[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Fwd: *LCS - DLS Lecture - Robert Morris - NSA*]





--- begin forwarded text


Date: Fri, 07 Nov 1997 10:02:04 -0500
From: Richard Lethin <[email protected]>
MIME-Version: 1.0
To: [email protected]
Subject: [Fwd: *LCS - DLS Lecture - Robert Morris - NSA*]
Sender: [email protected]
Precedence: bulk
Reply-To: Richard Lethin <[email protected]>



Return-Path: <[email protected]>
Received: from life.ai.mit.edu (life.ai.mit.edu [128.52.32.80])
	by deer-park.etcons.com (8.8.5/8.8.5) with ESMTP id KAA25929
	for <[email protected]>; Fri, 7 Nov 1997 10:02:22 -0500 (EST)
Received: from LCS.MIT.EDU (mintaka.lcs.mit.edu [18.26.0.36])
	by life.ai.mit.edu (8.8.5/AI1.15/ai.master.life:1.18) with SMTP id
JAA12054;
	Fri, 7 Nov 1997 09:49:00 -0500 (EST)
Received: from hq.lcs.mit.edu by MINTAKA.LCS.MIT.EDU id aa09696;
          7 Nov 97 9:48 EST
Received: from [18.49.0.239] (bronte-mac.lcs.mit.edu) by hq.lcs.mit.edu
(4.1/NSCS-1.0S)
	id AA26971; Fri, 7 Nov 97 09:47:27 EST
Message-Id: <v03020903b088c96cdfa8@[18.49.0.239]>
Mime-Version: 1.0
Content-Type: text/enriched; charset="us-ascii"
Date: Fri, 7 Nov 1997 09:46:20 -0400
To: [email protected], [email protected], [email protected],
        [email protected], [email protected],
        [email protected], [email protected],
        [email protected], [email protected],
        Kenneth_Burrell/CAM/[email protected], [email protected],
        [email protected], [email protected]
From: Barbara Barry <[email protected]>
Subject: *LCS - DLS Lecture - Robert Morris - NSA*

(Please excuse multiple posts)

*SEMINAR ANNOUNCEMENT ******************************

MIT Lab for Computer Science 	Distinguished Lecturer Series

Thursday, November 20, 1997	Lecture, 3:30pm
Location 34-101		Refreshments, 3:15pm
50 Vassar Street, Cambridge


Robert Morris, National Security Agency, Retired

Protection of Valuable Information

Over the past few decades, there has been a considerable shift in the area
of protection and exploitation of valuable information.  In the past, the
relevant skills were exercised by governments to protect or exploit
military and diplomatic information.  Nowadays, much of the interest in
information protection is by individuals wishing to protect their
privacy and by organizations wishing to protect their financial interests.

Here are the that come up that are worth some thought:

- does the breakup of the Soviet Union significantly reduce the
exploitation of U.S. Government information?

- has the world wide spread of ATMs (Automatic Teller Machines)
led to a great deal of electronic theft - and, if so how are they
protected?

- is cryptography more important than careful handling of information
and is cryptanalysis more important than burglary, bribery, and
blackmail?

Host: Michael Dertouzos

***************************************************
for the DLS season schedule check out
http://www.lcs.mit.edu/web_project/dls97.html
***************************************************







--- end forwarded text



-----------------
Robert Hettinga ([email protected]), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>