As World War Two came to a close our troops began a concentrated effort to find where Hitler had stored the art and treasures he had looted from churches and museums throughout Europe. They found one of the largest caches at the lowest level of one of his bunkers behind massive vault doors. The Army Corp of Engineers were called in to determine how they could blow open the huge vault without damaging the delicate treasure believed to be locked behind this state of the art vault. While some of our best engineers discussed, measured and studied the vault mechanism, six feet away, a battle weary seargent kicked in the plaster wall and stepped inside the vault to discover the plundered treasures.
Today, some of our best software engineers create complex algorithims and security systems in an attempt to block unauthorized access to information treasures. Choicpoint had developed one of the most sophisticated systems in order to protect their own treasure, the compiled records of every American citizen. The Nigerian criminals who stole up to a quarter million identities from Choicpoint bypassed the security entirely by kicking in the plaster walls of the Internet. They simply used fifty previously stolen identities to open fifty bogus accounts and gain fifty authorizations and passwords.
Terroists used similar tactics to hijack an Arkansas State Transportation server and a California geographic information company to broadcast the bandwidth intensive beheading of Paul Johnson. See: Who Owns This Place? Al Qaeda's War rages online.
Authorization and passwords on even the most secure system serve as no barrier to determined scam artists or terrorists. It is like putting a high tech titanium padlock on a cardboard box and then passing out a few million keys.
to post a reply:
login - or -
register