From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: 55f5a4ba487a6bd4d2f58a33e8b50cfdc57f85b7d748a7aa80fe2d367544091d
Message ID: <199606111358.NAA28670@pipe2.ny3.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-06-11 22:53:01 UTC
Raw Date: Wed, 12 Jun 1996 06:53:01 +0800
From: jya@pipeline.com (John Young)
Date: Wed, 12 Jun 1996 06:53:01 +0800
To: cypherpunks@toad.com
Subject: USS_hit
Message-ID: <199606111358.NAA28670@pipe2.ny3.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
6-11-96. FiTi:
"US squares up to cyberterrorists."
Until recently, the concept of "information warfare" has
been widely dismissed as alarmist rhetoric and viewed as
"post Cold War hysteria" generated by those with an
interest in maintaining the vast US intelligence
apparatus. But the potential use of computer networks to
undermine public confidence, disrupt essential services,
play havoc with the economy or damage military
capabilities is now being taken seriously in Washington.
Encryption may be just one of many battlegrounds --
others include: proposals for mandatory reporting of
corporate computer intrusions and for exceptions to US
laws that prohibit intelligence agencies from snooping
on domestic communications; the forthcoming ruling by US
courts on free speech on the Internet, in response to
laws aimed at stopping distribution of pornographic
material; and possible limits on information that
marketers may gather and use about children who surf the
Internet. Also the Clinton administration is planning a
rapid-response team to take charge in the event of a
cyberterrorist attack.
USS_hit
Return to June 1996
Return to “jya@pipeline.com (John Young)”
1996-06-11 (Wed, 12 Jun 1996 06:53:01 +0800) - USS_hit - jya@pipeline.com (John Young)