Showing posts with label Data Mining. Show all posts
Showing posts with label Data Mining. Show all posts

Friday, April 17, 2009

285 million records breached


See the original image at news.cnet.com —

285 Million Records Compromised by Data Breaches in 2008

news.cnet.com — More records were breached in 2008 than in the previous four years combined as a result of a few large breaches involving payment cards, according to a report released on Wednesday. There were 90 confirmed data breaches and the top five breaches accounted for 93 percent of total records compromised


(In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. I.U. has no affiliation whatsoever with the originator of this article nor is I.U endorsed or sponsored by the originator.)


The Nazis, Fascists and Communists were political parties before they became enemies of liberty and mass murderers.

Tuesday, May 13, 2008

Inside The Data Mine

These bastards ought to be sued 'til hell won't have it.

If Bush is successful at making it off limits to sue them, leaving Americans have no legal recourse, it might be worse for the CEOs and other corporate officers of the spying corporations than a law suit.

by Onnesha Roychoudhuri

On April 20, 2007, former Qwest telecommunications CEO Joseph Nacchio was found guilty on 19 of 42 counts of insider trading. “For anyone who has ever made a call in Qwest territory, the term ‘convicted felon Joe Nacchio’ has a nice ring to it,” U.S. prosecutor Troy Eid told the press. The mood was fairly universal. One securities lawyer pitched in: “The government has another notch in their belt. They’ve had a tremendous winning streak in these corporate crime cases.”

But it would have been more accurate to qualify the statement by saying that the government has had a tremendous winning streak in the corporate crime cases it chooses to pursue. We now know that the Securities and Exchange Commission has chosen not to pursue charges of insider trading in the case of a Wall Street executive named John J. Mack because of his “political clout.” And while former U.S. Attorney William Leone led the case against Qwest, he was one of the unfortunate attorneys on the Department of Justice’s “purge list,” replaced by none other than Bush-nominated Troy Eid, a former co-worker of Jack Abramoff at the firm Greenberg Traurig.

In the wake of the Enron scandal, Nacchio’s verdict could be seen as the continuing triumph of an efficient and unbiased judicial system—one working to protect the people’s interests against unbridled business tycoons. But the insidious environment of purges and selective prosecution based on cronyism necessitates a more critical view. To celebrate Nacchio’s verdict in such a simplistic light would miss a far more interesting story about what telecommunications success and failure signify in a post-September 11th world.

Delving into Joseph Nacchio and Qwest’s story reveals a company with close ties to the White House—ties that appear to have been temporarily severed when, according to Nacchio and his legal team at Qwest, the company refused to participate in the government’s data-mining program—making it the only big telecommunications company that didn’t take part. Nacchio claims that secret government contracts he was expecting were never delivered after his refusal to participate in the National Security Agency program, resulting in skewed profit claims.

While currently under new leadership, wooing back government contracts, and finally turning a profit, Qwest will have to struggle to maintain a competitive edge in an industry of telecommunications giants. These giants have received favorable treatment from the Department of Justice and the Federal Communications Commission. Parallel to this success have come news reports that these ever-merging entities—notably AT&T, BellSouth and Verizon—are participating in domestic data-mining programs.

In an amoebic dance, SBC, AT&T, Bell South, Cingular, MCI and Verizon have all coupled and re-coupled, forming a terrain redolent of the days of Ma Bell. Comedian Stephen Colbert, with deadpan delivery, traced the acrobatics in his January 2007 TV primer explaining why Cingular changed its name to AT&T:

As you no doubt remember, Cingular was co-owned by BellSouth and SBC, which had been Southwestern Bell and Ameritech, which before that had been Illinois Bell, Wisconsin Bell, Michigan Bell, Ohio Bell, and Indiana Bell. ... A couple of years ago Cingular bought AT&T Wireless and renamed it Cingular, but then SBC bought AT&T and changed its own name to AT&T. Then that new AT&T bought BellSouth, changing its name to AT&T, making it only logical to change Cingular into AT&T.

These mergers are even more conspicuous due to the number that have been approved in just the past three years. 2005 alone saw enough mergers to leave Americans with only two major telecommunications companies: Verizon and AT&T. Colbert cites the most recent and highly contested AT&T/BellSouth merger that combined the country’s two largest telecommunications companies. Despite the massive scope of the merger, when the Department of Justice conducted its regulatory analysis it concluded that there were no major antitrust issues.

In contrast to companies such as AT&T, BellSouth and Verizon, Qwest has encountered significant roadblocks in its expansion efforts, causing telecommunications experts to ask pointed questions about differing treatment from the Department of Justice, the FCC and the SEC. Specifically: Is there government retribution? The question gains clout in light of the recent U.S. attorney scandal and the selective prosecution that the Bush administration has been practicing.

The ties between the telecommunications industry and the White House have grown even deeper since the Sept. 11 attacks, making it impossible to understand data mining or the telecommunications industry without exploring this relationship.



(In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. I.U. has no affiliation whatsoever with the originator of this article nor is I.U endorsed or sponsored by the originator.)


The Nazis, Fascists and Communists were political parties before they became enemies of liberty and mass murderers.

Wednesday, February 14, 2007

How Many Laptops Can The FBI Lose?

Apparently, quite a few?

Has the FBI always been so sloppy, or is this something new?


FBI lost 160 laptops in last 44 months
2/12/2007 1:44:14 PM, by Nate Anderson

How many laptops does the FBI lose?

The Office of the Inspector General (or OIG; it's a part of the Department of Justice) sought to find out back in 2001, when it did an initial audit of the Bureau's losses of both weapons and laptops. The findings of that first audit were bad enough that the OIG began a follow-up on it, the results of which have just been released. The good news is that losses are dropping. The bad news is that they're still happening, and the FBI doesn't know if secure information is entering the wild.

When the initial audit was completed in 2002, the FBI was losing 3.82 functional weapons a month (training weapons were going missing at an even higher rate of 5.07 each month). Laptop losses were even worse, with 10.71 disappearing every thirty days. The new audit shows significantly better numbers: only 1.09 functional weapons and 2.64 laptops were lost each month, and losses of training weapons dropped all the way to 0.41.

While the OIG applauds the work that the Bureau has done so far, they still raise questions about the loss rate and about the FBI's procedures for handling such events. Losing guns isn't a good thing, but losing laptops can be just as bad, especially when they contain classified information. Unfortunately, the OIG determined that the FBI doesn't even know which of its computers contain such information.

"Perhaps most troubling," says the report, "the FBI could not determine in many cases whether the lost or stolen laptop computers contained sensitive or classified information. Such information may include case information, personal identifying information, or classified information on FBI operations." Laptops can also contain goodies like the software that the FBI uses to make its identification badges, a copy of which was installed on a laptop stolen from the Boston Field Office in July 2002.

In the 44 months that it took to complete the new audit, the FBI lost 160 weapons and 160 laptop computers—a massive improvement over the 354 weapons and 317 laptops lost during the first 28-month-long audit. In any organization the size of the FBI, equipment is going to be lost, misplaced, or stolen, so perfection is not to be expected. The substantial progress made by the Bureau is encouraging, but the OIG still claims that the FBI "has not taken sufficient corrective action on several recommendations contained in our 2002 audit report."

To help them fix the problems, the OIG has thoughtfully offered 13 more suggestions. For example, the FBI has to make sure that a form FD-500 is filled out that describes the contents of every laptop computer, and it needs to do a better job of making sure that employees leaving the agency return FBI property.

(In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. I.U. has no affiliation whatsoever with the originator of this article nor is I.U endorsed or sponsored by the originator.)


The Nazis, Fascists and Communists were political parties before they became enemies of liberty and mass murderers.