From: Brad Dolan <bdolan@use.usit.net>
To: John Young <jya@pipeline.com>
Message Hash: aeeb4805ce389f25c59e0ed2bb6c669cf984b1ddeee0851895cfefe83e2e08cb
Message ID: <Pine.SOL.3.91.960106230400.3020I-100000@use.usit.net>
Reply To: <199601070216.VAA02580@pipe1.nyc.pipeline.com>
UTC Datetime: 1996-01-07 04:33:46 UTC
Raw Date: Sun, 7 Jan 1996 12:33:46 +0800
From: Brad Dolan <bdolan@use.usit.net>
Date: Sun, 7 Jan 1996 12:33:46 +0800
To: John Young <jya@pipeline.com>
Subject: Re: please stop the Mitnick stuff
In-Reply-To: <199601070216.VAA02580@pipe1.nyc.pipeline.com>
Message-ID: <Pine.SOL.3.91.960106230400.3020I-100000@use.usit.net>
MIME-Version: 1.0
Content-Type: text/plain
I'm enjoying the story, partly because I took copious abuse from some
CPs for posting - before Mitnick hit the papers - that the Well was under
surveillance. [Crypto relevance of (TLA contract?) surveillance of ISPs
should be obvious.]
Anyway, it's too bad Mitnick didn't read CP.
I'm still angry about the Well's voluntary cooperation in this scam.
Why should I pay money to an outfit that's in bed with the TLAs?
bdolan@use.usit.net, formerly bdolan@well.com
On Sat, 6 Jan 1996, John Young wrote:
> Perry's askance leads me to propose stealing Littman's
> book. It's as techno-thrilling as cypherpunks in describing
> the melodrama of unexpected human/technology malfunctions.
>
> True, only a bit of bare crypto in it, with Kevin advising
> Littman to use PGP so his Well mail could not be read -- as
> Kevin's e-mail to Littman was by Shimomura and Markoff.
> Littman says that was how Markoff learned of Kevin's and
> Littman's exchanges and why Markoff started hustling
> Littman for leads on Kevin to feed the trackers.
>
> Also, crypto-related: The fact that Shimomura's supposedly
> secret files were not protected by encryption or other
> security is what causes Littman and others to think there
> was a sting (perhaps with TLA help) rather than foolish
> vanity of the security wizard.
>
> Best, the book provides Clancy-like fun in deciphering the
> question of why humans abuse technology to mask their
> own frailty.
>
>
>
>
>
>
>
>
>
Return to January 1996
Return to “John Young <jya@pipeline.com>”