From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 2ca30295f5bf7975a1f8d6d2f0557a48bab3870c2914777766cdb4dcdd16bfb7
Message ID: <199603131716.MAA20090@pipe3.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-03-16 11:44:06 UTC
Raw Date: Sat, 16 Mar 1996 19:44:06 +0800
From: John Young <jya@pipeline.com>
Date: Sat, 16 Mar 1996 19:44:06 +0800
To: cypherpunks@toad.com
Subject: BES_ieg
Message-ID: <199603131716.MAA20090@pipe3.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Architectural Record reports in the March issue on
"Building Security: Coping With Threats From Bombs to
Break-Ins."
It shows the parallels of designing to protect vulnerable
buildings and the hapless computer systems inside them.
It reviews current approaches for "crime prevention through
environmental design (CPTED)." And offers a cypherpunkish
outlaw-and-disorder survey of besieged corporatism:
For Which of the Following Does Your Organization Have
Response Plans?
Employee theft 90%
Bomb threats 85%
Fraud 80%
Employees bringing weapons to work 79%
Fights among employees 76%
Robberies 75%
Threatening phone calls 72%
Verbal threats from employees 69%
Employee sabotage 65%
Murder threats 60%
Civil unrest 53%
BES_ieg
Return to March 1996
Return to “John Young <jya@pipeline.com>”
1996-03-16 (Sat, 16 Mar 1996 19:44:06 +0800) - BES_ieg - John Young <jya@pipeline.com>