Your System Is Only As Secure As The Operators

This article - with the usual mix of decent-to-good facts reportage and mind numbingly stupid speculation and conclusions we've come to expect from Wired- reminds us that no matter how good your system is, one guy with credit card debt on the night shift can ruin your entire day.

That's not to say that the possibility of hacking access control and surveillance systems shouldn't be considered, of course, but... Occam's Razor, people, especially when the bad guys seem to be fortuitously positioned to take advantage of a massive systems failure. Come on.

Login to read this IPVM discussion.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

*** ******* ** *** ****** **** **** **** *** *********, a *** *** * ***. *** *** **** ** ***** to **** *** ***. *** *** **** ** ***** ** keep *** *** **** ******** *** *********.
~Warren *. ******; As cited in: Mark Fisher (1991) The millionaire's book of quotations. p. 151

***'* ***** *** **** **** ** *******.

*** ****'* ***** ******* ** *** ** *** ******** *****-****** of *** ******, **** ********** *** ********? *** *** ******** audit ****** ****** **********? ****, *** *** ***, **** ********* detail.

*'* *********** ****** **** * ****** *******, ** *** * lack ** ***** ***** ********, **** ** ***-****** ********, *** so **. ***** *** ****** ******* ** ****, ****** ********* aren't ******** *** ** ****** ***, *** *** ****** ****** off **** *********** ***************.

** *** ** *** ******* ****** *** *** *** * web-cam ** *** *****-******. ** **** *** *********** ***** ***, chatting **** **** ******* ** ******, ** **** *** ****** record *** ** ** *** ******* **** ******** ******* *** taken?

*** **** ***** **** ***** *** ******** *** *** ** the ******* ***** **** ** *** *******, ******** *** *****. I'll *** *** *** ***** ****'* ****** ****. ****** ***** the **** **** *** ***** ****** ***** *** ***** *** then **** **** **** *** ******* *******!

******** *'** **** **** ******** ** * *** *****-***-**** ************** for ****/****** *********, **** **** *** ******** "******" *** ******** intentional **********. ** *** *********, * ******** ***** ****** ******* would ******** ****** ************ **** *** ****** ******* ******'* ********, to ***** ******* ** ****** ** *** ******** ******. ******** and ***** **** *** ************ **** ** ******** *****. ***** (at **** ****) *** ** *** *****, ***** **** ******** and *** ** ***** ** ******* ** ***** ****** ******** storage.

*'* ********** *** ****** *** ******* *** ****** **********, *** I ** ****** **** *** *** ******* *** ************ ******.

*** ***** "******** ******" ****** **** ********* * ******* ****** examination *** * ********** ** ****** *** ******* ***************.

**** ** *** *** ****** ******* ****** ****, ** *** common *** ******** ******** ** ****** ********* ** ******* **** to ****** *** ****** ******* ******** ******** (***** *** **** of *** ********* ** ******** *******) ** *** **** ******** on *** ******** *****. ************, ****** **** *** ***** ******** by *** ******** ****** *** ****** ** *** ***** *****! These ********** **** ****** ***** *** ********** ** ******* ****-*** and ********** *** ******** **** ***** **** ******** ****** *****.

** *** **** ** ******* *.* **** *** (******* **** Exchange) *** *** *** **** *** ****** ******* ********, ** was *** ** *** *** *** ** ******* *** **** play **** *** "****** ****" ********, *** **** *** *** vendor ***** ****** **** ** *** ******** ** ****** ***** without ***** ******* ******** *******, ** **** *********!

*** ***** *** ***** ********-***** *** *******-***** *************** **** ****** deployments, *** * ****** *** ***** *********.

*** ****** ** **** ****** *** *********** ** *** ****** who ********* *** ******* **.