I think most organizations have an interest in key recovery, at least with respect to stored data.
Dorothy E. DenningIf we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation.
Dorothy E. DenningSystems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons.
Dorothy E. DenningWe have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders.
Dorothy E. Denning