A shooting in the austrian capital vienna the government calls it a terrorist attack ugandan politician bobby wine is arrested again shortly after he was nominated for next years president ial elections. And the sports news argentine football legend Diego Maradona has been admitted to hospital although hes done to says its not related to code 19 all of the details coming up this hour. Its 1500 g. M. T. And 10 am in the eastern United States where polls are open for one of the most controversial and highly anticipated elections in recent years donald trump and joe biden have campaigned for months its now up to the American Public people in all but 5 states are now voting with 3 of those california idaho and oregon opening their. Polls this hour the man battling for the presidency havent stopped campaigning with biden in scranton pennsylvania and trump in arlington virginia. Lets speak to our coverage good begin our coverage by speaking to alan fischer in washington d. C. Allan where int
Science literature but what im most interested in is, number one, how to help policymakers to make the decisions about Technology Policy and so that involves understanding the details of our Computer Systems and Network Systems work. And probably more importantly im really interested in how to give all our Computing Technology so that its more responsive to Public Policy needs. Ive been able to do that because ive worked with and continue to work with an Extraordinary Group of computer scientists and other researchers at mit and around the world. Host can you give one example of how you influenced policy . Guest the people are probably well aware as an example that theres a big debate about the use of Encryption Technology. We need encryption to protect our email exchanges, our financial transactions, political speech that goes on, we hope privately online when it needs to. Governments for decades have been concerned that the use of strong Encryption Technology would swarm the ability
Extraordinary group of computer scientists and my research in all that time has always been in the Computer Science literature but what im most interested in is number one how to help policymakers to make good decisions about Technology Policy and involves understanding the details of how Computer Systems and Network Systems work and probably more important they i am interested in how to evolve our Computing Technology so that its more responsive to Public Policy needs. Ive been able to do that because ive worked with and continue to work with an Extraordinary Group of computer scientists and other researchers at mit and around the world. Host can you give one example of how you influence policy . Guest people are probably well aware as an example that there is a big debate about the use of Encryption Technology and we need encryption to protect our email exchanges, our financial transactions, political speech that goes on we hope privately online when it needs to end government for de
W. I should say im actually trained as a lawyer originally. Ive been at m. I. T. For more than 20 years. And ive alwaysorked with an Extraordinary Group of computer scientists. My research in all that time has always been in the Computer Science literature. But what im really most interested in is number one, how do help policymakers to make good decisions about Technology Policy and so that involves understanding the details of how cputer systems and Network Systems work. And probably more importantly, im really interested in how to evolve our Computing Technology so its more responsive to Public Policy needs. And ive been able to do that because ive worked with and continue to work with an Extraordinary Group of computer scientists and other researchers at m. I. T. And around the world. Can you give one example of how youve influenced policy . Well, people are probably well aware as an example that theres a big debate about the use of encryption technology. We need encryption to prot
Importantly i am really interested in how to evolve our Computing Technology so that it is more responsive to Public Policy needs. We need encryption to protect our email exchanges, our financial transactions, political speech that goes on. We hope privately online what it needs to. Governments for decades have ofn concerned that the use strong Encryption Technology would thwart the ability of Law Enforcement to conduct electronic surveillance. From a technical perspective, we look at that question and while acknowledging that encryption and pose some barriers for the police, we have shown through Technical Research that if you try to force all encryption palpable or have upkdoors, then you will end harvesting the security of the millions of people around the world to use the internet and Computing Technology, so well this is an ongoing debate, even governments trying to control encryption have acknowledged that they should not do so in a way that introduces systemic weaknesses. At tha