We have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders. Dorothy Denning absoluteaccessagency Change image and share on social
Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal. Dorothy Denning digitaldisposaleasy Change image and share on social
I prefer leaving things to the market as much as possible. Dorothy Denning leavemarketprefer Change image and share on social
If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation. Dorothy Denning actorattackcapability share on social
Everyone is a proponent of strong encryption. Dorothy Denning encryptionproponentstrong Change image and share on social
Systems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons. Dorothy Denning achieveattackcomplex Change image and share on social
I think most organizations have an interest in key recovery, at least with respect to stored data. Dorothy Denning datuminterestkey Change image and share on social
The concern is over what will happen as strong encryption becomes commonplace with all digital communications and stored data. Right now the use of encryption isn't all that widespread, but that state of affairs is expected to change rapidly. Dorothy Denning affairchangecommonplace share on social
I don't have a particular recommendation other than that we base decisions on as much hard data as possible. We need to carefully look at all the options and all their ramifications in making our decisions. Dorothy Denning basecarefullydatum share on social
With those people, I'm very far apart, because I believe that government access to communications and stored records is valuable when done under tightly controlled conditions which protect legitimate privacy interests. Dorothy Denning accesscommunicationcondition share on social