News

3/24/2008
09:00 PM
Terry Sweeney
Terry Sweeney
Commentary
Connect Directly
Facebook
Twitter
RSS
E-Mail
50%
50%

Real Tossers

How long do you hang on to decommissioned hard drives and storage devices? Do you at least wait to make sure your new drives or backup applications are functioning properly? If you answered yes to that last question, there might be a job at the White House for you.

How long do you hang on to decommissioned hard drives and storage devices? Do you at least wait to make sure your new drives or backup applications are functioning properly?

If you answered yes to that last question, there might be a job at the White House for you.The latest wrinkle in the missing White House e-mail saga is that the drives are gone. Tossed out. Destroyed, even.

"When workstations are at the end of their life cycle and retired... the hard drives are generally sent off-site to another government entity for physical destruction," the White House told a federal judge last week.

Normally, a reasonably sensible storage professional makes sure all necessary data was properly copied. And, normally, new applications -- whether it's an e-mail server or the backup system for it -- are tested and re-tested before anything gets destroyed. But this situation isn't normal, and the story behind the story keeps changing, or getting added to, like one of those serial chain letters that clutter your in-box.

Earlier on, I was willing to give the White House and CIO Theresa Payton the benefit of the doubt about this mess. My suspension of disbelief about this is officially suspended. The way they've disclosed details about the chronology and methods behind their actions now sounds improvised -- very lately improvised.

I have no idea if the judge in the case, John Facciola, is technically astute where the ins and outs of IT are concerned. But I'm betting he's started to sense that something's a bit off. This has now gotten to the point where it officially insults the intelligence. We'll see just how insulted the judge is in the next chapter -- his response won't be any kind of throwaway.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12630
PUBLISHED: 2018-06-21
NEWMARK (aka New Mark) NMCMS 2.1 allows SQL Injection via the sect_id parameter to the /catalog URI.
CVE-2018-12631
PUBLISHED: 2018-06-21
Redatam7 (formerly Redatam WebServer) allows remote attackers to read arbitrary files via /redbin/rpwebutilities.exe/text?LFN=../ directory traversal.
CVE-2018-12632
PUBLISHED: 2018-06-21
Redatam7 (formerly Redatam WebServer) allows remote attackers to discover the installation path via an invalid LFN parameter to the /redbin/rpwebutilities.exe/text URI.
CVE-2018-12581
PUBLISHED: 2018-06-21
An issue was discovered in js/designer/move.js in phpMyAdmin before 4.8.2. A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted database name to trigger an XSS attack when that database is referenced from the Designer feature.
CVE-2018-12613
PUBLISHED: 2018-06-21
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attack...