-Caveat Lector-

This article from NYTimes.com
has been sent to you by [EMAIL PROTECTED]



Revamped Proposal Suggests Strategies to Tighten Online Security

September 18, 2002
By JOHN SCHWARTZ






A long-awaited report from the Bush administration intended
to help citizens, businesses and government shore up the
nation's cyberdefenses will be revealed today.

Sort of.

The report, "The National Strategy to Secure Cyberspace,"
was scheduled to be released today with great fanfare at
Stanford University. But officials have decided not to
release the report in final form today in hopes of building
support among high-tech companies that worked to weaken
previous drafts.

Instead, the current document is being referred to as a
draft. It will be subject to a 60-day comment period, after
which it will be revised and submitted to the president for
final approval.

Like many other reports on cybersecurity before it, the new
document describes a society that has grown increasingly
dependent on networked computer systems, and thus
increasingly vulnerable to cyberterrorists, hackers and
destructive computer programs like viruses and worms. Like
those previous reports, it also emphasizes the importance
of education for business, government and consumers. The
report breaks down the cyberspace security challenges faced
by various online populations, including home users and
small businesses as well as industry sectors and nations.

Some of the tougher measures proposed in earlier drafts of
the document included recommendations that Internet service
providers give high-speed customers firewalls and other
tools to defeat hacking and bans on many uses of wireless
networks until the technology is made more secure. The
draft being released today calls for more general proposals
that one security expert dismissed as "pretty-please
recommendations" to improve security awareness.

Richard A. Clarke, the chairman of the president's critical
infrastructure protection board, dismissed assertions that
the report had been softened. "That is a vast
exaggeration," Mr. Clarke said yesterday in a conference
call with reporters.

"The point is not what was in Draft 4 or Draft 8 or Draft
12," Mr. Clarke said. The report, he said, is an effort to
offer guidance without resorting to a greater regulatory
structure, or what he called a "government heavy hand"
approach.

"Everybody has to do his own thing to protect cyberspace,"
he said.

The report has raised fears among civil liberties advocates
that the proposals, in trying to answer many issues, rely
heavily on more surveillance of computer networks - and, by
extension, of those who use them.

"It's hard to find a security approach that will
simultaneously solve the problems of ice storms, software
glitches, Al Qaeda, faulty operating systems and spam,"
said Marc Rotenberg, director of the Electronic Privacy
Information Center in Washington. "But in almost any
scenario, less emphasis should be placed on monitoring and
more on reliability."

Those speaking in favor of the new report said that the
industry welcomed the opportunity to comment on the report,
and that the essence of it is unchanged.

"The basic thrust of the recommendations is still there,"
said Mario Correa, director of Internet and network
security policy for the Business Software Alliance, a
lobbying and policy group in Washington.

A security expert said he was disappointed that the
government was not getting tougher on cyberissues. The
expert, Russ Cooper, whose official title of surgeon
general describes his role in advocating good computer
health and hygiene at the Trusecure Corporation, said the
information he had received about the report was "a lot of
rhetoric, a lot of discussion, a lot of what we've been
doing along - but nothing mandatory about what we needed to
do."

Mr. Clarke said that those expecting a detailed set of
requirements were missing the point. He declined to
estimate the ultimate costs of implementing the proposals,
saying they should not be taken as a set of low-level,
specific requirements.

"It's not a plan," he said, "it's a
strategy."

http://www.nytimes.com/2002/09/18/politics/18CYBE.html?ex=1033398425&ei=1&en=f7c7894474e98621



HOW TO ADVERTISE
---------------------------------
For information on advertising in e-mail newsletters
or other creative advertising opportunities with The
New York Times on the Web, please contact
[EMAIL PROTECTED] or visit our online media
kit at http://www.nytimes.com/adinfo

For general information about NYTimes.com, write to
[EMAIL PROTECTED]

Copyright 2002 The New York Times Company

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance�not soap-boxing�please!  These are
sordid matters and 'conspiracy theory'�with its many half-truths, mis-
directions and outright frauds�is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to