Jump to content

Recommended Posts

Posted

And this is right after they shipped live Anthrax all over the country. Yobama administration has got this govt. runnin like a well oiled machine or like one they would love to run into the ground!

Posted

This could have been prevented. Overly strict policies cripple the efforts of everyone working in n the governments cyber fields. There is a reason this came out while the patriot act is up in the air. Everyone screams privacy, but what about the privacy of those 4 million people.

Posted

This admin. is so busy trying to curb our rights and invade our privacy  that they are not taking care of the things that is really their job. Keeping Americans safe!

People are so worried about privacy that the government/administration can't possibly stop these attacks from occurring. 

Our cyber rules of engagement are more restrictive than our current combat rules of engagement.

Posted (edited)

This is govt.  employee database why cant they make it secure its theirs it has nothing to do with my privacy!  

 

Edited by 77
Posted

This is govt.  employee database why cant they make it secure its theirs it has nothing to do with my privacy!  

 

But it does. China is smart enough to use U.S. infrastructure in their attacks. Simply put, they use your computer. The NSA is not allowed to touch your computer without approval from the very highest levels. Even when a U.S. computer has been compromised, the NSA cannot identify that computer in reporting without months of waiting for approval. 

You guys should really read SP0018.

 

 

That being said, cyber is a difficult field. It is always changing, and their are no rules. It is impossible to stay in front of the new techniques for intrusion. By the time our national firewalls are updated from the last intrusion a new piece of malware is already being sent out.

Posted

But it does. China is smart enough to use U.S. infrastructure in their attacks. Simply put, they use your computer. The NSA is not allowed to touch your computer without approval from the very highest levels. Even when a U.S. computer has been compromised, the NSA cannot identify that computer in reporting without months of waiting for approval. 

You guys should really read SP0018.

 

 

That being said, cyber is a difficult field. It is always changing, and their are no rules. It is impossible to stay in front of the new techniques for intrusion. By the time our national firewalls are updated from the last intrusion a new piece of malware is already being sent out.

​think its time for our govt to get smarter. 

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Member Statistics

    46,282
    Total Members
    1,837
    Most Online
    Unknown472929300
    Newest Member
    Unknown472929300
    Joined


×
×
  • Create New...