From: m5@dev.tivoli.com (Mike McNally)
To: perry@imsi.com
Message Hash: a6061f329fa29aeb05cfe40267ba74e964d1c5143dd77a3f5d78557d8572841b
Message ID: <9507121524.AA06294@vail.tivoli.com>
Reply To: <199507121353.JAA23961@pipe1.nyc.pipeline.com>
UTC Datetime: 1995-07-12 15:26:32 UTC
Raw Date: Wed, 12 Jul 95 08:26:32 PDT
From: m5@dev.tivoli.com (Mike McNally)
Date: Wed, 12 Jul 95 08:26:32 PDT
To: perry@imsi.com
Subject: Re: QED_jak
In-Reply-To: <199507121353.JAA23961@pipe1.nyc.pipeline.com>
Message-ID: <9507121524.AA06294@vail.tivoli.com>
MIME-Version: 1.0
Content-Type: text/plain
Could it be that they were using the pads more than once? That's the
simplest flaw I can imagine.
Also:
> > one of its oldest secrets: how a small team of
> > codebreakers found the first clues that the Soviet Union
> > sought to steal the blueprints for the atomic bomb in
> > World War II.
Gee, why did it take a squad of codebreakers to come to the conclusion
that the Soviets sought to steal atomic secrets? I mean, couldn't
they just kinda scratch their heads and decide it was highly unlikely
that the Soviets *wouldn't* do it? And why would they need to "crack"
the code at all? Seems like they could do some controlled information
leaks and then do some traffic flow analysis via whatever known
communications channels operatives were believed to use; all they
needed was grounds for suspicion, after all.
I assume there's a lot about this not revealed yet, or not clear from
the brief synopsis above.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
| Nobody's going to listen to you if you just | Mike McNally (m5@tivoli.com) |
| stand there and flap your arms like a fish. | Tivoli Systems, Austin TX |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Return to July 1995
Return to “Rolf Michelsen <Rolf.Michelsen@delab.sintef.no>”