Nah, if Bush already had him in a hole somewhere to produce him just in
time for the elections, he'd collect the billion for himself as his
personal reward.
--Kaos-Keraunos-Kybernetos---
+ ^ + :"Our enemies are innovative and resourceful, and so are
Adam Back wrote:
Maybe Bin Laden would turn himself in in return for a billion $ for
his cause (through a middle-man of course).
Seem to remember that Bin Laden was relatively wealthy himself (>100
M$?), but you'd have to balance these rewards to not be too
excessively much more than net worth of t
Original URL:
http://www.theregister.co.uk/2004/08/11/al_q_geek_us_overthrow_plot/
Al-Qaeda computer geek nearly overthrew US
By Thomas C Greene (thomas.greene at theregister.co.uk)
Published Wednesday 11th August 2004 16:45 GMT
Update A White House with a clear determination to draw paranoid
Maybe Bin Laden would turn himself in in return for a billion $ for
his cause (through a middle-man of course).
Seem to remember that Bin Laden was relatively wealthy himself (>100
M$?), but you'd have to balance these rewards to not be too
excessively much more than net worth of the individual.
ABC News is offering a report this evening on how
the Internet may be helping terrorism. For it Cryptome was
grilled and taped yesterday for aiding and abetting. We
confessed it's due to brain-liberating by the manchurian
cypherpunks.
Yeah, about as brilliant as a turd. Didn't they recently call Al-Qaeda's
network a hydra? correct me if I don't recall my Ancient Greek myths, but
when you cut off one head on the hydra, two more grow back, so are we to
assume that future heads that grow back will carry such bounties?
A billi
Saint John of Cryptome has a particularly tasty link to
http://csrc.nist.gov/publications/drafts.html#sp800-72
which describes the state of the art in PDA forensics.
There is also a link to a CDROM of secure hashes of
various "benign" and less benign programs that the
NIST knows about. Including
On Wed, 11 Aug 2004, Major Variola (ret) wrote:
> Obvious lesson: Steganography tool authors, your programs
> should use the worm/HIV trick of changing their signatures
> with every invocation. Much harder for the forensic
> fedz to recognize your tools. (As suspicious, of course).
It should b