Science literature but what im most interested in is, number one, how to help policymakers to make the decisions about Technology Policy and so that involves understanding the details of our Computer Systems and Network Systems work. And probably more importantly im really interested in how to give all our Computing Technology so that its more responsive to Public Policy needs. Ive been able to do that because ive worked with and continue to work with an Extraordinary Group of computer scientists and other researchers at mit and around the world. Host can you give one example of how you influenced policy . Guest the people are probably well aware as an example that theres a big debate about the use of Encryption Technology. We need encryption to protect our email exchanges, our financial transactions, political speech that goes on, we hope privately online when it needs to. Governments for decades have been concerned that the use of strong Encryption Technology would swarm the ability
Extraordinary group of computer scientists and my research in all that time has always been in the Computer Science literature but what im most interested in is number one how to help policymakers to make good decisions about Technology Policy and involves understanding the details of how Computer Systems and Network Systems work and probably more important they i am interested in how to evolve our Computing Technology so that its more responsive to Public Policy needs. Ive been able to do that because ive worked with and continue to work with an Extraordinary Group of computer scientists and other researchers at mit and around the world. Host can you give one example of how you influence policy . Guest people are probably well aware as an example that there is a big debate about the use of Encryption Technology and we need encryption to protect our email exchanges, our financial transactions, political speech that goes on we hope privately online when it needs to end government for de
A 90second answer, a 60second rebuttal, and a 30second response. I will assist the candidates in adhering to those time limits with the help of a series of lights visible to both. Under their rules, the candidates are not allowed to question each other directly. I will ask the questions. There are no limitations on the subjects. The order for everything tonight was determined by coin toss. Now, to the Opening Statements and to president clinton. Mr. President. Thank you, jim. And thank you to the people of hartford, our hosts. I want to begin by saying again how much i respect senator dole and his record of Public Service and how hard i will try to make this campaign and this debate one of ideas, not insults. Four years ago i ran for president at a time of high unemployment and rising frustration. I wanted to turn this country around with a program of opportunity for all, responsibility from all, and an American Community where everybody has a role to play. I wanted a government that w
W. I should say im actually trained as a lawyer originally. Ive been at m. I. T. For more than 20 years. And ive alwaysorked with an Extraordinary Group of computer scientists. My research in all that time has always been in the Computer Science literature. But what im really most interested in is number one, how do help policymakers to make good decisions about Technology Policy and so that involves understanding the details of how cputer systems and Network Systems work. And probably more importantly, im really interested in how to evolve our Computing Technology so its more responsive to Public Policy needs. And ive been able to do that because ive worked with and continue to work with an Extraordinary Group of computer scientists and other researchers at m. I. T. And around the world. Can you give one example of how youve influenced policy . Well, people are probably well aware as an example that theres a big debate about the use of encryption technology. We need encryption to prot
Importantly i am really interested in how to evolve our Computing Technology so that it is more responsive to Public Policy needs. We need encryption to protect our email exchanges, our financial transactions, political speech that goes on. We hope privately online what it needs to. Governments for decades have ofn concerned that the use strong Encryption Technology would thwart the ability of Law Enforcement to conduct electronic surveillance. From a technical perspective, we look at that question and while acknowledging that encryption and pose some barriers for the police, we have shown through Technical Research that if you try to force all encryption palpable or have upkdoors, then you will end harvesting the security of the millions of people around the world to use the internet and Computing Technology, so well this is an ongoing debate, even governments trying to control encryption have acknowledged that they should not do so in a way that introduces systemic weaknesses. At tha