Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: SpaceBar
It's probably a stealth searchbot from a communist country's military intelligence apparatus, looking for vulnerabilities and sensitive information of any kind. Such information could be used for a wide range of criminal or terrorist activities.

I think your tinfoil hat is a little tight this morning.
18 posted on 06/21/2003 7:19:53 AM PDT by adam_az
[ Post Reply | Private Reply | To 13 | View Replies ]


To: adam_az
I said:
It's probably a stealth searchbot from a communist country's military intelligence apparatus, looking for vulnerabilities and sensitive information of any kind. Such information could be used for a wide range of criminal or terrorist activities.

Then you said:
I think your tinfoil hat is a little tight this morning.


And now I reply:

Well, you might think my scenario is outlandish, and the stuff of conspiricy theories, but this link (washington post) is about a graduate student who, using standard network query tools, mapped a large amount of corporate lan/wan and larger structures on the internet to the degree where US authorities want his thesis kept under wraps since it could be used by terrorists. So? Is my hypothesis really that outlandish? Don't answer, because the answer is evidently "no", and other people in high places seem to think so as well. I don't doubt for a microsecond that all sorts of nefarious groups including criminals, terrorists, and military agencies of foriegn governments are examining every nook and cranny of the net to understand its underlying structure and possible vulnerabilities. So instead of reaching for the increasingly tired tin-foil hat saw, and attempting to discredit the messenger, you might try thinking outside the box instead.
20 posted on 07/08/2003 10:16:47 PM PDT by SpaceBar
[ Post Reply | Private Reply | To 18 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson