Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Creative Speculation

Showing Original Post only (View all)

Jeffersons Ghost

(15,235 posts)
Fri Nov 13, 2015, 06:15 PM Nov 2015

There are only two types of companies in the USA. [View all]

Last edited Tue Mar 29, 2016, 11:06 PM - Edit history (1)

Is illegal eavesdropping on FBI, DHS, DEA, ATF and U.S. Secret Service homes and offices still only a conspiracy theory?
I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.

Technology has become pervasive as a target. It has also been used as a means of attack. But this story illustrates our use of technology as an investigative tool. It also illustrates the power of innovative thinking and fast action—the very tools we need to stop those who have hijacked cyber space for their own ends.

The individuals who planned the attempted Times Square bombing in May 2010 used public web cameras for reconnaissance. They used file-sharing sites to share sensitive operational details. They deployed remote conferencing software to communicate. They used a proxy server to avoid being tracked by an IP address. And they claimed responsibility for the attempted attack—on YouTube.[arrest targeted electronic terrorist in the Southeastern section of the USA, this weekend, while the crime syndicate organizers are away for the weekend. Then, the suspects will provide information, on their crime syndicates, for a plea bargain.]

We do not want you to feel victimized a second time by an investigation. We will minimize the disruption to your business, and we will safeguard your privacy. Where necessary, we will seek protective orders to preserve trade secrets and business confidentiality. And we will share with you what we can, as quickly as we can, about the means and the methods of attack.

https://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-outsmarting-terrorists-hackers-and-spies


3 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Latest Discussions»Retired Forums»Creative Speculation»There are only two types ...»Reply #0