Part 141 (1/2)
”It is with these thoughts that those th, but wethat infor Americans, have allowed a coun to see the results of our complacency The veins of the nation, the free flow of inforovernment and the private sector are to blame for our state of disarray and lack of preparedness in dealing with the current crisis We , individually and collective- ly, to admit that we are all at fault, then we must fix the problem, make the sacrifice and then put it behind us
”It is impossible for the Government to deny that we have failed miserably in our information security and privacy implementation
Likewise, the value of the accumulation of information by the private sector was overlooked by everybody Fifteen years ago, who could have possibly i on computers would have jumped more than a hundred thou- sand fold
”Today, the backbone of A, the one man shop, provides more jobs than the Fortune 1000 And, the s Business has for decades His survival, his success is as critical to the stability of the United States'
economy as is a General Motors or an IBM We must defend the small business as surely as we must defend our international competitiveness of industrial leaders
”The wealth of this country was once in steelThe products built by the United States were second to none Made in the USA was a proud label, one that carried a preical leadershi+p has never been in question and has been the envy of the world for over 200 years Franklin, Fulton and Edison The Wright Brothers, Westinghouse, Ford As a nation the Manhattan Project reaffirer and the speed of sound The transistor DNA decoded The microchip The Moon
The co that escaped all but the s, our concentration onto an ey
Coer are cities built around s process Instead, industrial parks sprout in garden-like settings that encourage mental creativity
Fifteen percent of the Aer drive to the office They commute via their computers at hoyourselves Without realizing it, a bulk of this nation's tangible wealth was being moved to the contents of a computer's memory We took those first steps toward computerization hesitantly; we didn't trust the con, alien But e ely entrusted it with out h, with the fence, the gates, the dogs, the alaruards, we left our coer and faster co their contents
”We arned, overnh diligence Protection of government information becaet crunches, was easy to overlook Overclassification of information became the case of the 'The Spy Who Cried Wolf' The classification system has been abused and clearly does not serve us well At h overhaul
”Personal privacy has been ignored Your governe a the non-classified privacy of individuals in our computers
”The private sector faces another dilemma The unresponsiveness of the Federal Government to the protection of its own inforood example for industry, and theircomput- ers, too, re his speech to pour a glass of ice water
”Nothing can stop the fact that the United States is under at- tack Nothing can change the fact that the attack cannot be turned away And nothing can change the fact that Anificant disruptions and inconvenience for soe We can prepare for the inevita- ble obstacles ill face
”The poison that Mr homosoto put into the American inforical warfare He has senselessly and vengefully struck out against the United States in a manner that I describe as an act of war
”In order to deal with this real threat to the security of the United States of Aned to assist in weathering the stor the Director of the National Security Agency to coordinate all efforts at defending against andthe effects of the current crisis The NSA has the expe- rience and resources, and the support of this President to e an operation of this complexity and importance In addition, representatives frodom and other ITSEC members from Germany, France and Holland will coordinate European defensive strategies
”Second, I aroups to assist the NSA in their efforts ECCO, the Ean- ization, has acted as an advisor to law enforceencies across the country and has been instru the technical support to the FBI and the Secret Service in their coency Response Teaency as an outgrowth of the 1988 INTERNET Worie Mellon University where CERT is headquartered has donated the facilities and staff of their Software Engineering Institute to deal with the invasion of our computers
”The Defense Data Network Security Coordination Center was based at the Stanford Research Institute by the Defense Coainst non-classified computer systems
”Lastly, CIAC, the Coes coy at Lawrence Liver- anizations and the people ill guide us through the co adversities It is they who are responsible to insure that Aain finds itself so vulnerable