S. 798, the Promote Reliable On-line Transactions to Encourage Commerce and Trade (PROTECT) Act of 1999: Hearing Before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, First Session, June 10, 1999

Front Cover
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Other editions - View all

Common terms and phrases

Popular passages

Page 12 - If cryptography can protect the trade secrets and proprietary information of businesses and thereby reduce economic espionage (which it can), it also supports in a most important manner the job of law enforcement. If cryptography can help protect nationally critical information systems and networks against unauthorized penetration (which it can), it also supports the national security of the United States.
Page 49 - The BSA promotes the continued growth of the software industry through its international public policy, education, and enforcement programs in 65 countries throughout North America, Europe, Asia and Latin America. BSA worldwide members include the leading publishers of software for personal computers, including Adobe...
Page 33 - ... moving this initiative from concept to reality. Encryption usage has the potential to enable citizens to use technology that will make their lives more convenient, enhance the economic competitiveness of US industry, combat frivolous and criminal access to private and valuable information, and deny adversaries from gaining access to US information wherever it may be in the world. That's the good news. The bad news is that the encryption in most commercial products today has very little chance...
Page 68 - Moreover, when we employ electronic methods of communication, we often leave electronic "fingerprints" behind, fingerprints that can be traced back to us. Whether we are surveilled by our government, by criminals, or by our neighbors, it is fair to say that never has our ability to shield our affairs from prying eyes been at such a low ebb. The availability and use of secure encryption may offer an opportunity to reclaim some portion of the privacy we have lost. Government efforts to control encryption...
Page 52 - Effective means of protecting data against unauthorized use or disclosure. • Well-trained users who understand how to protect their systems and data." An earlier blue ribbon National Research Council (NRC) Committee similarly concluded in its (May 1996) CRISIS Report ("Cryptography's Role in Securing the Information Society") that encryption promotes the national security of the United States by protecting "nationally critical information systems and networks against unauthorized penetration."...
Page 6 - Senator Ashcroft. STATEMENT OF HON. JOHN ASHCROFT, US SENATOR FROM MISSOURI Senator ASHCROFT. Thank you, Mr. Chairman, and may I just say briefly that I believe these hearings are important.
Page 51 - Information Security: Computer Attacks at Department of Defense Pose Increasing Risks," found that: computer attacks are an increasing threat, particularly through connections on the Internet...
Page 33 - ... narcotic trafficking, to name a few. Because of these growing serious threats to our national security, care must be taken to protect our nation's intelligence equities. Passage of legislation that immediately decontrols the export of strong encryption will significantly harm NSA's ability to carry out our mission and will ultimately result in the loss of essential intelligence reporting. This will greatly complicate our exploitation of foreign targets and the timely delivery of intelligence...
Page 32 - The ability to understand the secret communications of our foreign adversaries while protecting our own communications — a capability in which the United States leads the world — gives our nation a unique advantage.
Page 49 - Alliance (BSA) has been the voice of the world's leading software developers before governments and with consumers in the international marketplace. Its members represent the fastest growing industry in the world.

Bibliographic information