[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [OT] NSA to spy on rest of government, launch counterattacks at crackers
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: [OT] NSA to spy on rest of government, launch counterattacks at crackers
- From: "F. Fox" <kitsune.or@xxxxxxxxx>
- Date: Mon, 28 Jan 2008 11:46:02 -0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Mon, 28 Jan 2008 14:46:28 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; bh=pLj6BGqxV4yjMuhk5HwzHAT273qA6dFnsUMsn9c4COw=; b=LeIsmRFybwAGXDErouD6cHoKPrKkUcKLDgbqsQ02hLL695VM1mYOKb+s5Bne/O/ThzjIwqQgkuco04iT/4tBLvxiVBxQ4Wv3uzuevtT9N3I863GxRiZIai8NyJhCkVsPxy2a1vsflzFCvj++yaoezenAH6NmqCQC87/aw7FibZM=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; b=Z6XZ1qbLgKnl6kdRs4CiwrLfxrLCw/NOlRLxri5QC64t5Z0HmpIZm61+l6gxizZBKjcxzCug8aZIKGF7QGqi+tvruH9hvaoBZfn927VCtHtXZpcEc9lyCo/wz0OkxQt+VQHILf/ipRs+YkuEplWvnC6fi/0uucxWkwnpnP8GgrM=
- In-reply-to: <200801281036.m0SAaKKT014900@xxxxxxxxxxxxx>
- References: <200801281036.m0SAaKKT014900@xxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Icedove 1.5.0.14pre (X11/20071018)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Scott Bennett wrote:
> Although this is off topic, it is closely related to the interests of
> many on the list:
>
> http://www.theregister.co.uk/2008/01/27/bush_nsa_internal/
(snip)
I don't think I really need to mention how high a degree of f---ed
up-ness this notion presents, given the general mindset of people who
subscribe to this list.
I do find the part about "cyberwar" interesting, though - indeed, what
*would* the rules of such a "conflict" be?
It reminds me of some of the stuff out of the Matrix... hackers casing
damage by manipulating the code of the Matrix, Machines moving in and
out of everything...
It sounds almost as cool, as does scary. =:oD
- --
F. Fox: A+, Network+, Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org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=YT3d
-----END PGP SIGNATURE-----