Monday, February 12, 2007
WASHINGTON -Between three and four FBI laptop computers are lost or stolen each month on average and the agency is unable to say in many instances whether information on the machines is sensitive or classified, the Justice Department's inspector general said Monday.
The inspector general said the FBI is doing a better job of reducing the number of thefts and disappearances of weapons and laptop computers, but that not all problems were corrected as urged in a report five years ago.
"Perhaps most troubling, the FBI could not determine in many cases whether the lost or stolen laptop computers contained sensitive or classified information," said the report. "Such information may include case information, personal identifying information, or classified information on FBI operations."
Tuesday, February 6, 2007
Looks like there was a Semi-Major on some computers which handle internet traffic in the U.S, this reminds me of a book I am reading now but a lot less elegant, its by Richard Clarke, called BreakPoint, about attacks on our technological infrastructure, and how easy it really is, give it a look.
Experts said the unusually powerful attacks lasted for hours but passed largely unnoticed by most computer users, a testament to the resiliency of the Internet.
Behind the scenes, computer scientists worldwide raced to cope with enormous volumes of data that threatened to saturate some of the Internet's most vital pipelines.
Experts said the hackers appeared to disguise their origin, but vast amounts of rogue data in the attacks were traced to South Korea.
The attacks appeared to target UltraDNS, the company that operates servers managing traffic for Web sites ending in "org" and some other suffixes, experts said. Company officials did not immediately return telephone calls from The Associated Press.
Among the targeted "root" servers that manage global Internet traffic were ones operated by the Defense Department and the Internet's primary oversight body.
"There was what appears to be some form of attack during the night hours here in California and into the morning," said John Crain, chief technical officer for the Internet Corporation for Assigned Names and Numbers. He said the attack was continuing and so was the hunt for its origin.
"I don't think anybody has the full picture," Crain said. "We're looking at the data."
Crain said Tuesday's attack was less serious than attacks against the same 13 "root" servers in October 2002 because technology innovations in recent years have increasingly distributed their workloads to other computers around the globe.