From: Bill Stewart <stewarts@ix.netcom.com>
To: cypherpunks@toad.com
Message Hash: c2786de31301fd42a721a5fffd09de97d2b05e5e2a3c4e4e057873e295e37fe0
Message ID: <3.0.3.32.19971028233541.006e8d74@popd.ix.netcom.com>
Reply To: <3.0.3.32.19971026170732.006bf4fc@popd.ix.netcom.com>
UTC Datetime: 1997-10-29 08:24:51 UTC
Raw Date: Wed, 29 Oct 1997 16:24:51 +0800
From: Bill Stewart <stewarts@ix.netcom.com>
Date: Wed, 29 Oct 1997 16:24:51 +0800
To: cypherpunks@toad.com
Subject: Re: Infastructure Protection and Paranoia
In-Reply-To: <3.0.3.32.19971026170732.006bf4fc@popd.ix.netcom.com>
Message-ID: <3.0.3.32.19971028233541.006e8d74@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
At 12:38 AM 10/28/1997 -0600, some TruthMonger tentacle wrote:
>stewarts@ix.netcom.com wrote:
>> At 03:41 PM 10/21/1997 +0100, Sandy J. Wong wrote on Cyberia-L
>> >Buried in Tuesday's Wall Street Journal was a small three-paragraph article
>> >mentioning that the U.S. may be vulnerable to a cyberspace version of the
>> >Pearl Harbor attack.
>
> Why don't you phone up NSA and tell them that you made a Xerox (TM)
>copy of the InfoWar plans left overnight at the bar/lounge at the
>Holiday Inn in Albuquerque last week?
> Let me know how it turns out for you...
At this year's CFP one evening we were playing the game of
"You want to cause maximum disruption to the US infrastructure,
and you've got 100 small explosive devices. Where do you put them?"
Much creativity was displayed and substantial amounts of testosterone reveled in,
and the overall conclusion was that we'd be in deep trouble if
anybody even vaguely competent wanted to monkeywrench the system.
After that, we played the Russell-Brand-like game of
"Destruction is easy. What would you do if you wanted to create
the most joy in the world instead." That was harder :-)
Thanks!
Bill
Bill Stewart, stewarts@ix.netcom.com
Regular Key PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
Return to October 1997
Return to “TruthMonger <tm@dev.null>”