From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: c5ecad462437ab35109930b4adaa549c238e69f59af443f6083b288f2d0f367d
Message ID: <199606061713.RAA23573@pipe1.t2.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-06-07 03:51:44 UTC
Raw Date: Fri, 7 Jun 1996 11:51:44 +0800
From: jya@pipeline.com (John Young)
Date: Fri, 7 Jun 1996 11:51:44 +0800
To: cypherpunks@toad.com
Subject: InfoSec Spin
Message-ID: <199606061713.RAA23573@pipe1.t2.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
6-6-96. UST:
"Businesses bypass law to fend off hackers."
In cyberspace, where hackers are finding commercial
computer systems easy prey, businesses are choosing to
hire free-lance security teams rather than involve the
law. A Senate subcommittee heard Wednesday from experts
who described how businesses, concerned over negative
publicity, avoid reporting hacker assaults on their
networked computer system. "You stop the bad guy and
send him to your competitor," said Dan Gelber, the
committee's chief counsel.
Senator Nunn asked the subcommittee staff to comment on
an article in this week's Sunday Times of London that
reported, "Cyberterrorists have amassed up to L400
million worldwide by threatening to wipe out computer
systems" belonging to banks and brokerage houses if they
refuse to pay a ransom. "While we can't confirm the
entire story," said Gelber, "it is extremely consistent
with what industry insiders tell us."
http://pwp.usa.pipeline.com/~jya/fendof.txt
----------
UST had two editorials June 5 on encryption: one
criticizing the administration's position, and another
defending GAK by Sally Katzen with OMB.
http://pwp.usa.pipeline.com/~jya/yeanay.txt
Return to June 1996
Return to ““Perry E. Metzger” <perry@piermont.com>”