1996-09-30 - ADJ_ust

Header Data

From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: a91a7c4fb8d7dc68acd584fce00b0132397a32b25d02f8e7508b1b460f4304d7
Message ID: <199609301350.NAA10824@pipe2.ny1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-09-30 18:07:50 UTC
Raw Date: Tue, 1 Oct 1996 02:07:50 +0800

Raw message

From: jya@pipeline.com (John Young)
Date: Tue, 1 Oct 1996 02:07:50 +0800
To: cypherpunks@toad.com
Subject: ADJ_ust
Message-ID: <199609301350.NAA10824@pipe2.ny1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   9-30-96. NYP: 
 
   "National Security Experts Plan for Wars Whose Targets and 
   Weapons Are All Digital." 
 
      Is the threat real, or is this just another way to win 
      scarce funds? 
 
      Military and intelligence officials believe that enemy 
      nations, terrorists and criminal groups either already 
      have the capability to mount information warfare strikes 
      or soon will. Criminals are quickly progressing beyond 
      the vandalism and petty theft associated with teen-aged 
      hackers and into robbery and extortion schemes ranging 
      up to millions of dollars, corporate executives and 
      private investigators say. 
 
      Others reply that the worst threats mentioned are mostly 
      speculation. "Information warfare is a risk to our 
      nation's economy and defense," said Martin Libicki, a 
      senior fellow at the National Defense University. "But 
      I believe we will find ways to cope with these attacks, 
      adjust and shake them off, just as we do to natural 
      disasters like hurricanes." 
 
   ----- 
 
   http://jya.com/adjust.txt  (14 kb) 
 
   ADJ_ust 
 
 
 





Thread