From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 3436adb9a78886328b936a364b8b1f8eee85d7902ea15d6d12e60236b16f8868
Message ID: <1.5.4.32.19970907172136.0082a66c@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-09-07 17:44:00 UTC
Raw Date: Mon, 8 Sep 1997 01:44:00 +0800
From: John Young <jya@pipeline.com>
Date: Mon, 8 Sep 1997 01:44:00 +0800
To: cypherpunks@toad.com
Subject: Cybercrime
Message-ID: <1.5.4.32.19970907172136.0082a66c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
The domestic arms control and disarmament agencies are
booming. Here are samples of the tech-law-money-gov-mil
market which are both threatened and job-protected by
strong encryption for communication and secrecy (like the
traditional terrorists of ACDA and closed-session committees
warning of "terrifying" arms going to uncontrollable rogues):
The Department of Justice's Computer Crime and Intellectual
Property Section (CCIPS):
http://jya.com/doj-ccips.htm
The FBI's Awareness of National Security Issues and Response
(ANSIR):
http://jya.com/fbi-ansir.htm
National Counterintelligence Center's 1997 Report on Foreign
Information Collection and Industrial Espionage:
http://jya.com/Na9757_1.htm
The Digital Copyright Clarification Bill (S.1146):
http://jya.com/s1146.txt
Return to September 1997
Return to “John Young <jya@pipeline.com>”
1997-09-07 (Mon, 8 Sep 1997 01:44:00 +0800) - Cybercrime - John Young <jya@pipeline.com>