Richard Clarke

David Shaw dshaw at jabberwocky.com
Wed Oct 10 09:04:22 EDT 2001


So, according to CNN:

 Richard Clarke, already on the National Security Council as a special
 adviser for cyber security, will take over a new post in charge of
 combating cyber terrorism and protecting essential information
 networks.

I've been rummaging around looking for some statements as to what he
believes.  Some interesting bits follow, both positive and negative.
They're somewhat out of context, so read the originals for the full
story:

 By not preparing for the worst-case scenario, we may be endangering
 the public's civil liberties, according to Clarke, who argued that "a
 lot of people are going to be willing to throw civil liberties out
 the window" in an effort to recover from an attack that cripples
 large portions of the nation's critical infrastructure.

http://www1.cnn.com/2000/TECH/computing/07/03/real.cyberterror.idg/

 (Some history)

http://www.shmoo.com/mail/cypherpunks/feb99/msg00026.html

 For two years or so, this Dr. Strangelove of the Clinton
 administration has rattled his chains and groaned repeatedly about
 e-terror. Oddly, the more Clarke has flailed publicly, calling for
 the gutting of FOIA or the funding of more cybersnooping agencies,
 the less effective he appears to have been. The current
 Republican-dominated Congress has not been overwhelmed by the
 strident hectoring. An even greater paradox is the fact that Clinton
 appointed Clarke, a veteran of the Reagan administration who warned
 of international terror in the mid-80's, to help kill Republican
 accusations that he was weak on Net evil.

http://www.privacyplace.com/viewpoint/smith6.php

 (Clarke himself):
 Through the use of strong encryption and authentication, ideally at
 the packet level, network traffic can be kept private and much more
 secure. Encrypting and authenticating switching protocols and network
 enterprise management systems is also essential.

 [..]

 Participation in a secure zone with dedicated fiber and switches, with
 portal monitoring, strong encryption, and authentication, should be
 voluntary and the zone should be designed, built, and operated largely
 by the private sector.

http://www.microsoft.com/presspass/events/safenet00/12-08clarke.asp

David

-- 
   David Shaw  |  dshaw at jabberwocky.com  |  WWW http://www.jabberwocky.com/
+---------------------------------------------------------------------------+
   "There are two major products that come out of Berkeley: LSD and UNIX.
      We don't believe this to be a coincidence." - Jeremy S. Anderson
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 524 bytes
Desc: not available
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20011010/f57ca6a5/attachment.pgp>


More information about the cryptography mailing list