Comment Re:It's about time! (Score 0, Flamebait) 1431
You have a warped sense of entitlement. Shooting someone for texting is never justified.
Shooting some for anything is never justified
You have a warped sense of entitlement. Shooting someone for texting is never justified.
Shooting some for anything is never justified
'It is the foundation of most of the world's religions.
...
Last I checked neither India nor China follow any of the Abrahmic religions dominantly. They constitute at-least 40% of world population? (even back in '68)..
I m not a security expert or a systems architect, this is purely from a layman's perspective but this is what i would do
Log everything, every file access every read and write call, some one with root access may clean up the logs you might say, then integrate it into the file sytem architecture, still really talented hackers might circumvent the File-system and directly access it. Even better built into the hardware of the storage devices to make it really tamper proof. Once you do log everything, it is not too difficult to setup alerts on suspicious patterns especially for large scale theft.
If some of the above it too disruptive, too costly, too difficult to implement then alternative is to simply have peers review your access in sensitive systems. Meaning every time some one needs root access to those system, other sysadmins preferably needs monitor/approve etc, sure it creates more red tape and bureaucracy and decrease in productivity, but better than the loosing data of national importance. In general more the people having monitoring information access, less chance of theft, as it then requires more people to collateralize on your wrong doing making it statistically less probable.
Finally I would suggest encryption at multiple levels, I don't know what exact role snowden actually performed, but I cannot visualize many cases where he needed access to the contents of a file or object to do sysadmin work. Even if it required such decryption, NSA could easily setup dedicated servers which will decrypt file and of course log the requests.
These are crude ideas and are probably full of holes, but any with serious experience and sufficient time and thought can design robust systems making it much harder to steal. No system is perfect, but it could been made far harder and amount of information leaked could have been minimized far better.
I think this more a symptom of the american security apparatus rather than a problem with the NSA only, look at how easy it was for Manning to take information, he was no techie, not particularly given special access.
Far more than spooks collecting data I am worried at how badly they are securing it. To clarify I am not supporting this invasion of privacy, but merely saying that this data can end easily up in the hands of people who will do far worse than what NSA will do.
what makes you think that foreign Governments didn't have already access to the information?,
if Snowden could get access so easily to so much without getting noticed, what makes you think any state couldn't have just easily bribed any other sysadmin and kept getting the same info?
You should really question the NSA security policies, for an organization which infiltrates networks regularly to have such poor security is appalling.
Surprisingly that doesn't seem to come up in this whole dialog about Snowden leaks. Everyone seems to think NSA is some all knowing efficient organization, the perfect big brother.
To me it seems they are woefully incompetent in even keeping basic access control policies in place.
Before anyone starts explaining about how it is difficult not to give root access to sys admins etc, it is not exactly rocket science to have peer reviewed access control polices even for sys admins, and alert systems in place depending on the amount of data being accessed over a period of time etc. if I think of 5 different measures of the cuff, I am sure any serious security consultant worth his fees should be able to do much much better.
I cannot stress this enough if a company losses data like this as happening fairly frequently these days, while worrying, I can on some level understand that it is not their core business, and perhaps they didn't spend enough on security and missed a step or two, but for an organization whose main objective is to do break into networks, this is plain stupid.
That's incontrevertible proof. Doesn't tell us what killed him or how he died.
Well that really depends on how death is defined
No, the kids don't know any better, and the mother is practicing child abuse, especially against the 11 year old.
Brainwashing your kids against vaccination is particularly evil.
-- BMO
While Vaccination as a theory/concept itself is not a bad thing, there are enough defective/ improperly prepared/ fake vaccines in the world that if you not worried about it, you are just being foolhardy. To be clear I am not implying that avoiding vaccines is the solution, just that there is some validity on the other side of the argument as well.
Trying to be happy is like trying to build a machine for which the only specification is that it should run noiselessly.