Time: Fri Oct 10 06:23:47 1997
	by primenet.com (8.8.5/8.8.5) with ESMTP id GAA27674;
	Fri, 10 Oct 1997 06:23:56 -0700 (MST)
	by usr02.primenet.com (8.8.5/8.8.5) with SMTP id GAA14785;
	Fri, 10 Oct 1997 06:23:40 -0700 (MST)
Date: Fri, 10 Oct 1997 06:22:56 -0700
To: Dan S <dan@southeast.net>
From: Paul Andrew Mitchell [address in tool bar]
Subject: SLS: Clinton to get "Cyberterror" plan
Cc: owner-ignition-point@majordomo.pobox.com

This is another classic case of the pot calling the kettle black.
The feds are telling us what THEY are doing, when they accuse
Us of criminal conduct.  Case in point:  the PROMIS software, 
stolen from the Inslaw Corporation.  This sophisticated software
has been carefully and systematically enhanced to operate 
over the Internet, in order to aid and abet DOJ's nationwide
property conversion racket, which is underway as I write this,
using electronic dossiers to target and attack large asset groups,
like entire sub-markets of real estate in Southern California.

Cyber terrorism, anybody?

/s/ Paul Mitchell

copy:  Supreme Law School

At 08:56 AM 10/10/97 -0400, you wrote:
>Now we are going to have background checks for "computer experts" !
>from http://www.usatoday.com:80/life/cyber/tech/ctb405.htm
>Clinton to get cyberterror plan
>USA TODAY 10/09/97 10:14 AM ET
>Threats of cyberspace sabotage are so urgent that a presidential
>commission will propose a range of public and private initiatives to
>stop computer terrorists from damaging the nation's infrastructure.
>The commission's final report, 15 months in the making, will be
>delivered to President Clinton Monday. Its recommendations are designed
>to protect everything from banks to the power grid.
>Among the proposals:
>Establishing an Information Analysis and Warning Center to collect
>incidents of computer security breaches in industry and government.
>Introducing legislation to permit private companies to conduct
>background checks in states where they're barred when hiring computer
>experts for sensitive positions.
>Creating a White House office to coordinate the security roles of
>government - including the departments of Commerce, Defense, Energy,
>Justice, Treasury and Transportation. The office also would promote
>initiatives from a council of corporate CEOs and Cabinet members.
>Quadrupling research on cyberspace security to $1 billion a year by
>"The capability for harm is real and widespread," says Thomas Marsh,
>chairman of the President's Commission on Critical Infrastructure
>Protection. "Vulnerability is serious and increasing."
>The commission recommendations, which require presidential or
>congressional action, are designed to be implemented over three to five
>The commission members from government and industry set out to develop a
>strategy to thwart hacker-style attacks on computer systems controlling
>vital elements of society, 95% of which are privately owned.
>Those include: banking and financial services, telecommunications,
>electric power, oil and gas delivery, transportation, water, emergency
>services and government services.
>"The only issue of equal or greater concern is nuclear, chemical or
>biological proliferation," says former senator Sam Nunn of the
>commission's civilian oversight board.
>The commission's greatest challenge remains the willingness of private
>industry to divulge security breaches. They could prove embarrassing or
>compromising but might also indicate a terrorist attack.
>To do that, the commission calls for legislation to classify any
>security information provided by industry. Also, it proposes that
>industry have access to previously classified government security
>Industry has long-standing concerns about giving security information to
>"This cannot be another big government effort," says Marsh. "We must ...
>create a trusting environment between the public and private sectors."
>By M.J. Zuckerman, USA TODAY
>To subscribe or unsubscribe, email:
>     majordomo@majordomo.pobox.com
>with the message:
>     subscribe ignition-point email@address
>     unsubscribe ignition-point email@address


Return to Table of Contents for

Supreme Law School:   E-mail