Search Details

Word: secretly (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...grassroots organizing to the next step with his "e-precincts." Anyone can sign up to be a leader of one of these precincts. All you have to do is give Forbes the name, address and whereabouts of all your friends and relatives. In return you gain entrance into a secret elite privy to special campaign intelligence. Sounds a little like the Gestapo...

Author: By Meredith B. Osborn, | Title: Campaigning in Cyberspace | 4/15/1999 | See Source »

...Kkeeping secrets is an inherently suspect activity. Who would keep things secret unless there were something to hide? However, the United States has traditionally believed that exercising one's right to privacy should not incur suspicion, any more than taking the Fifth and refusing to testify should be taken as an admission of guilt. Although the right to privacy is not explicitly protected in the Bill of Rights, the U.S. has long recognized an individual's right to keep things hidden from public view...

Author: By Stephen E. Sachs, | Title: Big Brother Wants a Decoder Ring | 4/14/1999 | See Source »

Such an argument would make sense if the U.S. were the only country that had invented codes. Like the atom bomb and the secret of fire, however, this technology long ago fell into foreign hands. In most countries, there are few restrictions on encryption's use, manufacture or sale. RSA Inc., which makes a widely-used encryption engine, has opened an Australian subsidiary which can sell its technology world-wide. Rep. Zoe Lofgren (D-Calif.) has estimated that U.S. companies are forced to stand by and lose $60 billion a year of revenues as foreign competitors, unbound by export restrictions...

Author: By Stephen E. Sachs, | Title: Big Brother Wants a Decoder Ring | 4/14/1999 | See Source »

...secret that the U.S. needs better encryption. The electronic age may claim to be founded on openness, but in fact, it's founded on keeping things hidden. You can't have e-cash if people can duplicate their electronic dollar bills, or credit card Web purchases if a third party can listen in and collect the numbers. You also can't do anything important over e-mail if it can be intercepted or if you have no guarantee of whom you're talking to. The ability to keep our bank accounts safe from intruders is more important to national security...

Author: By Stephen E. Sachs, | Title: Big Brother Wants a Decoder Ring | 4/14/1999 | See Source »

...tutors on the search committee, the candidates. Thus, while Lewis has composed a set of guidelines to direct the process each time a mastership becomes available, there are few hard and fast rules for evaluating master candidates. (P)Except for the fact that the candidates 'identities are kept a secret throughout the period of consideration, no two searches are the same...

Author: By Scott A. Resnick, CRIMSON STAFF WRITER | Title: Making A Master Match | 4/12/1999 | See Source »

Previous | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | Next