"Rustock Seattle operation a regular visitor? I use this as an example because it provides the highly plausible framework for the story.
"Take a few of the common covert network software techniques such as sockpuppets, spam filter biasing and gaslighting. Each of these are based on anonymously programming the ego-auto-pilot to achieve certain goals. Among them fear of technology, fear of openness, fear of intimidation.
"Take a few of the common covert network software techniques such as sockpuppets, spam filter biasing and gaslighting. Each of these are based on anonymously programming the ego-auto-pilot to achieve certain goals. Among them fear of technology, fear of openness, fear of intimidation.
"You can call it Monsters Incorporated if you want to but it is not kids play. It is the current standard of practice in global power competition."
Botnets are made possible by the constant churning that leaves some occasional user's machines as staging sites. These type of users don't want to be bothered with 'Service Packs'. If it ain't broke, don't fix it' means if I am unaware it is helping my enemy I'll blame the government or THEM when I notice things are not as good as they used to be.
Cloud, what cloud? |
© 2011 Buzz Hill
Jasmine Revolution, Singapore, Moscow ID, Kansas City
ReplyDelete