security, memory, Cyberspace, mp3, passcodes, confidential, hacked, computersCyberspace, Examples of losses and lapsessecurity, memory, Cyberspace, mp3, passcodes, confidential, hacked, computers

Search Box

Advanced search

To my cites     Back to Big brother      Back to Cyberterrorism

1 2

Examples of losses and lapses. All may not be a threat to national security, but, the lack of security is a threat to national security.

As I mentioned in my vulnerabilities section President Obama had his password compromised.

He is not the only one.

Former Republican VP hopeful Sarah Palin had her email hacked after a hacker guess her password from personsal information that was found on Wikipedia (1 ).

A sheepish FBI Director Robert S. Mueller III confessed to almost falling victim to a scam to reveal their personal banking information. His wife scolded him and said "No more Internet banking for you!" (2 ).

That wasn't the first time director Mueller's password was compromised. In 2006 it was reported that a government consultant used software that was easily obtainable from the Internet to get the director's password and passwords of 38,000 employees of the FBI. Though it was just a "curiosity hacks" the hacker gained access to things like the witness protection program and details on counterespionage activity. After this hack was discovered the FBI temporarily shut down its Network (3 ).

The above did do anything out of the ordinary to have their passwords compromised? No! The just ran into any ever increasing force, that is just thinking of ways to breech security. More examples of this and some of just plain recklessness will follow.

A memory stick that had the private details of 12 million UK citizens was found outside a pub. The memory stick had confidential passcodes to a government gateway system that covered everything from parking tickets to tax returns (4 ).

When New Zealander Chris Ogle was in Oklahoma he bought an mp3 player at a thrift store. When he tried to download songs he discovered that it had classified US military files on it. The information on the player included home addresses, Social Security numbers and cell phone numbers of U.S. soldiers mission briefings and list of deployed hotspots in Afghanistan and Iraq (5 ).

Someone hacked Heartland Payment Systems Inc. computer system, that processes 100 million payment card transactions per month for 175,000 merchants. The breech lasted several weeks and did not involve merchant data, Social Security numbers, unencrypted personal ID numbers, addresses or phone numbers (6 ).

Cyber hackers breached a high-tech jet fighter program ( Lockheed's F-35 Lightning II) developed by Lockheed Martin for the Pentagon. Its unclear if this was done as an attempt of corporate theft or a hacker trying to harm the program (7 ).

In the USA, two laptop computers were stolen that had 300,000 Social Security that were held by the Davidson County Election Commission, in Tennessee. Their was no apparent misuse of the Social Security numbers (8 ).

In 2005 a thief stole a laptop at the offices UC Berkeley that had the personal information of 100,000 people. Six months earlier the university had someone hack into computer that was being used for research and gained access to person information of 600,000 people (9 ).

security, memory, Cyberspace, mp3, passcodes, confidential, hacked, computers