From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 5e29ca60b738855caf22f0030e1c06d590b8f090f7ed0070abd112f1525b4146
Message ID: <1.5.4.32.19961223201639.0068a180@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-12-23 20:20:36 UTC
Raw Date: Mon, 23 Dec 1996 12:20:36 -0800 (PST)
From: John Young <jya@pipeline.com>
Date: Mon, 23 Dec 1996 12:20:36 -0800 (PST)
To: cypherpunks@toad.com
Subject: Papers Galore
Message-ID: <1.5.4.32.19961223201639.0068a180@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
The NSA-hosted National Information Systems Security
Conference, held in October, 1996, has made a wide
range of papers available (in PDF format), and listed in:
http://csrc.nist.gov/nissc/1996/papers/NISSC/toc.pdf (110kb)
One panel's papers eye all-optical networks and security,
including optical encryption, which NSA appears to be leading:
http://csrc.nist.gov/nissc/1996/papers/NISSC/paper236/
Many others -- long and short, informative and fatuous --
address sizzling and old-grease sec issues -- techie,
lawless, bad-hair-brained.
Several archists cry cyber crime and plead for vigilance
for on-line anarcho-ebonics:
"Industrial Espionage Today and Information Wars Tomorrow."
"Rise of the Mobile State: Organized Crime in the 21st Century."
"Ethical and Responsible Behavior for Children to Senior
Citizens in the Information Age."
"Monitoring Your Employees: How Much Can You Do and What
Should You Do When You Uncover Wrongdoing?"
Despite such blow, there's much other solid reading. Take a nap
while the PDFs glaciate in.
Return to December 1996
Return to “John Young <jya@pipeline.com>”
1996-12-23 (Mon, 23 Dec 1996 12:20:36 -0800 (PST)) - Papers Galore - John Young <jya@pipeline.com>