SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Bonefish who wrote (946262)7/10/2016 9:58:24 PM
From: Wharf Rat1 Recommendation

Recommended By
zax

   of 1575625
 
"How does he know?"

How does he not know?

"He also said he couldn't rule out her sever being hacked."

That means he can't rule it in, which is more than he can say about these agencies. If R's raised 1/10 the fuss about these breaches that they are about Hillary's "cudda been", they'd be making 10X the fuss that they actually are.

Department of Health and Human Services (HHS), August 2014. The HHS server that supports the Obamacare Web site was hacked in July 2015, presumably by a non-state actor. The attack did not appear to have targeted the Web site directly, and the servers targeted did not contain any consumers’ personal information. Instead, the breach was reportedly the result of malware on the Healthcare.gov Web site meant to launch denial-of-service attacks on other Web sites. Authorities were alerted soon after the attack was discovered, and the Department of Homeland Security along with U.S. Computer Emergency Readiness Team (US–CERT) helped to respond to the situation. [5]White House, October 2014. White House servers were temporarily shut down after system administrators noticed suspicious activity on their network. While no classified information was affected, sensitive non-classified information such as the President’s schedule was accessible. The attack was considered very sophisticated, having been rerouted through various international computers, according to the FBI, Secret Service, and other intelligence agencies investigating the breach. [6]National Oceanic and Atmospheric Agency (NOAA), November 2014. The federal weather network confirmed that four sites were hacked by an Internet-based attack. While the initial intrusion occurred in September 2014, NOAA officials did not inform the proper authorities that the system was compromised until much later, a violation of agency policy that requires communication of attack within two days of discovery. NOAA instead reported an “unscheduled maintenance” as a result of the attack. NOAA would not verify whether critical information was removed or whether malware was inserted into the system. The hack has been attributed to hackers from China. [7]United States Postal Service (USPS), November 2014. The personal information (names, birth dates, Social Security Numbers, address, employment dates, emergency contact information, etc.) of roughly 800,000 employees was compromised through a hack of USPS computers. While the breach was found around October, information was compromised as far back as January. According to the USPS, there is no evidence to suggest that customer payment data was compromised, but data collected from the call center could possibly have been affected. [8]Department of State, November 2014. Hackers in Russia—possibly working with the Russian government—are suspected in a series of attacks made in early October against the State Department’s e-mail system. Officials say that even an intrusion of the unclassified system is a major threat to the security of the agency, given that many classified materials are transported via this unclassified avenue. The information gathered from this breach reportedly helped these hackers go on to hack the White House servers. [9]Federal Aviation Administration (FAA), April 2015. In early February, the FAA discovered a circulating malware virus in its administrative computer systems. The agency reported that there was no identifiable damage done to any of the systems. The federal auditor report did state, however, that the “excessive interconnectivity between [the National Airspace System (NAS)] and non NAS environments increased the risk that FAA’s mission critical air traffic control systems could be compromised.” [10]Department of Defense, April 2015. Testifying in front of the Senate Arms Services Committee, Secretary of Defense Ashton Carter mentioned how Russian hackers were able to gain access to Department of Defense unclassified files earlier this year. The department quickly identified the hackers and removed them from the network. [11]St. Louis Federal Reserve, May 2015. Officials acknowledged the St. Louis Fed Web site was the victim of successful domain name service spoofing in late April, when hackers successfully redirected online communication. [12]Internal Revenue Service, May 2015. The successful breach of the IRS Web site allowed hackers access to taxpayer information, including Social Security numbers, birth dates, and street addresses. Originally reported to have affected roughly 100,000 taxpayers, the actual number affected was tripled to 334,000 by August. The breach did not involve the main IRS computer system, but the hackers did gather information that allowed them access to the IRS Get Transcript program and tax information. [13]U.S. Army Web site, June 2015. Army.mil was taken offline temporarily after it was found that hackers had gained accessed to the Web site and were posting personal messages. No critical information was accessed. The Syrian Electronic Army claimed responsibility for the attack on Twitter. [14]Office of Personnel Management (OPM), June 2015. Possibly the largest cyber breach to federal networks, this drawn-out theft of government workers’ information is traced as far back as early 2014, when it was revealed that U.S. Investigative Services—a security clearance company—was breached, affecting as many as 25,000 individuals. [15] Additionally, KeyPoint Government Solutions, which conducts background checks of federal employees, was later hacked in December 2014, affecting as many as 49,000 individuals. [16]

heritage.org
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext