Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Mishandling? (Score 1) 94

How can he be charged with mishandling of classified documents when he had no expectation of doing so? That is reserved for military, contractors, etc who work with classified information. They have the expectation to protect national security and classified information. Assange is simply a third party journalist who is an Australian/Equdorean citizen.

>18 U.S.C. 1924 says, âoe(a) Whoever, being an officer, employee, contractor, or consultant of the United States, and, by virtue of his office, employment, position, or contract, becomes possessed of documents or materials containing classified information of the United States, knowingly removes such documents or materials without authority and with the intent to retain such documents or materials at an unauthorized location shall beâ¦.â

Comment So long and thanks for all the tuna fish. (Score 3, Insightful) 100

> ... theft of thousands of data files and credit card numbers ...

This statement is an insult, because this is same ubiquitous credit card file that any want-to-be hacker had downloaded from their local BBS.

Anyway, I still have my signed bumper sticker, read all his books. He inspired me to become the security professional I am today.

Kevin, are finally free.

Comment Scripted Simulation (Score 1) 73

The simulation is occurring in a hotel. It is being simulated to test the response of officials. Not to test the response of security professionals. There is a production company who is providing scripts to security professionals. So I am sure the officials will be asking the security professionals for updates or detailed information, which will be scripted. It is like a table read for a television show, (ie Saturday Night Live), where everyone sits around a table and reads the scripts, without actually being on a stage, with make-up, lights, and cameras.

Comment Illegal and unethical to boot! (Score 4, Insightful) 457

This is both highly illegal and unethical. Illegal in that they accessed the PCs without the owners permission, they sent spam, and changed the settings on the computer.

Unethical even if their motive was not to do criminal intent.

It is like creating a "white worm" to patch servers from an unpatched vulnerability.

Slashdot Top Deals

"Been through Hell? Whaddya bring back for me?" -- A. Brilliant

Working...