A crew of CIA contractors crafted a scheme to steal thousands of dollars worth of snacks from the agency’s snack machines. And they pulled it off – and then they got fired, of course.
This was no petty heist – the contractors apparently made off with over $US3000 of vending machine treats in a period stretching from the spring of 2012 to the autumn of 2013.
~ Diabolical! Wow, that really puts the Russians in their place, right? Now I really feel safe. OK, maybe not …
Western technology companies, including Cisco, IBM and SAP, are acceding to demands by Moscow for access to closely guarded product security secrets, at a time when Russia has been accused of a growing number of cyber attacks on the West, a Reuters investigation has found. Russian authorities are asking Western tech companies to allow them to review source code for security products such as firewalls, anti-virus applications and software containing encryption before permitting the products to be imported and sold in the country. The requests, which have increased since 2014, are ostensibly done to ensure foreign spy agencies have not hidden any “backdoors” that would allow them to burrow into Russian systems. But those inspections also provide the Russians an opportunity to find vulnerabilities in the products’ source code – instructions that control the basic operations of computer equipment – current and former US officials and security experts said. IBM, Cisco and Germany’s SAP, Hewlett Packard Enterprise Co and McAfee have also allowed Russia to conduct source code reviews of their products.
President Barack Obama reportedly approved the use of cyberweapons targeting sensitive Russian computer systems following the Kremlin-directed cyberattacks that upended the Democratic Party last summer, according to a new report from the Washington Post – one of the most comprehensive so far to describe the administration’s response to Kremlin cyber-aggression.
Unwillingness to foresee the future … Back in 2006, when the iPhone was a mere rumour, Palm CEO Ed Colligan was asked if he was worried: “We’ve learned and struggled for a few years here figuring out how to make a decent phone,” he said. “PC guys are not going to just figure this out. They’re not going to just walk in.” He was asked ‘what if Steve Jobs’ company did bring an iPod phone to market?’ Well, it would probably use WiFi technology and could be distributed through the Apple stores and not the carriers like Verizon or Cingular, Colligan theorised.
The point being, if you don’t understand a company’s goals, how can you know what their strategies and tactics will be?
The US government wasted millions of dollars dressing the Afghan Army in proprietary camouflage: the price tag for the never-ending, but occasionally paused, war in Afghanistan is well north of a trillion dollars by now. Nearly $US100 million ($132 million) of that is attributable to America’s generous decision to buy uniforms for the struggling Afghan National Army — and a newly released inspector general report says that as much as $US28 million ($37 million) of that cost was tacked on to pay for a proprietary camouflage pattern (above) that Afghanistan’s then-minister of defence thought looked cool.
~ I actually think it would be pretty effective … if they were fighting in Minecraft.
After nearly four years, David Lewandowski has created a new entry in his highly successful rubbermen videos. Now they’re hungry. In 2011, Lewandowski scored a hit with a short video titled Going to the Store, in which one impossibly flexible, sexless computerised humanoid traipsed through real world footage. Now there is an army.
As if there aren’t enough tech security threats to worry about, you also need to be on your guard against so-called ‘stalkerware’ — those invasive types of programs installed by suspicious spouses, jealous exes or controlling parents without your knowledge. Here are the warning signs to look out for, and what you can do about them.