tag:blogger.com,1999:blog-2606342.post3056775553624180125..comments2023-11-05T05:04:07.847-05:00Comments on Internet Anthropologist Think Tank: Cyber terrorism sources:geraldhttp://www.blogger.com/profile/15980104227772258023noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-2606342.post-2136885209715101612008-03-22T10:36:00.000-04:002008-03-22T10:36:00.000-04:00PRIMARY TARGET: DEFECTORSSifting thru a site, sea...PRIMARY TARGET: DEFECTORS<BR/><BR/>Sifting thru a site, search for membership lists, especially dropped members. Either on the move, or possibly disaffected and recruitable. Forward to specialists.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-2606342.post-80276529561271655392008-02-19T11:56:00.000-05:002008-02-19T11:56:00.000-05:00Yes we hope to add to their forces.they are doing ...Yes we hope to add to their forces.<BR/>they are doing an excellent job.<BR/>Ggeraldhttps://www.blogger.com/profile/15980104227772258023noreply@blogger.comtag:blogger.com,1999:blog-2606342.post-46582077517092885552008-02-19T08:06:00.000-05:002008-02-19T08:06:00.000-05:00Sic the Jawas on them. They have become a Civilia...Sic the <A HREF="http://mypetjawa.mu.nu/archives/191302.php" REL="nofollow">Jawas</A> on them. They have become a Civilian Irregular Computer Network Attack Force to be proud of.Cannoneer No. 4https://www.blogger.com/profile/05235351920307868511noreply@blogger.com