From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: a91a7c4fb8d7dc68acd584fce00b0132397a32b25d02f8e7508b1b460f4304d7
Message ID: <199609301350.NAA10824@pipe2.ny1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-09-30 18:07:50 UTC
Raw Date: Tue, 1 Oct 1996 02:07:50 +0800
From: jya@pipeline.com (John Young)
Date: Tue, 1 Oct 1996 02:07:50 +0800
To: cypherpunks@toad.com
Subject: ADJ_ust
Message-ID: <199609301350.NAA10824@pipe2.ny1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
9-30-96. NYP:
"National Security Experts Plan for Wars Whose Targets and
Weapons Are All Digital."
Is the threat real, or is this just another way to win
scarce funds?
Military and intelligence officials believe that enemy
nations, terrorists and criminal groups either already
have the capability to mount information warfare strikes
or soon will. Criminals are quickly progressing beyond
the vandalism and petty theft associated with teen-aged
hackers and into robbery and extortion schemes ranging
up to millions of dollars, corporate executives and
private investigators say.
Others reply that the worst threats mentioned are mostly
speculation. "Information warfare is a risk to our
nation's economy and defense," said Martin Libicki, a
senior fellow at the National Defense University. "But
I believe we will find ways to cope with these attacks,
adjust and shake them off, just as we do to natural
disasters like hurricanes."
-----
http://jya.com/adjust.txt (14 kb)
ADJ_ust
Return to October 1996
Return to ““Timothy C. May” <tcmay@got.net>”