Search Details

Word: eavesdropping (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...these little moments of connection, Telling Nicholas can be cathartic and even funny, but it is not easy to watch. When Robert finally breaks the news, the moment is raw, discomfitingly private yet strangely mediated: we eavesdrop from the vantage point of the therapist, brought in to coach Robert, who is listening Cyrano-like over headphones on the front lawn of the Lanza house. Nicholas is overwhelmed by tears and confusion--he wants his mom back, he wants a new mom, he wants to go to the local dollar store, he wants to pray, he's afraid of dying...

Author: /time Magazine | Title: Television: Truth And Its Consequences | 5/13/2002 | See Source »

Hardest to defend is Bush's recent regulation allowing federal agents to eavesdrop on certain lawyer-client conversations. The regulation covers citizens as well as aliens, encompassing people not even charged with crimes, much less convicted. Bush would eavesdrop unilaterally, without any O.K. from a judge. Nothing in Congress's recent antiterrorism legislation authorizes this unprecedented regulation; indeed, leading lawmakers were not even consulted. The Executive unilateralism here recalls Harry Truman's seizure of steel mills in 1952 to guarantee supplies for the Korean War. In a landmark decision, the Supreme Court ruled against Truman because Congress had pointedly declined...

Author: /time Magazine | Title: War Powers: Is Bush Making History? | 12/3/2001 | See Source »

Teenager Aimee Deep was worried. At 13, she'd joined the hordes of her peers chatting with her pals on AOL's Instant Messenger. But she was also smart enough to know how insecure the network was; wily hackers could easily eavesdrop. Couldn't her dad, a technology consultant, do something? What Johnny Deep did back in 1998 was build her a piece of code that made Messenger secure. Last year, he added an extra layer on which CD tracks could be traded in complete privacy and then propagated the whole program on the Web. The next phase...

Author: /time Magazine | Title: Music: Going Deep After Napster | 5/28/2001 | See Source »

Rabin said people often eavesdrop on conversations and capture and store the coded messages. They then read the messages once they have perfected their code-breaking methods--a technique that Rabin's system would thwart...

Author: By Sumi A. Kim, CONTRIBUTING WRITER | Title: Unbreakable Code Discovered | 2/21/2001 | See Source »

Robert Morris, a retired cryptographer who was chief scientist for the National Security Agency, said although Rabin's method does make code-breaking more difficult, code-breakers will simply find another way to eavesdrop on the message...

Author: By Sumi A. Kim, CONTRIBUTING WRITER | Title: Unbreakable Code Discovered | 2/21/2001 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | Next