FBI geniuses at it again

Dennis Putnam dap1 at MINDSPRING.COM
Sat Apr 24 07:19:19 MDT 2004


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 05:42 PM 4/23/2004, you wrote:
>Since soon after 9-11 there have been reports of terrorists using
>computers to plan attacks.  Terrorists use emails to exchange information.
>They've been rumored to hide information in what would appear to be an
>innocent website.  There are ways to hide information within image files
>and sound files.  The casual observer might think it's just a picture or a
>sound clip.  True you can't send a geek to infiltrate a moslem terror
>cell, but when you raid the mosque and seize a computer, you can use the
>geek to check out the computer to determine what useful information it
>contains.  If you're eavesdropping on a suspected terrorist's internet
>connection, you can use the geek to tell you what the suspect is receiving
>or sending.

I'm sure they are doing that but your original complaint was different.

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>

iQA/AwUBQIppV/34lmKmdrVUEQKWnQCgvF9ST3zwhP31U2Omx6ww4qQ128gAoOs4
P6llsh+FHEYK8BH7Pt6b/+zo
=d2yl
-----END PGP SIGNATURE-----



More information about the Rushtalk mailing list