Search Details

Word: code (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

Unseen, unknown, apparently unstoppable, Islamic Jihad may not even exist. It could be merely a cover name for a loose confederation of Muslim Shi'ite fanatics. Or it may be the code name for a carefully coordinated campaign by Iran's Ayatullah Ruhollah Khomeini. The Iranian government has expressed sympathy for the extremists' goals but denies supplying or controlling them. U.S. National Security Adviser Robert McFarlane insists otherwise. Said he last March: "There is sufficient evidence that radical Shi'ite terrorists are responsive to Iranian guidance for us to hold Iran responsible for attacks against U.S. citizens...

Author: /time Magazine | Title: The Roots of Fanaticism | 6/24/1985 | See Source »

...Valley is controlled by Damascus. In a remarkably candid speech last week, Syrian President Hafez Assad conceded that Syria was in contact with extremist groups who are holding seven Americans, four Frenchmen and one Briton, seized over the past 18 months. Assad mildly rebuked the kidnapers for violating a "code of honor between combatants," but praised them for "steadfastness...

Author: /time Magazine | Title: The Roots of Fanaticism | 6/24/1985 | See Source »

Moscow's hunger for high tech has transformed the ancient art of spying. No longer are the Soviets principally interested in the traditional fruits of espionage -- the enemy's order of battle, troop movements and codes -- even though, as the Walker case vividly demonstrates, they would dearly like to know the secrets of U.S. antisubmarine warfare. High tech has both raised the stakes and broadened the game. It has made the Silicon Valley microchips as valuable as NATO war plans, and it has made traitors out of civilian engineers as well as Navy code clerks...

Author: /time Magazine | Title: Moles Who Burrow for Microchips | 6/17/1985 | See Source »

Defense contractors and high-tech firms have been notorious for lax security. At TRW, according to Boyce, "security was a joke." He and his co-workers used the code-destruction blender in TRW's ultrasecret "black vault" for mixing banana daiquiris. The Boyce scandal forced TRW to tighten up, and other firms as well are becoming more careful, contend authorities in Silicon Valley. The military is also lax. Says retired Admiral Clarence Hill: "When I was a sub commander in World War II, we never sent anything over four lines. Everything had to be coded and decoded by hand...

Author: /time Magazine | Title: Why the Ship of State Leaks | 6/17/1985 | See Source »

...goals of the Bell breakup. That was to promote competition in the long- distance field by making it as easy to use new long-distance companies as it is to use AT&T. At present, an AT&T long-distance customer need only dial 1 plus the area code and local number. But in most areas, customers of competing networks must punch in as many as 22 numbers before reaching their party. Even when a connection is made, customers complain of erratic voice quality and noise, brought about sometimes by inferior transmission equipment...

Author: /time Magazine | Title: Jumbled Long-Distance Lines | 6/10/1985 | See Source »

First | Previous | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | Next | Last