Search /
Advanced search  |  Help  |  Site map
Click for Layer 8! No, really, click NOW!
Networking for Small Business
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested

User manual: Dodging the rules

Today's breaking news
Send to a friendFeedback

The National Security Agency (NSA) wrote the export rules on encryption. But from the point of view of corporations that want to ship U.S. software to their foreign offices, getting around the U.S. export rules is a top priority.

And even for those who used to work at the NSA, it's still a challenge.

"Well, I wrote those export rules when I was at the NSA," confessed Russell Davis, now chief of information technology security at SBC Warburg Dillon Read, a division of Swiss Bank Corp., which operates in 77 countries. Since joining the corporate life, Davis has used his knowledge of the NSA to find ways to work around the export system on behalf of his customer, the bank, which uses a lot of encryption-based security gear.

"It took 17 months to figure out how to get crypto-based smart cards to Swiss facilities and elsewhere," Davis said. "But I wrote the rules on all this, and I know how to get around them." Would he ever consider using government-approved data-recovery?

"Never," Davis declared. "My customers come first!"

"Our customers just aren't going to buy these types of products," said Tom Carty, vice president of business development for GTE CyberTrust. He agreed the government is leading industry down a path to build products few users will willingly buy.


Apply for your free subscription to Network World. Click here. Or get Network World delivered in PDF each week.

Get Copyright Clearance
Request a reprint or permission to use this article.

NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.