Printer Friendly

SABOTAGE, ESPIONAGE, THEFT, COUNTER SURVEILLANCE ... MURDER; NOT A NEW ACTION MOVIE BUT DANA STERN'S FACTUAL BOOK ...

 All About The Dark Side of The World Of Computers
 LOS ANGELES, July 15 /PRNewswire/ -- Welcome to the dark, dangerous


world of ... computers. And Murder. And death threats.
 Your guide is Dana Stern, an author -- "Preventing Computer Fraud" (McGraw-Hill Inc.) -- who takes a decidedly different view of computers and the people who run them.
 Already, Stern's just-published book is getting a reaction from readers. And others.
 Apart from fraud, Stern's book also includes tales of government and industrial sabotage, espionage, theft, whistle-blowing, the CIA'S "black" operations, counter surveillance. And murder.
 And publisher McGraw-Hill reports that Stern received a number of death threats when advance information about the book leaked out. (Stern now owns two bullet-proof vests.)
 "Preventing Computer Fraud" is a book designed as a ready-to-use reference guide designed to help the reader detect and prevent computer fraud. But author Stern has woven into the text true-life tales of software situations that make the book read like an adventure novel, or a script for an all-action Movie of the Week.
 There's the story of "Octopus," for instance -- the CIA "black operation" involving stolen, confidential software sold by the CIA to NATO countries' security agencies, from Britain's MI5 to Israel's Mossad. The idea here, was the planting of bugs in the software to enable the CIA to spy on the spies. There's a mysterious death, called suicide, of writer Joseph Casolaro who was investigating all this. His journals were never found.
 This is the international facet of "Preventing Computer Fraud."
 But Stern also zeroes in on the major impact software theft has on the U.S. economy -- a major U.S. company's $475 million loss is just one example of a crime spree that is going on right now, virtually unchallenged because the laws are new, complicated and all but unenforceable. Computer security often gets overlooked by many companies, allowing for example, certain executives working for a major health care provider to calmly write major disbursements to ... themselves. And, acknowledges Stern, nothing was done. In fact, he says, a group of people make a professional living, moving from company to company, ripping off the computer systems to their own advantage. And nobody, because of embarrassment or ignorance, does anything about it.
 The reality is -- it's a major growth area for the new white collar criminals. Who loses? Stern's answer is simple: "The taxpayer. The general public."
 Stern's book details all this, and much more, from an insider's position. He has a 20-year history in the computer industry, working as consultant for major corporations from AT&T to PacBell, MCI to Bell Laboratories.
 He's written this terse, excitement-filled book -- yes, computers and thrills -- from a sense of frustration. That so much is being gotten away with, by so many, with so few doing anything about it.
 As Stern says throughout his book: "You may be a victim and not know it."
 Reading "Preventing Computer Fraud" -- complete, naturally, with its own computer disk -- will prevent your or your company from becoming a computer casualty. It will also introduce you to Stern, who may have a mind like a computer but also has a sense of drama and adventure about his business.
 -0- 7/15/93
 /EDITOR'S NOTE: Contact Lee Solters Co. about this knowledgeable author ... and for copies of "Preventing Computer Fraud," the book that shows you how businesses lose a fortune in time, data and resources. And how they can protect themselves from this modern-age, techno-fraud./
 /CONTACT: Ian Dove or Erik Stein (LA), 213-651-9300, or Selma Gore (NY), 212-661-5190 or 516-295-1650, all of Lee Solters Co./


CO: McGraw-Hill Inc. ST: California IN: PUB CPR SU: PDT

LM-JL -- LAFNS1 -- 1729 07/15/93 07:35 EDT
COPYRIGHT 1993 PR Newswire Association LLC
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 1993 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:PR Newswire
Article Type:Bibliography
Date:Jul 15, 1993
Words:613
Previous Article:AUTO DEALERS RATE HYUNDAI A LEADER IN INDUSTRY SATISFACTION SURVEY
Next Article:KNOTT'S BERRY FARM TARGETS KIDS AND THEIR PARENTS WITH SUMMER-LONG DINOSAUR FESTIVAL
Topics:


Related Articles
SABOTAGE, ESPIONAGE, COUNTER SURVEILLANCE, THEFT, MURDER
New call for espionage law.
Federal Agent Pleads Guilty to Theft of Government Funds, Reports U.S. Attorney.
Federal Agent Sentenced for Theft of Government Funds, Reports U.S. Attorney.
`GOODFELLAS' SNITCH ARRESTED IN N.J.; EX-MOBSTER WHO TOLD ALL HELD FOR VIOLATING PAROLE.
SPY SHOP REELS IN THE NOSY, THE ANXIOUS, THE 007 FANS.
French government minister gave information to the CIA, claims new book.

Terms of use | Copyright © 2016 Farlex, Inc. | Feedback | For webmasters