𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Class project pulls plug on electronic eavesdropping


Publisher
Elsevier Science
Year
1993
Weight
93 KB
Volume
1993
Category
Article
ISSN
0960-2593

No coin nor oath required. For personal study only.

✦ Synopsis


said Colin Crowell, a policy analyst in Markey's office. "As computers and network usage becomes more prevalent, we're seeing explosive growth in computer and telecommunications crimes". However, it is not just hackers who are against measures to restrict the flow of information about viruses. Kim Clancy, manager of security for the US Department of the Treasury's Automated Information System (AIS) bulletin board supported the posting of virus source code, minusthe replication section, on her system. Clancy argues that it is crucial for computer security professionals to have access to virus source code in order to be able combat them successfully: "If BBSes like the Computer Security BBS and the AIS didn't post virus source code or hacking programs, then only the malicious hackers would have access to them", she said. "The legitimate security professionals would be left out in the cold". Ironically, when the AIS BBS was infected with the virus that provoked Markey's wrath, Clancy's hacker contacts helped her clean it up.