|
This file is available on a Cryptome DVD offered by Cryptome. Donate $25 for a DVD of the Cryptome 10-year archives of 35,000 files from June 1996 to June 2006 (~3.5 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, cryptome2.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost. |
7 November 1997
Source: Mail list cypherpunks@cyberpass.net
Thanks to RH, RL and BB
Date: Fri, 7 Nov 1997 10:37:24 -0500 From: Robert Hettinga <rah@shipwright.com> Date: Fri, 07 Nov 1997 10:02:04 -0500 From: Richard Lethin <lethin@etcons.com> Date: Fri, 7 Nov 1997 09:46:20 -0400 From: Barbara Barry <bbarry@hq.lcs.mit.edu> Subject: *LCS - DLS Lecture - Robert Morris - NSA* (Please excuse multiple posts) *SEMINAR ANNOUNCEMENT ****************************** MIT Lab for Computer Science Distinguished Lecturer Series Thursday, November 20, 1997 Lecture, 3:30pm Location 34-101 Refreshments, 3:15pm 50 Vassar Street, Cambridge Robert Morris, National Security Agency, Retired Protection of Valuable Information Over the past few decades, there has been a considerable shift in the area of protection and exploitation of valuable information. In the past, the relevant skills were exercised by governments to protect or exploit military and diplomatic information. Nowadays, much of the interest in information protection is by individuals wishing to protect their privacy and by organizations wishing to protect their financial interests. Here are the that come up that are worth some thought: - does the breakup of the Soviet Union significantly reduce the exploitation of U.S. Government information? - has the world wide spread of ATMs (Automatic Teller Machines) led to a great deal of electronic theft - and, if so how are they protected? - is cryptography more important than careful handling of information and is cryptanalysis more important than burglary, bribery, and blackmail? Host: Michael Dertouzos *************************************************** for the DLS season schedule check out http://www.lcs.mit.edu/web_project/dls97.html ***************************************************