Obama will draw a line in the water.by hacking our government computers - what will we do about it?
Apologize on behalf of dead white guys. Morse, Bell, Edison, et.al.by hacking our government computers - what will we do about it?
If Obama asked you to suck a fart out of his *******, how long would it take you? We know you would, it's just a matter of how much prep you would put into to ensure he was satisfied with your effort.Declare war. Lol You think we don't hack them?
Except the fact that they were able to also glean information on personnel with clearances and can then find ways to exploit those individuals or specifically target them with additional hacking."hacking our government computers"
lol!
Someone at OPM got phished............... months ago, or possibly even years ago.................... and attackers were able to get access to marginally sensitive data.
Names, addresses, and SSNs............... all data I can purchase with a monthly subscription from a host of service providers online, legally.
it is nowhere near an act of war, and really not a big deal at all..........
worry about hackers getting into the Hoover Dam and turning turbine speeds up 2%............... or Russians hacking the Associated Press' twitter account and posting a tweet about an explosion that causes auto-trade settings at the NYSE to make stocks plummet for minutes while the hackers buy low and sell high an hour later...............
don't worry about some OPM loser who clicked a malicious link in a well-designed phishing email.
Except the fact that they were able to also glean information on personnel with clearances and can then find ways to exploit those individuals or specifically target them with additional hacking.
Oh awesome. I guess we're all good then and nothing will come from it.lol! OPM databases don't elaborate on clearance information other than "Do you have a clearance? (Y/N). Who Sponsored it? Is it active?"
"target them with additional hacking"........................................... first of all, it's 2015.......... can we all stop using "hack" as a verb? Jesus.
2nd If a foreign agency was in datasets looking for valuable intel, they wouldn't tip themselves off by accessing Personnel Records........ that's low-hanging fruit.
Oh awesome. I guess we're all good then and nothing will come from it.
You are looking at this from an IT perspective and not how the information they gleaned can be cross referenced for further HUMINT gathering efforts. I agree with you that if you look at this in a bubble its not bad. If you start putting this with other elements you start developing a more complete, focused, and robust intelligence gathering apparatus.man, if you only knew what real threats were out there............ PII exposure just makes good news.
Think of it this way......... the data taken from OPM exists on systems that are set up like an onion...... peel a layer back, and there's another. These Chinese hackers gained access to some of the outside layers of that onion, and were able to get a significant amount of insignificant info.......... meanwhile, they hypothetically could know every single DoD employee who has a clearance..... doesn't matter, because not only is there so many awesome security features installed between the inner layers of that onion, that the "goods" that real hackers are after aren't even held on that onion to begin with............. so you're peeling back all the layers of one onion simply in HOPES of finding a way to then restart the process on another onion.
Produce aside, relax.
man, if you only knew what real threats were out there............ PII exposure just makes good news.
Think of it this way......... the data taken from OPM exists on systems that are set up like an onion...... peel a layer back, and there's another. These Chinese hackers gained access to some of the outside layers of that onion, and were able to get a significant amount of insignificant info.......... meanwhile, they hypothetically could know every single DoD employee who has a clearance..... doesn't matter, because not only is there so many awesome security features installed between the inner layers of that onion, that the "goods" that real hackers are after aren't even held on that onion to begin with............. so you're peeling back all the layers of one onion simply in HOPES of finding a way to then restart the process on another onion.
Produce aside, relax.
No, but Shrek is. Ogre's are like onions.Is Nathan Adrian behind this?