From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: c89d32ed49f2560b2a311251e6d4cc327e6f113bc8a62cef0acb7bb257e154ea
Message ID: <199511241605.LAA19328@pipe3.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1995-11-24 16:14:46 UTC
Raw Date: Sat, 25 Nov 1995 00:14:46 +0800
From: John Young <jya@pipeline.com>
Date: Sat, 25 Nov 1995 00:14:46 +0800
To: cypherpunks@toad.com
Subject: CJR_war
Message-ID: <199511241605.LAA19328@pipe3.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
SciAm, December, 1995:
"Fighting Future Wars. U.S. military planners may be
preparing for the wrong conflict."
Policy experts, technical gurus and defense contractors
have begun to study a range of other potential threats,
from a newly hatched superpower to a regional power with
dramatically altered fighting tactics, to legions of
mercenary hackers that bring down banks and stock
exchanges with computer viruses and other malevolent
software. The vast array of scenarios is a measure of
the speculative turn that has gripped the
military-planning establishment.
Debate on high-tech fighting culminates in the question
of whether information technologies -- a computer virus,
for one -- could make conventional military hardware
obsolete and whether they would make possible a virtual
invasion of the continental U.S. A battle of the bits
would be fought by destroying an enemy's information
assets, its financial, electrical, telecommunications
and air-traffic-control networks. Direct strikes at the
military would not be ruled out: cracking a government
computer is already a not infrequent hacker rite of
passage. In addition, more than 95 percent of military
communications travel over public networks.
CJR_war
Return to November 1995
Return to “John Young <jya@pipeline.com>”
1995-11-24 (Sat, 25 Nov 1995 00:14:46 +0800) - CJR_war - John Young <jya@pipeline.com>