Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment so their building a surveillance network (Score 1) 860

it has to feed off it's target at certain access points. these can be located and identified. they will also be protected. but each will have a weakness, no matter how many such access points, they can be hurt

let's kill it

it will be a box in a server room, a conduit under street, a transmitter on a roof

let's sabotage these fucking assholes

in the name of the founding principles of this country, fuck these goons

Comment Sounds like what is needed... (Score 5, Interesting) 284

...is a post incident review with support people involved, and their management teams, along with directors and executive involvement to identify what the problem was that caused the business to be inoperative for the duration of the incident, what policies and procedures need to be followed going forwards, and so on. Once policies are established, solutions that support those policies can be implemented.

As an example for your situation, since a vendor was involved in an upgrade, that should have been part of a scheduled change. The change should be documented ahead of time as to what is being done, what systems are going to be touched, and who the responsible parties both within the company and external to the company are for that change. Included in the documentation should be the fallback plan for dealing with issues that crop up during and after the change, within an appropriate test window that is included in the change window, as well as clearly defined backout procedures. "fix and fall forward" or equivalent statements are not, and should not be, considered acceptable plans. Wherever possible you want to have documentation attached that the procedures involved have been tested in a suitable test environment. (This may not be possible in situations where a test environment would cost as much to prepare as the production environment.)

As far as limiting remote access, as others have pointed out, such limits are trivial based on what type of remote access is in place, and what policies are established. At the very least account authorizations required for performing changes on production devices should require someone in house approve that authentication, be specific to the time when those changes are scheduled to happen, and should not allow similar access to devices or types of devices not involved in the change.

Comment Re:Is I also said on Ars... (Score 2) 404

Because everything is classified, when the system is inevitably used to achieve political ends, you most likely won't even realise it's happened. Your position is like someone in 2001 saying "but requiring banks to verify their customers identity isn't being used to manipulate politics, it'll just be used to fight the terrorists!" and then some years later WikiLeaks gets cut off. It is only possible because of the infrastructure laid down for other reasons. In that case the smackdown was clearly visible, but most attempts to fight The Man wouldn't even get that far.

These systems already protect themselves as their first priority. it's only a matter of time until a journalist working on a story about government abuse of power against a suspected terrorist suddenly discovers that their source vanishes. They'll never know that the US was monitoring all people that the journalist interacted with and was able to find the leak.

Comment Re:define "serious" (Score 5, Informative) 244

Such data is gathered by the YouGov surveys, which happen very regularly. Here's the latest report. Unsurprisingly given the sort of policies associated with the coalition government, the approval rating of Parliament splits strongly down party lines. Overall the government is unpopular with a 25% approval rating, 61% disapproval and 14% don't know. However this average disguises the fact that amongst conservative voters approval is 75% and amongst Labour voters approval is only 5%.

These sorts of figures are what you might expect from the UK. The situation is not comparable to the USA where the approval rating of Congress reflects a more deep rooted feeling that corruption is rampant and all the parties are fundamentally the same. This can be seen in the fact that disapproval of Congress is almost identical regardless of voting intention. The problems in the UK reflect a strong north/south division every bit as strong as the city/rural division in the USA, where the richer and more conservative south tends to approval of austerity due to a less systematic dependence on welfare and public sector jobs. The post-industrial north is dominated by Labour voters who never made the transition to the service/knowledge economy and where quality of life is highly dependent on government spending.

I don't have time to find more precise stats, but I suspect if you examined UK voters beliefs more closely, people would not feel that democracy itself was particularly broken. Especially not over something as trivial as piracy - only in places like Slashdot and amongst the people who read it does piracy become some kind of moral imperative. Everyone else I know treats it as a naughty pleasure. They know they're breaking the law and won't get caught, but they don't have any desire to make a big moral campaign of it.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...