Meanwhile Nasa is doing a great job of leaking information by itself:
http://oig.nasa.gov/audits/reports/FY11/IG-11-009.pdf
http://oig.nasa.gov/audits/reports/FY11/IG-11-009.pdf
Quote:In addition, we found computers at the Kennedy disposal facility that were being prepared for sale on which NASA Internet Protocol information was prominently displayed. Internet Protocol information could provide a hacker with the details needed to target specific NASA network assets and exploit weaknesses, resulting in the compromise of sensitive information.
We found that some of these weaknesses had resulted in the inappropriate release of NASA data. Specifically, Kennedy released to the public 10 computers that had failed verification testing and therefore still contained NASA data. We confiscated four other computers (pictured in Figure 1) that had also failed the testing but were still being prepared for release or sale from the Kennedy Reutilization, Recycling, and Marketing Facility (property disposal facility). When we tested the confiscated computers, we discovered that one contained data subject to export control by the International Traffic in Arms Regulations (ITAR).
Best regards,
Leo van Miert
Horsepower is how hard you hit the wall --Torque is how far you take the wall with you
Leo van Miert
Horsepower is how hard you hit the wall --Torque is how far you take the wall with you
