tag:blogger.com,1999:blog-4119943.post8740472294388901125..comments2023-09-29T06:57:06.991-07:00Comments on Anglachel's Journal: Suspect IntelligenceAnglachelhttp://www.blogger.com/profile/01110546252851760414noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4119943.post-15836091192519434322010-12-01T10:23:45.051-08:002010-12-01T10:23:45.051-08:00My brother works at a DoD facility, and none of th...My brother works at a DoD facility, and none of the computers in his building have a CD/DVD drive. While they do have USB ports, they have a custom version of Windows without drivers, so the USB ports don't work. <br /><br />The only way to get a copy of anything off his computer or network is to take a picture of the screen, and no cameras are permitted in the building. Oh, and they don't have access to any intelligence information, just equipment test and maintenance things and the like.<br /><br />The big question is, why aren't all computers connected to the SIPRNET treated in the same way?LBJhttps://www.blogger.com/profile/10945747422131663537noreply@blogger.comtag:blogger.com,1999:blog-4119943.post-90678760104965597302010-11-30T18:58:19.585-08:002010-11-30T18:58:19.585-08:00You start from the motivation and work your way ba...You start from the motivation and work your way back towards potential culprit. There are other ways too. Personally, I am not particularly curious about the whole topic as long as it doesn't involve bread and butter issues.<br /><br />The upcoming bank data may trigger my curiosity. It also may upset your argumentation. We'll see.<br /><br />One technical issue, if I were responsible for the security of the data, I would log all pairs of eyes and every amount of data moving around. If this isn't done then security is nonexistent.Koshem Boshttps://www.blogger.com/profile/01724595772791711326noreply@blogger.com