1996-08-29 - Re: Thoughts on CyberTerrorism {per request}

Header Data

From: Remo Pini <rp@rpini.com>
To: whgiii@amaranth.com
Message Hash: c0b9f70508f4c0b0f3b1100180a904d437dc9b5df013d28a7b6ab432b5a77aa7
Message ID: <9608291347.AA06964@srzts100.alcatel.ch>
Reply To: N/A
UTC Datetime: 1996-08-29 16:52:04 UTC
Raw Date: Fri, 30 Aug 1996 00:52:04 +0800

Raw message

From: Remo Pini <rp@rpini.com>
Date: Fri, 30 Aug 1996 00:52:04 +0800
To: whgiii@amaranth.com
Subject: Re: Thoughts on CyberTerrorism {per request}
Message-ID: <9608291347.AA06964@srzts100.alcatel.ch>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

To: whgiii@amaranth.com, cypherpunks@toad.com
Date: Thu Aug 29 15:45:06 1996
> The issue of cyberterrorism can be divided into 3 main parts:
> Catastrophic Terrorist Attack
> Major Criminal Attack
> Minor Hacker Attacks
 
> The CyberTerrorist
> The CyberTerrorist/Mad Scientist
> The Computer Criminal
> The Hacker

It seems that you have a very broad view as to what constitutes terrorism. 
According to you, somebody who hacks into a system is a cyberterrorist. It 
seems, that would make a burglar a real life terrorist, too.

So, to state my point: you use the word cyberterrorism in conjunction with 
ALL possible attacks on a system. Did I get that definition right? If not, 
why not?

Greetings,

Remo Pini
- ------< fate favors the prepared mind >------
Remo Pini                        rp@rpini.com
PGP:  http://www.rpini.com/crypto/crypto.html
- ----< words are what reality is made of >----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBMiWe5BFhy5sz+bTpAQGf5gf+L6Mkx4rqvdvsWe84j2TzLYaeOpbO7VCe
S1Ia3EC9rByfXK71zmDCWRd7bTdmRULq297dD/Aqr7KWSEEtsBpQCLs8tGiPCV3I
S+M613ud6Uy9QXtIyw14Ao7XILijWUDU2Hdwb5xfmJ/GIIQiZyDjMVLDXABM7rgb
4d+5AP+gh6VTRNqd2LmhwcvhUoupeJ40QxlRyOJ2A4ZNT7xaS7shUPnbS5kcuSrF
z27nRmnaPkRmh3VD870OIoTRsWUOIQ9lwUkXrPdly9w8E23FyuXGPEMkW+KdUCNZ
6hI7YYsBnCJjM+aUzq3Ypt/N/iUcbPvKO4T+FtbKJHB15IbtDTUr4A==
=pg+4
-----END PGP SIGNATURE-----






Thread