From: Harvey Newstrom (mail@HarveyNewstrom.com)
Date: Wed Jul 03 2002 - 10:48:36 MDT
On Wednesday, July 3, 2002, at 11:01 am, Robert J. Bradbury wrote:
>
> Well, well, well, I guess its signs of the singularity time
> when strategies Anders suggests are effectively showing up
> in the news less than two weeks after he suggests them.
>
> See: /.
> http://slashdot.org/article.pl?sid=02/07/03/1253243&mode=thread&tid=172Û
Yes, that's pretty suspicious.... Except, that as the article points
out, it is not uncommon for satellites to be subject to unauthorized
use. I don't even call this "hacking", since there is no security on
most of them. They just relay whatever signal is beamed to them. U.S.
military satellites are frequently used for unauthorized purposes. The
sky is full of thousands of relay channels.
-- Harvey Newstrom, CISSP <www.HarveyNewstrom.com> Principal Security Consultant <www.Newstaff.com>
This archive was generated by hypermail 2.1.5 : Sat Nov 02 2002 - 09:15:09 MST