Jim Bell sentenced to 10 years in prison

John Young jya at pipeline.com
Sat Aug 25 17:42:07 PDT 2001


We'll have up this weekend a 180-page report by the Defense
Science Board on "Protecting the Homeland -- Defensive
Information Operations," a study conducted in the summer of
2000, published in March 2001, which describes in detail 
multi-billion dollar proposals for combating threats to the 
US by technologies, if not politics, promoted on this list.

It could hardly be more descriptive of the multi-agency
operations deployed in the Bell, CJ and other cybercrime 
trials and proposes as well what must be done to change 
defense, intelligence, law enforcement and civil liberties 
legislation to assure that defense of the homeland takes 
precedence over long-established rights of the citizenry.

Curiously, the document charges that DoJ and the FBI
are mulishly resisting sharing investigative information
with Defense by citing legal restrictions on allowing
outsider access. (That could be smokescreening.)
The report urges that Defense and Intel be given
ready access to whatever information will assist
their urgent task.

One of the legal advisors to the task force was Stewart
Baker, but there were several dozen industry and governmental
participants.

Here's a policy snippet:

"Following the end of the Cold War, and the subsequent changes 
in the geopolitical climate, the United States now faces a 
different kind of threat. This threat is characterized by the 
ability of numerous potential adversaries to engage in an 
information attack upon the United States, enabled by the 
lower entry costs associated with such an attack. America's 
ability to attribute and respond is woefully inadequate to 
pose a significant deterrent to would be attackers. On 
the other end of the spectrum, early tactical indications 
and warning capabilities are virtually non-existent in 
cyberspace. These factors converge to create a newly 
and differently vulnerable U.S. homeland.

It is the contention of the task force that immediate actions 
can work to decrease the threat and potential damage to 
U.S. national security, including infrastructures, institutions 
and individuals. The United States national security apparatus 
must continue to evolve over time to deal with these emerging 
trans-national threats, including trans-boundary threats where 
the differences between law enforcement and national defense, 
between foreign and domestic, between national and transnational, 
and between government and civilian are increasingly irrelevant."





More information about the cypherpunks-legacy mailing list