Search Details

Word: tools (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

Historically, the U.S. has restricted exports of encryption to foreign countries. It is currently illegal to export encryption products beyond a certain strength without giving the government a key, a system known as "key escrow." Encryption has been classified as a type of munitions, a tool of war. The argument was that if terrorists, organized crime networks or other unpleasant people got their hands on powerful encryption software, they could encode their plans in a way that the CIA and the FBI couldn't understand...

Author: By Stephen E. Sachs, | Title: Big Brother Wants a Decoder Ring | 4/14/1999 | See Source »

...campaign (to be followed up by television ads later this spring) arguing that homosexuals are deceived and diseased persons who threaten the stability of the nation. Cloaked in the rhetoric of love and healing, this campaign, waged by the likes of presidential aspirant Gary Bauer, uses religion as a tool of political ambition. Among its many targets are state education initiatives aimed at teaching elementary school children that hate and violence against gays are wrong...

Author: By Adam S. Hickey, | Title: A Moral Obligation | 4/12/1999 | See Source »

...saying that serving your country in the armed services is just like being a tool of an armed oppressor. I see the military's job as the exact opposite--protecting the innocent like the Kosovar Albanians," he says...

Author: By Jonelle M. Lonergan and Alexis B. Offen, CRIMSON STAFF WRITERSS | Title: We Asked, They Told | 4/12/1999 | See Source »

...saying that serving your country in the armed services is just like being a tool of an armed oppressor. I see the military's job as the exact opposite--protecting the innocent like the Kosovar Albanians," he says...

Author: By Alexis B. Offen, CRIMSON STAFF WRITERS | Title: We ASKED They TOLD | 4/12/1999 | See Source »

...mail account. In Stockholm, computer-science grad Fredrik Bjorck suggested that Melissa's code bore a strong resemblance to the work of a virus writer called VicodinES. When he heard that, Smith says, "I jumped all over it." He went to Vicodin's website and downloaded the virus tool kits he found there. Pulling files apart, he found names embedded in the source code. One of them appeared three times: David L. Smith...

Author: /time Magazine | Title: How They Caught Him | 4/12/1999 | See Source »

Previous | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | Next