Adam Magazine on the Crazy Years

Looting, killing and raping -- by twisting their words they call it "empire"; and wherever they have created a wilderness they call it "peace" -- Tacitus

Friday, August 16

What have they been doing with the trillions they spend?

TechNews.com Security consultants entered scores of confidential military and government computers without approval this summer, exposing vulnerabilities that specialists say open the networks to electronic attacks and spying.

The consultants, inexperienced but armed with free, widely available software, identified unprotected PCs and then roamed at will through sensitive files containing military procedures, personnel records and financial data.

0 Comments:

Post a Comment

<< Home