[118643] in Cypherpunks
Jane's Intelligence Review Needs Your Help With Cyberterrorism
daemon@ATHENA.MIT.EDU (Bill Stewart)
Mon Oct 4 18:02:43 1999
Message-Id: <3.0.5.32.19991004144211.009cbc60@idiom.com>
Date: Mon, 04 Oct 1999 14:42:11 -0700
To: cypherpunks@cyberpass.net
From: Bill Stewart <bill.stewart@pobox.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Reply-To: Bill Stewart <bill.stewart@pobox.com>
The following article was on Slashdot.org.
Given the amount of cypherpunks discussion on topics like this,
some of you may want to join the discussion on slashdot and comment.
They're not looking for military-bashing (big surprise, eh?),
but that doesn't mean an occasional balancing comment won't get through.
Note - "Anonymous coward" is the name that slashdot postings get if you're
not logged in as an identified user.
http://slashdot.org/article.pl?sid=99/10/04/0836212&mode=thread
Jane's Intelligence Review Needs Your Help With Cyberterrorism
Posted by Roblimo on Mon 04 Oct 06:30AM PDT
from the your-turn-to-teach-the-experts dept.
Jane's Intelligence Review, a famous "in group" publication
http://jir.janes.com/
read by political, military and intelligence honchos the world over,
has an article on Cyberterrorism scheduled to run in its next issue.
But Jane's editor Johan J Ingles-le Nobel believes Slashdot readers may
(ahem) actually know more about potential Cyberterrorism tactics than
the article's author, and would like you to comment on his work -
for publication. The article is up on a private preview page.
http://jir.janes.com/sample/jir0499.html
Please read it, then post your comments. Johan will read them,
here on Slashdot, and will select some of them for
publication in Jane's alongside the original article.
Before you post, please read a message
from the Jane's editor (below).
These are the specific questions Jane's wants answered:
Using CT, how easy or otherwise is it to bring down or attack vital
systems?
What sort of skills would be needed to do so, and are they
common/teachable?
Commercial-off-the-shelf software: can it really do CT?
Which systems are actually attackable?
Can a recovery be made from such attacks?
Is it likely to improve/get worse?
What sort of preventitive work would you recommend them to carry out?
For our part, we'll make an article based on your replies.
Please try to give examples and
evidence, keep it clean and stay objective -
this is not a 'military-bashing' exercise.
When we publish the article (17 November),
if you'd like to be contactable on this issue use your
real email address and we'll attribute your comments,
otherwise use 'anonymous coward' .
Many thanks,
Johan J Ingles-le Nobel,
London, England.
johan.ingles@janes.co.uk