1995-01-20 - Cone order?

Header Data

From: Brad Dolan <bdolan@well.sf.ca.us>
To: cypherpunks@toad.com
Message Hash: e83b6d208c0e365c396dad23983e6ad370655144707a2642037c0426f0c15085
Message ID: <199501201920.LAA26763@well.sf.ca.us>
Reply To: N/A
UTC Datetime: 1995-01-20 19:20:54 UTC
Raw Date: Fri, 20 Jan 95 11:20:54 PST

Raw message

From: Brad Dolan <bdolan@well.sf.ca.us>
Date: Fri, 20 Jan 95 11:20:54 PST
To: cypherpunks@toad.com
Subject: Cone order?
Message-ID: <199501201920.LAA26763@well.sf.ca.us>
MIME-Version: 1.0
Content-Type: text/plain


Are these two stories related?


Associated Press reports on 1/20/95: 

>Hewlett-Packard Co. has been awarded a $672 million contact to build a 
>computer system linking 20,000 terminals for the military, Sen. Bob Smith 
>announced. 
   
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
It was previously reported:

>From rsalz@osf.org
>Date: Thu, 19 Jan 95 14:25:01 -0500
>From: Rich Salz <rsalz@osf.org>
>To: cypherpunks@toad.com
>Subject: Re: Cone of silence update
>
>---------- Begin Forwarded Message ----------
>Date: Wed, 18 Jan 95 21:03:02 -0500
>From: burton@het.brown.edu (Joshua W. Burton)
>To: silent-tristero@world.std.com
>Subject: Cone of silence update

[...]

>GOVERNMENT'S SECRETS FLOW THROUGH AN INTERNET CLONE
>
>WASHINGTON - When the US intelligence community recently decided to
>modernize the way it communicates, it did what countless other 
>government agencies, businesses and individuals have done over the
>last few years:  it turned to the Internet.
>
>But the regular Internet wouldn't do.  For spies and other government
>officials concerned about secrecy, that very public, very uncontrollable
>global mesh of computer networks was too risky a place to do business.
>
>So the intelligence community created its own Internet.
>
>Dubbed Intelink and based on the same technology used to run and
>navigate the original Internet, this new network for sharing supersecret
>information---including satellite imagery and video footage---officially
>began operating just a few weeks ago.
>
>When the bugs are worked out and a final system is in place, it will 
>allow analysts, policy-makers, military officials and soldiers in the
>field to tap quickly and directly into classified information at the
>Central Intelligence Agency, the National Security Agency, the Pentagon
>and diverse other parts of the national security bureaucracy.

[...]








Thread