From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: ddd39ccb7e02f09ff6a0f95364c53ffccd5f7d0517e2ffb8476ced5261e6eb17
Message ID: <1.5.4.32.19970611175700.008324f4@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-06-11 18:17:46 UTC
Raw Date: Thu, 12 Jun 1997 02:17:46 +0800
From: John Young <jya@pipeline.com>
Date: Thu, 12 Jun 1997 02:17:46 +0800
To: cypherpunks@toad.com
Subject: Unleashing Micro Viruses on Networks
Message-ID: <1.5.4.32.19970611175700.008324f4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
6-11-97, Janes' Defence Weekly:
Unleashing Microbots on Iran's IT Networks
Unlike the 1990-1991 Gulf War, when the USA inserted a
National Security Agency-developed, virus-laden microchip
into a French computer printer headed for Baghdad, in 2015
the USA relies on several methods for infecting Iranian
computers. These efforts hope to get around problems
created by the proliferation of encryption technology.
While some peripheral equipment, like printers, will be
intercepted and bugged in order to disable mainframe
computers, intelligence technicians will also use the internet
to send guided viruses into Iran's national information
infrastructure.
Thumbnail-sized micro-robots, known as `microbots', will
also be unleashed by micro-air vehicles and naval guns. These
parasites will creep into electronic equipment, attach
themselves, and keep themselves alive by draining generator
power.
Once the electronics system's energy is depleted, the fully
charged microscopic vermin will search for a new victim.
The main problem will be that they are too small to carry
identification equipment and so they infect indiscriminately.
As such, they must be deployed far away from allied
equipment.
However, packages of microbots can be destroyed remotely
as allies prepare to invade enemy territory.
<>
[Copyright 1997, Jane's Information Group]
Return to June 1997
Return to “John Young <jya@pipeline.com>”
1997-06-11 (Thu, 12 Jun 1997 02:17:46 +0800) - Unleashing Micro Viruses on Networks - John Young <jya@pipeline.com>