netwit 2.01

WIKILEAKS How did Bradley Manning remove data from a US government intranet?



Insider Threat Behind Wikileaks Cybersecurity Saga

…according to the published chatlog of a conversation that Manning had with a fellow-hacker. “I would come in with music on a CD-RW labelled with something like ‘Lady Gaga’ … erase the music … then write a compressed split file. No one suspected a thing … [I] listened and lip-synched to Lady Gaga’s Telephone while exfiltrating possibly the largest data spillage in American history.” He said that he “had unprecedented access to classified networks 14 hours a day 7 days a week for 8+ months”.

Wikileaks cybersecurity saga shows importance of insider threats

Amichai Shulman, chief technology officer of data security specialist Imperva:

…there are hackers out there, but IT history has shown that the rogue employee is also a threat. The banking community is now starting to take action to protect its assets, but organisations have a long way to go before they can truly tackle the very real risks that insider threats pose to their reputation and integrity

…..it is very difficult today for organisations to control access to files at an individual level – particularly with collaborative behaviour being encouraged.




Advertisements

December 21, 2010 - Posted by | asset misuse, cyber security, data leakage, Guardian, insider security, Iraq war logs, Julian Assange, Network security, rogue employee, WikiLeaks

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: