Part 146 (2/2)

In a several page docuuards is outlined to protect coainst many of the threats they now face In addition, the NSA has asked all long distance carriers to, effective iital coh marks for the NSA in other areas, many of their defensive recommenda- tions have not been so well received

”We are actually receiving roups in finding and eradicating the viruses than from the NSA or ECCO,” said the Arnold Fullerman, Vice President of Computer Services at Prudential

AT&T is also critical of the governives the NSA virtual control over the use of our long distance services Without the ability to transative is” While neither AT&T nor the other long distance carriers indicated they would defy the executive decree, they did say that their attorneys were investigating the legality of the h, was quick to respond to criticis to achieve is a ation of the homosoto Viruses, eliminate fur- ther infection, so we can isolate and immunize as many computers as possible This will be a short terument

AT&T, Northern TelCo additional steps in protecting one of hoes, PBX's, or phone switches

They have all developed additional security reco the circuits without authorization Telephone fraud alone reached an esti that custom- ers whose phones were e co the bills and with lawsuits

The NSA is further recoate the effects of future computer attacks They propose that com- puter security be required by law

”We feel that it would be prudent to ask the private sector to comply with minimum security levels The C2 level is easy to reach, and will deter all but the most dedicated assaults It is our belief that as all cars are manufactured with safety items such as seat belts, all computer should be rity mechanisms in place C2 level will meet 99 of the public's needs” A spokesanizations working with the NSA explained that such security levels available outside of the highest governe froest

It is estimated that compliance with such recommendations will add no more than 50 to the cost of each coanizations that the NSA reco with some vocal opposition:

Companies with more than 6 computers connected in a network or that use remote communications

Coaniza- tions

All Credit Card merchants

Coencies

The entire Federal Governardless of data classification

All publicly funded organizations including schools, universi- ties, museums, libraries, research, trade bureaus etc

Public Access Data Bases and Bulletin Boards

”It is crazy to believe that 45 million computers could comply with a law like that in under 2 years,” said Harry Everett, a Washi+ngton DC based security consultant ”In 1987 Congress passed a law saying that the government had to protect 'sensitive but unclassified data' to a minimum C2 level by 1992 Look where we are now! Not even close, and now they expect to secure 100 times that many in one tenth the time? No way”

Another critic said, ”C2? What a joke Europe is going by ITSEC and they laugh at the Orange Book If you're going to ht”

NSA also had words for those computers which do not fall under the ued to practice safe co

Tuesday, January 26 St Louis, Missouri

”I'm sorry sir, we can't find you in the co wo pass,” he said shoving the small cardboard pass into her face ”And here's a paid for ticket I want to get on ht”

”Sir, there seems to be a complication,” she nervously said as she saw at least another hundred angry people behind the irate customer

”What kind of complication?” he demanded