Transterrestrial Musings  


Amazon Honor System Click Here to Pay

Space
Alan Boyle (MSNBC)
Space Politics (Jeff Foust)
Space Transport News (Clark Lindsey)
NASA Watch
NASA Space Flight
Hobby Space
A Voyage To Arcturus (Jay Manifold)
Dispatches From The Final Frontier (Michael Belfiore)
Personal Spaceflight (Jeff Foust)
Mars Blog
The Flame Trench (Florida Today)
Space Cynic
Rocket Forge (Michael Mealing)
COTS Watch (Michael Mealing)
Curmudgeon's Corner (Mark Whittington)
Selenian Boondocks
Tales of the Heliosphere
Out Of The Cradle
Space For Commerce (Brian Dunbar)
True Anomaly
Kevin Parkin
The Speculist (Phil Bowermaster)
Spacecraft (Chris Hall)
Space Pragmatism (Dan Schrimpsher)
Eternal Golden Braid (Fred Kiesche)
Carried Away (Dan Schmelzer)
Laughing Wolf (C. Blake Powers)
Chair Force Engineer (Air Force Procurement)
Spacearium
Saturn Follies
JesusPhreaks (Scott Bell)
Journoblogs
The Ombudsgod
Cut On The Bias (Susanna Cornett)
Joanne Jacobs


Site designed by


Powered by
Movable Type
Biting Commentary about Infinity, and Beyond!

« Tomorrow's News, Today | Main | Still Crazy After All These Years »

William Gibson, Call Your Office

Dale Amon describes the shady nature of life on the front lines in the cyberwar. There is some good advice on computer security in comments.

Posted by Rand Simberg at September 27, 2005 06:59 AM
TrackBack URL for this entry:
http://www.transterrestrial.com/mt-diagnostics.cgi/4325

Listed below are links to weblogs that reference this post from Transterrestrial Musings.
Comments

Looking at the story, there's too many holes to claim that this is some sort of state effort by either Russia or China. Perhaps, we'd have a better idea if we knew what emails the hackers described in the story were grabbing.

Organized crime could easily muster the resources to do what is described in the story. For example, I seem to recall hearing that a lot of KGB types went on into organized crime. So it doesn't strike me as unlikely that there's some sort of packet sniffer either on Russia's backbone, in the hotel where the CEO victim stayed, or somewhere in between. After all, virtually any machine with an internet connection can be made into one.

It does strike me as odd that the "Great Wall" of China that apparently does such a good job monitoring its citizens for various on-line acts of subversion or revealing "state secrets", seems strangely to utterly fail when it comes to blocking on-line criminal activity originating from inside China's borders.

Posted by Karl Hallowell at September 27, 2005 11:06 AM

There may be "holes" in the story, because Dale is not providing all of the information, for reasons he states, but there's nothing inconsistent with the story and his theory that I see.

Posted by Rand Simberg at September 27, 2005 12:06 PM


Post a comment
Name:


Email Address:


URL:


Comments: