Well, at least he does have some governmental connection rather than just being conntected to the non-profit "Project on Government Oversight."
United Nations and you get in
Hackers crack Defence Department
By JIM BRONSKILL
Canadian Press
E
Ottawa Determined computer hackers broke through federal firewalls several times last year, gaining access to Defence Department networks.
A newly obtained report on security breaches at the department in 2003 also reveals dozens of internal lapses.
Computer security has become a high-profile concern in federal circles in light of cyber-terrorism, operations mounted by foreign intelligence services and, more often, the sloppy practices of employees.
The Defence Department's Computer Incident Response Team tracked a total of 160 events from digital break-ins to dodgy e-mail procedures last year.
Located in Ottawa at the Canadian Forces network operations centre, the team defends department computers by monitoring intrusion detection systems, zeroing in on threats and issuing alerts.
A declassified version of the team's report was released to The Canadian Press under the Access to Information Act.
It provides an indication of the difficulties faced by federal agencies such as the Defence Department in keeping their sprawling information holdings secure from interlopers.
The Canadian Security Intelligence Service has warned that it is almost impossible to eliminate network vulnerabilities entirely because computer systems and attack tools are in a constant state of evolution.
Other documents released by Defence underscore the high degree of confidentiality attached to such issues. Many of the records are classified top secret, with much of the information withheld from release due to its perceived sensitivity.
The response team's report notes five instances of unauthorized privileged access to Defence networks, considered the most serious of seven categories of breaches.
They also logged five cases of unauthorized limited access and 35 instances of malicious logic the attempted introduction of viruses, worms or other unwanted programs into a computer system.
There were 110 cases of poor security practice on the part of employees, by far the most common problem last year. Of these, the majority involved concerns about the security of e-mail transmissions.
Others stemmed from use of Internet Relay Chat messaging and the popular KaZaa file-sharing service, inappropriate storage of materials, and unauthorized Web postings. Another case involved improper access to a network.
No one from the Defence Department was available Tuesday to discuss the security cases.
Several of the documents released by Defence were prepared by the Communications Security Establishment, the highly secretive federal agency with the dual role of electronic spy service and protector of federal computer systems.
The records indicate CSE focused on issues including the potential exploitation of wireless communication networks, suspicious probes of systems and the general methods employed by hackers.
It appears CSE also undertook an analysis of the so-called Blaster worm that infected computers last August.
Sandia Labs reports classified computer disk is missing(Albuquerque-AP) -- Sandia National Laboratories is missing a computer floppy disk marked classified.
Sandia officials say they dont believe it contains anything that could harm national security.
Lab spokesman Chris Miller says its difficult to say how long the disk was missing before the labs security program was notified after an inventory June 30.
Miller says he's not sure whether the disk was part of an inventory in December.
Sandia, the Department of Energy, and the National Nuclear Security Administration are investigating.
The revelation comes on the heels of Los Alamos National Laboratory stopping classified work while it inventories sensitive data. Los Alamos is missing that two items identified only as removable data storage devices.
(Copyright 2004 by The Associated Press. All Rights Reserved.)