From: ezekiel@alpha.c2.org
To: cypherpunks@toad.com
Message Hash: da5b934e80af544d25deb0315e3b6791a32b8c0c38a77384d465c27b9331f33d
Message ID: <199606020532.WAA28053@infinity.c2.org>
Reply To: N/A
UTC Datetime: 1996-06-02 08:39:30 UTC
Raw Date: Sun, 2 Jun 1996 16:39:30 +0800
From: ezekiel@alpha.c2.org
Date: Sun, 2 Jun 1996 16:39:30 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199606020532.WAA28053@infinity.c2.org>
MIME-Version: 1.0
Content-Type: text/plain
winn@Infowar.Com wrote:
>
> The article discussed the advanced information warfare techniques used by the
> perpetrators. "According to the American National Security Agency (NSA), they
> have penetrated computer systems using 'logic bombs' (coded devices that can be
> remotely detonated), electromagnetic pulses and 'high emission radio frequency
> guns' which blow a devastating electronic 'wind' through the computer systems."
> [For a complete description of HERF Guns (coined by Schwartau in 1990), see
> "Information Warfare: Chaos on the Electronic Superhighway," Thunders Mouth
> Press, 1994]
>
Thanks for the info (and for the excellent book, by the way).
Can you explain in little detail what are these logic bombs?
Also, why these institutions do not install protection from HERF radiation
and TEMPEST-type protection from information leaks? Do they think that
paying ransom is cheaper than all investment in IW-protection?
thanx
Return to June 1996
Return to “ezekiel@alpha.c2.org”
1996-06-02 (Sun, 2 Jun 1996 16:39:30 +0800) - No Subject - ezekiel@alpha.c2.org