From [email protected] Wed Dec 17 23:17:14 2003
From: whitakerNeternity.demon.co.uk.demon.co.uk ("Russell E. Whitaker")
Date: Mon, 21 Sep 1992 13:24:27 +0000
Extracts below
Thursday 11 March
Digital Telephony and Crypto Policy
Chair - John Podesta, Podesta and Associates
The increasingly digital nature of telecommunications potentially
threatens the ability of law enforcement agencies to intercept them when
legally authorized to do so. In addition, the potential widespread use
of cryptography may render the ability to intercept a communication
moot. This session will examine these issues and the proposals that
have been put before Congress by law enforcement agencies to address
these perceived problems.
PRESIDENT CLINTON HOSTS CYBER SECURITY MEETING
The Cabinet Room, The White House
February 15, 2000
Today, President Clinton will host a meeting with senior White House and Cabinet officials and representatives from the Internet and technology communities. In this meeting, the President will lead a discussion on how the public and private sector can work together to provide a secure and reliable Internet. The President will highlight Administration Internet security initiatives including those in the recent $2 billion FY2001 budget request that will help the National Plan for Information Systems Protection. He will also laud new steps that [illegible] taking to address cyber security issues.
Administration officials attending today's meeting include White House Chief of Staff John Podesta, Commerce Secretary William Daley, Attorney General Janet Reno, OSTP Director Neal Lane, OMB Director Jack Lew and NSC Director Sandy Berger.
Date: Tue, 15 Feb 2000 17:40 -0500
From: The White House Publications-Admin@pub.pub.whitehouse.gov
To: [email protected]
Subject: 2000-02-15 Press Briefing by John Podesta on Cyber Security
THE WHITE HOUSE
Office of the Press Secretary
For Immediate Release February 15, 2000
PRESS BRIEFING BY
CHIEF OF STAFF JOHN PODESTA;
MR. PODESTA: Good afternoon. People can join me if they
want. Let me briefly say that I'm going to try to summarize what
happened at the meeting, but I think it was an excellent discussion
today with the President, members of the Cabinet, leaders of the
Internet and e-commerce companies, civil liberties organizations,
security experts, reformed hackers, some academic people. I know that
many of you have been outside and have heard from people who were inside
the meeting. But let me try to briefly summarize what was said and the
dialogue that took place, and try to put it in some order.
The comments went into the following areas: We need to raise
the level of security practice. I think that many of the people in the
room commented on the fact that many tools were out there to deal with
security threats, but many of the tools were not being used. We need to
be more pro-active. One of the participants said that in much of the
software that's shipped, that the default mechanisms are never switched
on for about a third of the software that's shipped by one of the
venders -- so that we need to be more pro-active in getting the tools
out and getting them in use, to practice better hygiene, as many of the
people commented.
We need to make the government, secondly, a role model. We're
not doing a good enough job in making sure that the government's own
systems are secure. We need to enhance the security on the government
systems, and make sure that they're not broken into, that the firewalls
are in place, and that we're practicing good security procedures.
Much More Here.
https://cryptome.wikileaks.org/cpunks/cpunks-92-98.zip
https://cryptome.wikileaks.org/wh-cybersec.htm
https://cryptome.wikileaks.org/jya/wjc-crypto.htm
https://cryptome.wikileaks.org/2014/03/big-data-spying.htm
Don-Keyhote ago
The efits supposedly came from private investigators hired by the McCanns themselves. Wed need to confirm their dates and source of creation or speculate that British intelligence did the the whole thing. I do agree they were planted by a whistleblower.
flyingcuttlefish ago
and STILL he doesn't know enough not to click a link on spam e-mail ....