"The points of presence all seem to be overt CIA links, and the names are of overt employees who seem to be either system managers or points of reference for billing purposes," said Vince Cannistraro, former chief of counterintelligence at the CIA, who reviewed the report. "It doesnt tell you anything about the clandestine side of CIA networks over which classified information flows and which has no public points of presence. But perhaps these are good starting points for less-scrupulous elements to begin cyberattacks."
http://www.computerworld.com/storyba/0,4125,NAV47_STO68961,00.html
Wednesday, March 13, 2002
Popular Posts
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
The concept of dragons was probably brought to Japan around 2,000 years ago, along with the technology for paddy agriculture. Their images h...
-
Not a bad audio book, but I expected more. Big ideas: Build a high performance, high-trust culture; Identify desired results and un...
-
Someone that gets it. Service-oriented software, when done correctly in a platform-agnostic way can be flexible, cheap, and can motivate m...
-
...why was this given the file name of skyfall?... Certain information, while not specific as to target, gives the government reason to beli...
-
Peruvian archeologists have discovered the first full Inca burial site at Machu Picchu since the famous mountaintop citadel was discovered 9...
-
http://www.homestarrunner.com/sbemail94.html
-
http://esamultimedia.esa.int/images/marsexpress/377-260208-2149-6-co-01-HebesChasma_H1.jpg
-
It looks like this might be real -- a Canadian company succesfully demoed a 16-qubit quantum computer which solved sudoku puzzles, seating...
-
Some good stuff from a Canadian futurist: - The rising power of the knowledge worker - Continuous training replaces job security; respect is...