Blown To Bits

Chinese hackers?

Thursday, July 10th, 2008 by Harry Lewis
Additionally, cheap vibramycin a doctor may ask a person whether they use laxatives, get discount viagra suppositories, or enemas, and if so, how often. Normal aging cheapest cialis online and various health conditions can impair a person's balance and buy generic zoloft online make falls more likely. However, because drugs affect each person toradol online differently, we cannot guarantee that this list includes all possible find (metacam) without prescription dosages. "Smoker's lips — also called perioral rhytids — can buying cheapest (ovral effects occur from puckering up the lips in smoking, as well discount amikacin as with straw use or natural aging," said Reed. However, purchase zofran online others state it is distinct from allergic conjunctivitis due to order cheap diovan having a mechanical cause, such as something in the eye. cheap cialis pill Novavax isn't effective right after your shot because it takes buy cheap ampicillin your immune system time to respond to the vaccine. Activities viagra no rx required that take weight off the joints may be the most purchase remeron without prescription comfortable, such as swimming or water aerobics. You also should not.

Politico reports today on Congressional efforts at data security. The story is prompted by claims from Rep. Frank R. Wolf (R-Va.) and Rep. Chris Smith (R-N.J.) that computers used by their staffers had been “hacked” by the Chinese government because the good congressmen supported the speech rights of Chinese citizens.

Unfortunately, as far as I could tell, the congressmen did not provide any forensic evidence about what the “hack” was or where it came from. These are not trivial matters; even if an attack looks like it is coming from China, that could be a spoof — the actual attacker might be half a world away.

More importantly, I suspect this incident reveals more about the sloppiness of congressional offices than about the sophistication of Chinese hackers. I don’t doubt that the Chinese are sophisticated, but even sophisticated criminals prefer soft targets to hard ones. Was it necessary for multiple staffers to have sensitive data, unencrypted, on their computers? Had any of the staffers opened any questionable attachments or gone to any virus-infected sites lately? Note that Supreme Court Justice Stephen Breyer’s recent identity theft happened because a staffer at an investment firm used the same computer for client records and music file sharing. Share one file, share ’em all.

The bad guys are out there, for sure, but when a Congressmen starts creating an international incident out of something that happened two years ago and won’t disclose the details, remember Pogo’s profundity, which I quote in the Politico article: “We have met the enemy and he is us.”

Comments are closed.