Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal.
Dorothy E. DenningI favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access.
Dorothy E. DenningWe have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders.
Dorothy E. DenningSystems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons.
Dorothy E. Denning