What is wrong with a typewriter?
- Only an idiot would connect top secret information to computers that link to the Internet or use email. But the so-called "best and brightest" in government and the military do this every day.
- Forgive this "crazy" old Blogger, but if I really wanted to keep a secret from enemies I would type the document and hand deliver it.
(Townhall) - Just weeks after the FBI issued an indictmentless indictment of Hillary Clinton over her “extremely careless” behavior using a private email server to both send and receive classified information, the Democratic nominee has decided it would be funny to mock Donald Trump for wanting more secure military communications.
Trump argued last week during a campaign rally in Colorado that using paper wasn’t so bad since everyone is getting hacked these days.
"Everybody's being hacked," Trump said on Friday. "Let's not send it over the wires so everybody's probably reading it."
"I like the old days, especially for the military and things like that," Trump said. "You want to attack or you want to do something, it's called [a] 'courier.'"
"It's called, 'Let's put it on a thing, put it in an envelope and let's hand it to the general,'" he continued.
This prompted a sarcastic response from Clinton suggesting Trump use “carrier pigeons” instead.
What a bizarre issue to attack Trump on given Clinton’s own problems with secure communications as secretary of state, not to mention the recent hacks of the Democratic National Committee, the Democratic Congressional Campaign Committee as well as her own campaign.
Read More . . . .
The Locked Filing Cabinet The locked file cabinet in a locked and guarded room. The old fashioned, low-tech way to protect documents from cyber theft by either foreign governments or hackers. But I am just a "crazy" Blogger. What do I know? . It's not like computer theft and hacking is something new. Way back in the 1983 movie "Wargames" Matthew Broderick hacked into NORAD and nearly started a nuclear war. But after all these years the idiots in our military and in government still store vital data in computers where any 16 year old in the world or government employee can hack in and steal it. |
1 comment:
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (1989 book written by Clifford Stoll). Obviously nothing new here... they didn't listen then, they wont listen now (another book, cant remember pretty much the same thing. The IT guy KNEW someone was in the system....The board of directors said "just kids... dont worry, dont spend any time or money".... The Chinese released THEIR product months ahead of them, and a lot cheaper (no R%D costs).... Company went bankrupt by the way...
Post a Comment