Back to the main page

Mailing List Logs for ShadowRN

From: ANGLISS BRIAN EDWARD <angliss@****.Colorado.EDU>
Subject: ID acquired
Date: Mon, 15 Apr 1996 19:59:30 -0600 (MDT)
*****INTERNAL: Maxim Security Log
>>>>>[Good evening, ma'am.

"Frag the pleasantries, John. You said that our sources have IDed
another one of the Cambodia attackers."

That's right. He's a magician, by the name of Griffyn. Another one of
the Seattle crowd. He was IDed only recently by a snitch we've got in
Seattle, and we just verified ID with one of our agents today. We're
searching for abodes and possible covers as well. Nothing so far, and I
suspecte it will take some time. We've devoted most of our assets to
recovery.

"Who have we located?"

One of the attackers, Jason Lynch, is spending a lot of time fighting
Azzie tortureware distribution. We've acquired some of the chips and are
analyzing them for potential income. At this point they're only slightly
better than the chips and programs we sell already. The code is, in many
ways, similar to the Nuke code we've been testing, but integrated into a
tortureware BTL instead of IC or combat utilities.

We think that another attacker, the ex-Ares employee Blade, is assisting
Lynch.

"Is that all?"

Currently, yes. If you would like me to devote more of our intelligence
resources to the search, I will do so.

"No. We need them to help with the economic recovery. Keep the fire
burning, but don't turn up the heat yet. Getting our feet on stable
ground again is more important."

Yes ma'am.]<<<<<
-- Maxim Security Log <19:58:08/04-15-57>

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.