Search Details

Word: ganaghan (lookup in dictionary) (lookup stats)
Dates: during 1984-1984
Sort By: most recent first (reverse)


Usage:

...nothing is perfect. "If people try hard enough and long enough and are cunning enough they can penetrate almost anything," Ganaghan says. Further, even the most effective security system is helpless against an inside attack--the kind of computer crime security consultants say is most frequently practiced. "Insider crime, people stealing data or money using information they've gotten during the course of the day, is definitely our biggest problem," says Jim Greenleaf a computer crime specialist at FBI headquarters in Boston...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

...kind of criminal activity, computer users and manufacturers are pushing for touch new laws against "illegal entry," and "illegal manipulation of data." "To a great extent, if there are laws that have teeth in them, they can discourage a lot of the [criminal] actions we're talking about," says Ganaghan Prime and other Massachusetts high technology companies have been working with the Lioutenant Governor's Office for the past year deafting what many consultants call model computer crime legislation. Under the proposed law unauthorized users of computer systems would be viewed as electronic trespassers and suffer stiff penalties for violating...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

...Typically a U.S. manufacturer will be approached by an exporter who claims to be shipping the product to West Germany, say. They sell the material to another exporter--perhaps it goes to Sweden instead--and they send it to the Soviet Union," explains Prime's Ganaghan. It was this kind of smuggling ring that made headlines earlier this fall when Swedish and U.S. Customs intercepted a shipment of Digital VAX computers bound originally for West Germany but headed instead to a destination in the Soviet Bloc. VAX computers have potential military applications, according to the Defense Department. As a result...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

...suspension has prompted manufacturers to take a close look at their own responsibilities. While businesses might previously have looked the other way to turn a quick sale with unauthorized export firms, they now reject those offers out of hand. "We simply don't do business with those companies," says Ganaghan. We just comply with the law and maintain a very low profile says Michael Ferrante, a Corporate Public Relations Specialist with Wang Computers. The nature of corporate Public Relations Specialist with Wang Computers. The nature of corporate compliance is clearly defined by the government: computer companies must first obtain sufficient...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

| 1 |