1998-12-22 - Trust in Cyberspace

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@EINSTEIN.ssz.com
Message Hash: 29ae060e990a64c7e5bc8b349df6c33f5b9417a695d5caa2ad63d78967e3db21
Message ID: <199812221816.NAA22485@smtp0.mindspring.com>
Reply To: N/A
UTC Datetime: 1998-12-22 18:44:24 UTC
Raw Date: Wed, 23 Dec 1998 02:44:24 +0800

Raw message

From: John Young <jya@pipeline.com>
Date: Wed, 23 Dec 1998 02:44:24 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Trust in Cyberspace
Message-ID: <199812221816.NAA22485@smtp0.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We offer the National Academy of Sciences September
1998 report, "Trust in Cyberspace," a 243-page survey
of all security issues and technologies associated with the 
Internet and computer networks:

   http://jya.com/tic-intro.htm  (Introduction only, 58K)

   http://jya.com/tic.htm  (Full report, 882K)

   http://jya.com/tic.zip  (Full report zipped, 302K)

The report reviews prior studies such as the CRISIS report
on cryptography, the PCCIP report on protecting US
infrastructure, the DoD report on Information Warfare -
Defense, and several others, assesses those findings
in greater depth, looks at technology and research
needed, and recommends what government (NSA and
DARPA) and private industry/eduation should do to
assure security.

NSA is upbraided for its opposition to strong cryptography 
and culture of overcontrolling secrecy. NSA's R2 research 
unit is singled out as needing to find ways to compete with 
industry for the best talent so that the agency's skills and 
tools do not lag the world market.







Thread