THWARTING THE INFORMATION THIEVES.

Research output: Contribution to journalArticlepeer-review

7 Scopus citations

Abstract

The author notes that opinion is divided on the seriousness of the threat of electronic surveillance carried out by foreign governments and domestic competitors. A brief description is given of the operating principles of bugs and tapes. Attention is called to the widespread availability of equipment for intercepting communications. It is noted that, with regard to private security vendors, the quality of the service is uneven and their claims are often exaggerated. It is noted that electronic sweeps are time-consuming and expensive and cannot guarantee detection of all taps and bugs. The advantages offered by encryption are then outlined, and various encryption schemes that have been proposed are described. An account is also given of the steps the US Government has taken to encourage wider use of encryption among defense contractors.

Original languageEnglish
Pages (from-to)30-41
Number of pages12
JournalIEEE Spectrum
Volume22
Issue number7
DOIs
StatePublished - 1985

Fingerprint

Dive into the research topics of 'THWARTING THE INFORMATION THIEVES.'. Together they form a unique fingerprint.

Cite this