1996-06-07 - InfoSec Spin

Header Data

From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: c5ecad462437ab35109930b4adaa549c238e69f59af443f6083b288f2d0f367d
Message ID: <199606061713.RAA23573@pipe1.t2.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-06-07 03:51:44 UTC
Raw Date: Fri, 7 Jun 1996 11:51:44 +0800

Raw message

From: jya@pipeline.com (John Young)
Date: Fri, 7 Jun 1996 11:51:44 +0800
To: cypherpunks@toad.com
Subject: InfoSec Spin
Message-ID: <199606061713.RAA23573@pipe1.t2.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   6-6-96. UST: 
 
   "Businesses bypass law to fend off hackers." 
 
      In cyberspace, where hackers are finding commercial 
      computer systems easy prey, businesses are choosing to 
      hire free-lance security teams rather than involve the 
      law. A Senate subcommittee heard Wednesday from experts 
      who described how businesses, concerned over negative 
      publicity, avoid reporting hacker assaults on their 
      networked computer system. "You stop the bad guy and 
      send him to your competitor," said Dan Gelber, the 
      committee's chief counsel. 
 
      Senator Nunn asked the subcommittee staff to comment on 
      an article in this week's Sunday Times of London that 
      reported, "Cyberterrorists have amassed up to L400 
      million worldwide by threatening to wipe out computer 
      systems" belonging to banks and brokerage houses if they 
      refuse to pay a ransom. "While we can't confirm the 
      entire story," said Gelber, "it is extremely consistent 
      with what industry insiders tell us." 
 
   http://pwp.usa.pipeline.com/~jya/fendof.txt 
 
---------- 
 
   UST had two editorials June 5 on encryption: one 
   criticizing the administration's position, and another 
   defending GAK by Sally Katzen with OMB. 
 
   http://pwp.usa.pipeline.com/~jya/yeanay.txt 
 





Thread