-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thu, Aug 26, 2010 at 9:53 PM, Marc <[email protected]> wrote:
>>> >>> Considering how the U.S. Military can't even protect it's own networks >>> against well-known USB malware, I find this suggestion laughable. >>[...] >> >>But not just *any* of their networks, a *classified* network. >> >>I think I'm more offended than in hysterics. A) they've proven they're >>not up to the job on their "critical assets" network - let alone their >>garden variety networks. B) uhmmm.. right. US Military having control >>over private networks. Pretty sure something in the Constitution says >>that's against the rules. >> > > maybe...they just need...more...err...practice... > > Remember this? The reference to fine team of military "hackers" at HITB is all well and good, but I think is the exception, not the rule. Remember, you still have people who think like this: "Carpet bombing in cyberspace" http://www.armedforcesjournal.com/2008/05/3375884 'Nuff said. - - ferg -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.5.3 (Build 5003) wj8DBQFMd1/Aq1pz9mNUZTMRAlELAJsEbVaAQSR2APi/QKhqHDLrVONQ1gCgua1m udgcIH2ouztDRtLaTaVRitc= =XWBm -----END PGP SIGNATURE----- -- "Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawgster(at)gmail.com ferg's tech blog: http://fergdawg.blogspot.com/ _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
