Showing 10 of 12 quotes
If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation. ”
With those people, I'm very far apart, because I believe that government access to communications and stored records is valuable when done under tightly controlled conditions which protect legitimate privacy interests. ”
I think most organizations have an interest in key recovery, at least with respect to stored data. ”
Generally I'm against regulation. ”
I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access. ”
While many hackers have the knowledge, skills, and tools to attack computer systems, they generally lack the motivation to cause violence or severe economic or social harm. ”
Systems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons. ”
Cyber terrorism could also become more attractive as the real and virtual worlds become more closely coupled, with automobiles, appliances, and other devices attached to the Internet. ”
We have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders. ”
Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal. ”