Threat posed by hackers largely imaginary

Steinberg, Steve G.
July 1996
Inside Tucson Business;7/29/96, Vol. 6 Issue 18, p13
Comments on the perceived and actual risk posed by hackers. Use of hackers as a bogeyman to justify the `Manhattan Project'; Cyber threats cited by US Deputy Attorney General Jamie Gorelick at a government conference on `National Security in the Information Age'; Absolute security as outrageous.


Related Articles

  • Cyber threats: How serious? Van Slambrouck, Paul // Christian Science Monitor;3/9/98, Vol. 90 Issue 70, p1 

    Discusses the vulnerability of the flow of information in the United States in 1998. The increased reliance on computers and the Internet, which has opened up new vulnerabilities; The highly publicized breach at the Pentagon; How computer breaches can be used for terrorism; The Presidential...

  • Who can stop cybervandals? Koerner, Brendan I.; Glasser, Jeff // U.S. News & World Report;02/28/2000, Vol. 128 Issue 8, p54 

    Reports on efforts by the United States government to tighten Internet security to prevent computer hackers from breaking into web sites. Response to early February attacks which temporarily disabled several high-profile electronic commerce sites, such as Yahoo! and eBay; Estimated amount that...

  • SEC Indicts Hackers, Traders. Investor's Business Daily // Investors Business Daily;8/12/2015, pA01 

    5 The regulator indicted 2 Ukrainian hackers and several U.S. securities traders for allegedly netting $30 mil in illegal profits by hacking press announcements and then trading on the information before it became public. The SEC filed a separate lawsuit alleging that more defendants obtained...

  • Security funds close to being slashed. English, Erin // Australian Personal Computer;Jun95, Vol. 16 Issue 6, p20 

    Reports on the US Congress' plan to reduce funding for computer security research and development programs. Security research cuts' impact on advances in electronic commerce and the United States' success in the world market; Budget cuts in the area of cryptography and encryption.

  • Hackers of the world, unite! Schwartz, J. // Newsweek;7/2/1990, Vol. 116 Issue 1, p36 

    Reports on the government crackdown on computer tampering and the announcement due next week of a new foundation intended to combat computer phobia and provide legal aid from some people snared in the `hacker dragnet.' Investigation is out of proportion; Mitch Kapor, founder of Lotus...

  • Security termed critical component of upcoming digital revolution. McGuire, Mike // PC Week;7/19/93, Vol. 10 Issue 28, p135 

    Reports on the warning issued by a group of industry executives participating in a panel on security and copyright protection at Seybold Digital World Conference. Protection of intellectual property against pranksters and computer criminals; RSA Data Security Inc.'s encryption technology;...

  • Norm Proselytizers Create a Privacy Entitlement In Cyberspace. Hetcher, Steven A. // Berkeley Technology Law Journal;Summer2001 Supplement 1, Vol. 16, p877 

    Explores an important development in the informal regulation of online privacy. Significance of privacy norm proselytizers; Examination on the non-moral social meaning of the personal data collection practices; Emphasis on the support of other norm entrepreneurs.

  • Getting cybersecurity right. Johnson, Ron // Hill;3/27/2012, Vol. 19 Issue 39, p20 

    The article offers the author's insights regarding the move of the U.S. government to address the threat of cyberterrorism in the country's computer system through supporting proposals in U.S. Congress which allow the federal government to mandate regulations to the private sectors.

  • Computers and privacy: call for independent protection body.  // Accountancy;Nov77, Vol. 88 Issue 1011, p20 

    Reports on the joint statement issued by The British Computer Society, The Computing Services Association and The Data Processing Management Association on the establishment of a licensing body. Section of the government to counter the improper use personal data by computer users; Legal...


Read the Article

Other Topics