A Quote by Barack Obama

If, technologically, it is possible to make an impenetrable device or system where the encryption is so strong that there's no key - there's no door at all - then how do we apprehend the child pornographer? How do we solve or disrupt a terrorist plot?
Coalition [against ISIS] need the tools. And the tools involve encryption where we cannot hear what they're even planning. And when we see red flags, a father, a mother, a neighbor who says we have got a problem here, then we have to give law enforcement the ability to listen so they can disrupt these terrorist attacks before they occur.
The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme.
Then, I realized that there is an indigenous presence in the Solar System. It's us. So, then, I got to wondering what would happen if a more technologically advanced society moved next door to us, the way we moved next door to the American Indians.
If the CIA is going to disrupt future terrorist attacks, it needs to recruit spies to infiltrate those groups in order to disrupt the terrorist attacks. Not to rely on what you and I are putting in chat messages on Google or Apple.
I do not - I never believed it's better to kill a terrorist than to detain him. We want to detain as many terrorists as possible so we can elicit the intelligence from them in the appropriate manner so that we can disrupt follow-on terrorist attacks.
No matter how many plots we uncover and disrupt, no matter how many terrorist organizations we degrade or destroy, another individual or group will rise to take their place.
In oneself lies the whole world and if you know how to look and learn, the door is there and the key is in your hand. Nobody on earth can give you either the key or the door to open, except yourself.
A two-hour movie tends to be a plot-delivery device; you tend to have to introduce all the characters, say what the goal is, and then get there with a setback, but that's not really how life is or what a story necessarily wants to be.
I don't want to disrupt anything. We never conceive of our products as disruptive - we don't look at something and say, 'Let's disrupt that.' It's always about how we can evolve this and make this better.
I think of a plot, I think of an idea, and then I wonder, How can I get that onto the stage? . . . Whatever devices you use should always be there to serve the theme. If the theme has been overtaken by the device, then something's wrong.
This is what love does: It makes you want to rewrite the world. It makes you want to choose the characters, build the scenery, guide the plot. The person you love sits across from you, and you want to do everything in your power to make it possible, endlessly possible. And when it’s just the two of you, alone in a room, you can pretend that this is how it is, this is how it will be.
These days, the FBIS service regularly includes translations from many terrorist or terrorist-linked websites and chat forums. They provide an unprecedented inside look at how modern terrorist groups function and operate. They also offer a possible chain of evidence that, if properly investigated, can lead back to important transnational terrorist operatives. In other words, don't shut the websites down, but rather use them as a means to shut the terrorist organization down instead.
As far as Paris goes, we don't know for sure yet how these guys communicate among themselves and how they communicated back to the ISIS leadership in Iraq and Syria, but I'm fairly confident we're going to learn they used these encrypted communication applications that have commercial encryption and are extremely difficult for companies to break - and which the companies have made the decision not to produce a key for.
I don't own encryption, Apple doesn't own encryption. Encryption, as you know, is everywhere. In fact some of encryption is funded by our government.
...I am an anomaly in the system, living proof of how grotesque it is, and every day I mock it gently, deep within my impenetrable self.
How hard is it to build an intelligent machine? I don't think it's so hard, but that's my opinion, and I've written two books on how I think one should do it. The basic idea I promote is that you mustn't look for a magic bullet. You mustn't look for one wonderful way to solve all problems. Instead you want to look for 20 or 30 ways to solve different kinds of problems. And to build some kind of higher administrative device that figures out what kind of problem you have and what method to use.
This site uses cookies to ensure you get the best experience. More info...
Got it!