Back to Results
First PageMeta Content
Security / Email authentication / Cryptographic software / Secure communication / Clipper chip / Disk encryption / National Security Agency / Pretty Good Privacy / Email encryption / Cryptography / Internet privacy / Computer security


Bankston_short_biographical_summary
Add to Reading List

Document Date: 2015-05-04 13:25:41


Open Document

File Size: 475,00 KB

Share Result on Facebook

City

New York / /

Company

Naval Research Laboratory / National Academies Press / Yahoo / New America / RSA / GCHQ / New York Review / The Washington Post / Idaho Law Review / NSA / Apple / See Washington Post / Lockheed / Google / Gemalto / What NSA / The New York Times / Reuters / NBC / ConsumerReports.org / The Guardian / Associated Press / /

Country

United Kingdom / Italy / United States / /

Currency

USD / /

Event

Natural Disaster / Man-Made Disaster / /

Facility

George Washington University / Commerce Department’s National Institute of Standards / Cyberspace Policy Institute / Naval Research Laboratory / New America’s Open Technology Institute / Kenneth W. Dam / Cato Institute / Library of Congress / Joseph Lorenzo Hall / /

IndustryTerm

encryption software / digital technology / technology policy / law enforcement efforts / secure communications networks / Internet Freedom / card manufacturer / system software / Internet devices / electricity consumption / encrypted products / cryptographic algorithms / search warrants / law enforcement / Internet users / escrow infrastructure / encryption technology / escrow technologies / defense contractor / secure products / Internet-enabled commerce / real world systems / law enforcement wiretaps / every-day web traffic / encrypted communications / high-level law enforcement / technology / alarm systems / Internet eyes / email encryption solution / cloud computing industry / foreign cryptographic products / technology industry / ng_your_digital_communications.html / technology development / hardware products / information systems / law enforcement technique / computing / state law enforcement / onion routing software / instant messaging encryption protocol / foreign companies manufacturing / digital communications / encryption products / recovery infrastructure / software library / digital technologies / free tools / Internet communications / /

OperatingSystem

Android / /

Organization

George Washington School of Engineering and Applied Science / National Research Council / Clinton Administration / US Federal Reserve / Committee on Oversight and Government Reform Hearing / Information Society / How Much Will PRISM Cost / National Security Agency / University of Pennsylvania / Open Technology Institute / OpenPGP Alliance / White House / United Nations / British intelligence / Supreme Court / U.S. government / Center for Democracy & Technology / House / House Appropriations Committee / Administrative office of the U.S. Courts / George Washington University / Castro / Information Technology and Innovation Foundation / Electronic Frontier Foundation / New America’s Open Technology Institute / Yale / Commerce Department’s National Institute of Standards and Technologies / Cato Institute / Adminstrative office of the U.S. Courts / Federal Bureau of Investigation / Congress / U.S. House of Representatives Subcommittee on Information Technology / Chinese intelligence / Cyberspace Policy Institute / /

Person

Mike Rogers / Jeffrey Vagle / Robyn Greene / Steven M. Bellovin / Ed Felten / See Dan Froomkin / Bob Goodlatte / Kevin S. Bankston / Phil Zimmerman / Dominic Rushe / Michael Chertoff / Ronald T. Hosko / Ron Rivest / Tim Greene / Barton Gellman / Mike Masnick / Hurd / Christopher Drew / Elijah Cummings / Matthew Green / Stewart Baker / Eleanor Norton / Micah Lee / Alan Rusbridger / John Mica / Ellen Nakashima / Craig Timberg / Natasha Vargas-Cooper / Joseph Menn / Matt Blaze / Peter Swire / Jack Gillum / Arjun Kharpal / Herbert S. Lin / Kelly / Eric Tucker / Michael Hayden / Steven Levy / Duncan Jr. / Danielle Kehl / David Cole / Andrea Peterson / Bruce Schneier / Robert Morgus / Mike Wheatley / Andrew Lumby / Philip Zimmerman / Andy Greenberg / Jennifer LeClaire / Bridget Carey / Warns How / Hal Abelson / Ashkan Soltani / Lance J. Hoffman / John Reed / Jeremy Gillula / /

/

Position

official / Professor / Director Continues Crusade Against Encryption / Representative / computer science professor / Security Secretary / Chief Information Security Officer / general counsel / czar / CIO / Director Policy / Director James / executive / cybersecurity coordinator / chief cybersecurity adviser / defense contractor / co-founder / Co-Director / Chairman / director / Director Comey / Homeland Security Secretary / /

Product

iPads / /

ProgrammingLanguage

php / /

ProvinceOrState

California / Pennsylvania / North Carolina / /

PublishedMedium

Consumer Reports / Washington Post / The Washington Post / The New York Times / The Guardian / /

Technology

device encryption / encryption / cell phones / Smart phone / Android / pdf / smartphones / Record instant messaging encryption protocol / Information Technology / operating system / html / mobile devices / Cryptography / Encryption Technology / Clipper Chip / key escrow technologies / default encryption / Clueless Editorial On Phone Encryption / smartphone / default smartphone encryption / public key / cell phone system / smartphone encryption / /

URL

http /

SocialTag