we can get into their computers." Breaches of some Soviet computers were done not by cracking codes but by physically breaking into Soviet military facilities, sources said...

Author: /time Magazine | Title: Spying And Sabotage by Computer | 3/20/1989 | See Source »

...computers in the U.S. today." Until such systems are developed and put in place, computer networks will continue to be at risk -- although the threat cuts both ways. "If you believe the Soviet Union can get into our systems and change them at will," asks a former senior Government expert, "what do you think they think we can do to them?" In the hidden world of computer espionage, the battle may just be gearing...

Author: /time Magazine | Title: Spying And Sabotage by Computer | 3/20/1989 | See Source »

Previous | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | Next