From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 2d33f5f7019ef811298e0eb59d77f3cf6a2f8fbc6ce46a3724043701d51b6292
Message ID: <199407220141.VAA00739@pipe1.pipeline.com>
Reply To: N/A
UTC Datetime: 1994-07-22 01:41:50 UTC
Raw Date: Thu, 21 Jul 94 18:41:50 PDT
From: John Young <jya@pipeline.com>
Date: Thu, 21 Jul 94 18:41:50 PDT
To: cypherpunks@toad.com
Subject: (Fwd) RE: Computer snoopers
Message-ID: <199407220141.VAA00739@pipe1.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Forwarding mail by: DBURK@gmuvax.gmu.edu ("DAN L. BURK") on
Thu, 21 Jul 7:50 PM
-------------------
Yeah, "snooping" indeed! According to Federal Computer Week,
July 11, 1994:
The hacker attacks have reached such a scale over the past
few months
"that on any give day DOD literally does not have control of
five or
six of its computer systems; the hackers do," one former
government
official said.
Bob Brewin & Elizabeth Sikorivsky, "Hackers storm DOD nets,"
Federal Computer Week, July 11, 1994 at 1, col. 3.
Want to play a game?
Dan
dburk@gmuvax.gmu.edu
Return to July 1994
Return to “John Young <jya@pipeline.com>”
1994-07-22 (Thu, 21 Jul 94 18:41:50 PDT) - (Fwd) RE: Computer snoopers - John Young <jya@pipeline.com>