Feeds

Clinton's Big Plan against cyberterror

Gigolo-in-chief seeks 'serious money' from Congress

  • alert
  • submit to reddit

New hybrid storage solutions

US President Bill Clinton yesterday vowed to seek US $91 million from Congress to develop new tricks and tips to identify and defeat cyberterrorists bent on bringing civilisation to its knees.

Clinton said that "there has never been a time like this, in which we have the power to create knowledge and the power to create havoc, and both those powers rest in the same hands."

Pointing out that US "critical systems, from power structures to air traffic control, are connected and run by computers," the president urged all good Americans to "make those systems more secure so that America can be more secure." Clinton's new $91 million cyberterror initiative is part of a larger, $2 billion package for improving the security of America's information infrastructure.

The Clinton Administration has lately been much worried about information warfare and terrorism, as the country's current and quite phenomenal economic boom is widely attributed, whether rightly or not, to its increasing exploitation of information technology.

Clinton's proposal also includes a programme of university scholarships for students involved in computer security, provided they agree to perform some manner of public service after graduation. "This programme will create a new generation of computer security specialists who will work to defend our nation's computers," the President chirped.

Last July, the administration announced controversial plans to create a security network called FIDNET to protect government networks against cyber-terrorists and malicious hackers, to be administered by the US General Accounting Office (GAO). The GAO has reported that it believes government and commercial networks to be at high risk for a crippling attack, and concluded that the federal government is doing too little to prevent it.

But now that Y2K has come and gone without a fraction of the mayhem predicted by the US government, the GAO is starting to sound a bit like Chicken Little. No matter, the Yanks can easily afford to be over-cautious. And perhaps with an economy so dependent on IT as theirs, they can't afford not to be. ®

The next step in data security

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.