![](https://secure.gravatar.com/avatar/480155a8acbba65587086d81f7ed25ec.jpg?s=120&d=mm&r=g)
--- begin forwarded text Date: Wed, 19 Nov 1997 10:31:13 -0500 From: Richard Lethin <lethin@etcons.com> MIME-Version: 1.0 To: dcsb@ai.mit.edu Subject: [Fwd: *DLS Lecture -Robert Morris - NSA - Tomorrow*] Sender: bounce-dcsb@ai.mit.edu Precedence: bulk Reply-To: Richard Lethin <lethin@etcons.com> Return-Path: <bbarry@hq.lcs.mit.edu> Received: from life.ai.mit.edu (life.ai.mit.edu [128.52.32.80]) by deer-park.etcons.com (8.8.5/8.8.5) with ESMTP id KAA10234 for <lethin@etcons.com>; Wed, 19 Nov 1997 10:34:27 -0500 (EST) Received: from LCS.MIT.EDU (mintaka.lcs.mit.edu [18.26.0.36]) by life.ai.mit.edu (8.8.5/AI1.15/ai.master.life:1.18) with SMTP id KAA24223; Wed, 19 Nov 1997 10:18:58 -0500 (EST) Received: from hq.lcs.mit.edu by MINTAKA.LCS.MIT.EDU id aa27207; 19 Nov 97 10:18 EST Received: from [18.49.0.239] (bronte-mac.lcs.mit.edu) by hq.lcs.mit.edu (4.1/NSCS-1.0S) id AA15548; Wed, 19 Nov 97 10:18:30 EST Message-Id: <v03020905b098a38d820a@[18.49.0.239]> Mime-Version: 1.0 Content-Type: text/enriched; charset="us-ascii" Date: Wed, 19 Nov 1997 10:17:47 -0400 To: seminar@ai.mit.edu, seminars@lcs.mit.edu, help-teach@lcs.mit.edu, assistants@ai.mit.edu, mas-students@media.mit.edu, support@media.mit.edu, eecsfaculty@eecs.mit.edu, dchamber@warren.med.harvard.edu, wmurphy@mediaone.net, Kenneth_Burrell/CAM/Lotus@lotus.com, vijak@eecs.harvard.edu, CMCampos@aol.com, Stephanie_Leung@cmp4.ccmail.compuserve.com From: Barbara Barry <bbarry@hq.lcs.mit.edu> Subject: *DLS Lecture -Robert Morris - NSA - Tomorrow* (Please excuse multiple posts) *SEMINAR ANNOUNCEMENT ****************************** MIT Lab for Computer Science Distinguished Lecturer Series Thursday, November 20, 1997 Lecture, 3:30pm Location 34-101 Refreshments, 3:15pm 50 Vassar Street, Cambridge Robert Morris, National Security Agency, Retired Protection of Valuable Information Over the past few decades, there has been a considerable shift in the area of protection and exploitation of valuable information. In the past, the relevant skills were exercised by governments to protect or exploit military and diplomatic information. Nowadays, much of the interest in information protection is by individuals wishing to protect their privacy and by organizations wishing to protect their financial interests. Here are the questions that come up that are worth some thought: - does the breakup of the Soviet Union significantly reduce the exploitation of U.S. Government information? - has the world wide spread of ATMs (Automatic Teller Machines) led to a great deal of electronic theft - and, if so how are they protected? - is cryptography more important than careful handling of information and is cryptanalysis more important than burglary, bribery, and blackmail? Host: Ron Rivest *************************************************** for the DLS season schedule check out http://www.lcs.mit.edu/web_project/dls97.html *************************************************** --- end forwarded text ----------------- Robert Hettinga (rah@shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>