"The points of presence all seem to be overt CIA links, and the names are of overt employees who seem to be either system managers or points of reference for billing purposes," said Vince Cannistraro, former chief of counterintelligence at the CIA, who reviewed the report. "It doesnt tell you anything about the clandestine side of CIA networks over which classified information flows and which has no public points of presence. But perhaps these are good starting points for less-scrupulous elements to begin cyberattacks."
http://www.computerworld.com/storyba/0,4125,NAV47_STO68961,00.html
Wednesday, March 13, 2002
Popular Posts
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
Some good stuff from a Canadian futurist: - The rising power of the knowledge worker - Continuous training replaces job security; respect is...
-
Not a bad audio book, but I expected more. Big ideas: Build a high performance, high-trust culture; Identify desired results and un...
-
Here's my (edited) journal entry for this event dated 12/01/98: Wow. I just sessioned and started reading "The Tao of Physics...
-
... or, Decemberween. Whatever. http://www.homestarrunner.com/xmas04.html
-
Peruvian archeologists have discovered the first full Inca burial site at Machu Picchu since the famous mountaintop citadel was discovered 9...
-
Increasingly, the overstretched and overburdened have a new answer to work lives of gunning harder for what seems like less and less: Dont j...
-
http://www.homestarrunner.com/sbemail94.html
-
http://esamultimedia.esa.int/images/marsexpress/377-260208-2149-6-co-01-HebesChasma_H1.jpg
-
Most mainstream music production relegates the computer to a behind-the-scenes player. The digital processes that help create the sense of p...