[49562] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Internet vulnerabilities

daemon@ATHENA.MIT.EDU (Gwendolynn ferch Elydyr)
Thu Jul 4 18:56:25 2002

Date: Thu, 4 Jul 2002 18:55:53 -0400 (EDT)
From: Gwendolynn ferch Elydyr <gwen@reptiles.org>
To: Jason Lewis <jlewis@packetnexus.com>
Cc: nanog@merit.edu
In-Reply-To: <1188.192.168.120.61.1025822505.squirrel@www.packetnexus.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Thu, 4 Jul 2002, Jason Lewis wrote:
> I think most people are grouping terrorist into the "strap a bomb to your
> body and commit suicide" stereotype.  Is there a possibility that
> intelligent terrorists exist?  Or even people that have the knowledge and
> sympathize with them?  OBL used a satellite phone, they found laptops in
> Afghanistan, there is evidence they are using the web to transmit
> information to each other.  I think someone out there has a clue about
> computers.

I'm sure a number of people have seen this article already:

	http://www.business2.com/articles/mag/0,1640,41206,00.html

	The Technology Secrets of Cocaine Inc.
	Colombian cartels have spent billions of dollars to build one of
	the world's most sophisticated IT infrastructures. It's helping
	them smuggle more dope than ever before.
	By Paul Kaihla, July 2002 Issue

The article goes on to talk about how the drug dealers are using complex
data-mining techniques (and in one instance an AS400) to run and protect
their businesses.

cheers!
==========================================================================
"A cat spends her life conflicted between a deep, passionate and profound
desire for fish and an equally deep, passionate and profound desire to
avoid getting wet.  This is the defining metaphor of my life right now."


home help back first fref pref prev next nref lref last post