Date: Wed, 10 Oct 2001 12:00:13 -0400 To: Matthew Gaylor <freematt@coil.com> From: Matthew Gaylor <freematt@coil.com> Subject: Richard Clarke Cyber Terrorism Head Content-Type: text/plain; charset="us-ascii" ; format="flowed"Date: Wed, 10 Oct 2001 09:01:55 -0400 From: David Shaw <dshaw@jabberwocky.com> To: apis@vees.net Subject: [APIS] Richard Clarke User-Agent: Mutt/1.2.5i X-PGP-Key: 2048R/3CB3B415/4D 96 83 18 2B AF BE 45 D0 07 C4 07 51 37 B3 18 X-URL: http://www.jabberwocky.com/
So, according to CNN:
Richard Clarke, already on the National Security Council as a special adviser for cyber security, will take over a new post in charge of combating cyber terrorism and protecting essential information networks.
I've been rummaging around looking for some statements as to what he believes. Some interesting bits follow, both positive and negative. They're somewhat out of context, so read the originals for the full story:
By not preparing for the worst-case scenario, we may be endangering the public's civil liberties, according to Clarke, who argued that "a lot of people are going to be willing to throw civil liberties out the window" in an effort to recover from an attack that cripples large portions of the nation's critical infrastructure.
http://www1.cnn.com/2000/TECH/computing/07/03/real.cyberterror.idg/
(Some history)
http://www.shmoo.com/mail/cypherpunks/feb99/msg00026.html
For two years or so, this Dr. Strangelove of the Clinton administration has rattled his chains and groaned repeatedly about e-terror. Oddly, the more Clarke has flailed publicly, calling for the gutting of FOIA or the funding of more cybersnooping agencies, the less effective he appears to have been. The current Republican-dominated Congress has not been overwhelmed by the strident hectoring. An even greater paradox is the fact that Clinton appointed Clarke, a veteran of the Reagan administration who warned of international terror in the mid-80's, to help kill Republican accusations that he was weak on Net evil.
http://www.privacyplace.com/viewpoint/smith6.php
(Clarke himself): Through the use of strong encryption and authentication, ideally at the packet level, network traffic can be kept private and much more secure. Encrypting and authenticating switching protocols and network enterprise management systems is also essential.
[..]
Participation in a secure zone with dedicated fiber and switches, with portal monitoring, strong encryption, and authentication, should be voluntary and the zone should be designed, built, and operated largely by the private sector.
http://www.microsoft.com/presspass/events/safenet00/12-08clarke.asp
David
-- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson
Subscribe to Freematt's Alerts: Pro-Individual Rights Issues Send a blank message to: freematt@coil.com with the words subscribe FA on the subject line. List is private and moderated (7-30 messages per week) Matthew Gaylor, (614) 313-5722 ICQ: 106212065 Archived at http://groups.yahoo.com/group/fa/