From: “Barry C. Collin” <isi@hooked.net>
To: whgiii@amaranth.com
Message Hash: e52818205ddd87f0335fa3da9ecd3c23957bd4de9aed9aff07b7d7e672edd3eb
Message ID: <3225F0D7.3337@hooked.net>
Reply To: N/A
UTC Datetime: 1996-08-29 22:41:52 UTC
Raw Date: Fri, 30 Aug 1996 06:41:52 +0800
From: "Barry C. Collin" <isi@hooked.net>
Date: Fri, 30 Aug 1996 06:41:52 +0800
To: whgiii@amaranth.com
Subject: CyberTerrorism Thoughts
Message-ID: <3225F0D7.3337@hooked.net>
MIME-Version: 1.0
Content-Type: text/plain
Dear Mr. Geiger:
Thank you for your very well-thought-out presentation. That is
precisely the kind of material we need to see more of in this forum.
It's tough to write, but it's worth it.
>From the feedback I've received, I should make this clear: regardless of
criminality issues, I do not consider hacking in to a system to view
things an act of terrorism (by classical or other definition). My
concern, by far, is the fragility I've found with systems connected to
physical processes -- processes that affect the physical world.
Your segmentation of motivation and actions was excellent. I look
forward to your future commentary and postings.
Also, although it is sometimes difficult (myself no exception), I think
you'd agree that this factual, non-flame approach gets far more work
done. Your response in that manner was appreciated.
Regards,
Barry C. Collin
--
Institute for Security and Intelligence
A Non-Profit Research Institution
P.O. Box 9877
Stanford, California 94309-9877 USA
Return to August 1996
Return to ““Barry C. Collin” <isi@hooked.net>”
1996-08-29 (Fri, 30 Aug 1996 06:41:52 +0800) - CyberTerrorism Thoughts - “Barry C. Collin” <isi@hooked.net>