-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thu, Aug 26, 2010 at 9:53 PM, Marc <[email protected]> wrote:

>>>
>>> Considering how the U.S. Military can't even protect it's own networks
>>> against well-known USB malware, I find this suggestion laughable.
>>[...]
>>
>>But not just *any* of their networks, a *classified* network.
>>
>>I think I'm more offended than in hysterics.  A) they've proven they're
>>not up to the job on their "critical assets" network - let alone their
>>garden variety networks.  B) uhmmm.. right.  US Military having control
>>over private networks.  Pretty sure something in the Constitution says
>>that's against the rules.
>>
>
> maybe...they just need...more...err...practice...
>
> Remember this?

The reference to fine team of military "hackers" at HITB is all well and
good, but I think is the exception, not the rule.

Remember, you still have people who think like this:

"Carpet bombing in cyberspace"
http://www.armedforcesjournal.com/2008/05/3375884

'Nuff said.

- - ferg

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.5.3 (Build 5003)

wj8DBQFMd1/Aq1pz9mNUZTMRAlELAJsEbVaAQSR2APi/QKhqHDLrVONQ1gCgua1m
udgcIH2ouztDRtLaTaVRitc=
=XWBm
-----END PGP SIGNATURE-----




-- 
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to