Class project pulls plug on electronic eavesdropping
- Publisher
- Elsevier Science
- Year
- 1993
- Weight
- 93 KB
- Volume
- 1993
- Category
- Article
- ISSN
- 0960-2593
No coin nor oath required. For personal study only.
✦ Synopsis
said Colin Crowell, a policy analyst in Markey's office. "As computers and network usage becomes more prevalent, we're seeing explosive growth in computer and telecommunications crimes". However, it is not just hackers who are against measures to restrict the flow of information about viruses. Kim Clancy, manager of security for the US Department of the Treasury's Automated Information System (AIS) bulletin board supported the posting of virus source code, minusthe replication section, on her system. Clancy argues that it is crucial for computer security professionals to have access to virus source code in order to be able combat them successfully: "If BBSes like the Computer Security BBS and the AIS didn't post virus source code or hacking programs, then only the malicious hackers would have access to them", she said. "The legitimate security professionals would be left out in the cold". Ironically, when the AIS BBS was infected with the virus that provoked Markey's wrath, Clancy's hacker contacts helped her clean it up.