Security in Cyberspace: Hearings Before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs, United States Senate, One Hundred Fourth Congress, Second Session, May 22, June 5, 25, and July 16, 1996

Front Cover

From inside the book

Other editions - View all

Common terms and phrases

Popular passages

Page 268 - General Terrorism is both a threat to our national security as well as a criminal act The Administration has stated that it is the policy of the United States to use all appropriate means to deter, defeat and respond to all terrorist attacks on our territory and resources, both people and facilities, wherever they occur. In support of these efforts, the United States will: o Employ efforts to deter, preempt, apprehend and prosecute terrorists.
Page 309 - Until their customers demand products that are more secure, the situation is unlikely to change. • Engineering for ease of use is not being matched by engineering for ease of secure administration. Today's software products, workstations, and personal computers bring the power of the computer to increasing numbers of people who use that power to perform their work more efficiently and effectively. Products are so easy to use that people with little technical knowledge or skill can install and operate...
Page 226 - Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy; and (5) the term "Federal agency...
Page 445 - Washington, DC 20301-3140 This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions, conclusions, and recommendations in this report do not necessarily represent the official position of the Department of Defense. This report is UNCLASSIFIED.
Page 155 - Thank you, Mr. Chairman. With your permission, I would like to submit my statement for the record and give you a brief summary.
Page 419 - Inquiry of the Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence, 1 7 Oct.
Page 269 - To deter terrorism, it is necessary to provide a clear public position that our policies will not be affected by terrorist acts and we will vigorously deal with terrorist/sponsors to reduce terrorist capabilities and support.
Page 145 - We have decided to call the entire field of control and communication theory, whether in the machine or in the animal, by the name Cybernetics, which we form from the Greek X'ußepVT'iTTiC or steersman.
Page 187 - The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards. Even then, I wouldn 't stake my life on it.

Bibliographic information