Risk
8/3/2004
12:36 PM
Commentary
Commentary
Commentary
50%
50%

Banking and Terror: Business As Usual?

Amid the sprawl of government contractors that ring Washington, D.C. lies an IBM facility that acts as a backup site for many of the nation's largest financial institutions. Not two weeks ago, I toured the facility during a media event arranged by Visa USA, which was showcasing its annual capacity-planning testing process in preparation for the holiday season.

Amid the sprawl of government contractors that ring Washington, D.C. lies an IBM facility that acts as a backup site for many of the nation's largest financial institutions. Not two weeks ago, I toured the facility during a media event arranged by Visa USA, which was showcasing its annual capacity-planning testing process in preparation for the holiday season.The highlight of the tour was the data center, a 105,000 square-foot hardened shell filled with processors and storage. Off to one side is a telecommunications room, containing what looks like a giant ventilation shaft coming through the wall, but which is in fact an ultra-high bandwidth pipeline connecting the banks to the IBM data center which, in the event of a disaster, would continue to process mortgage payments and credit-card transactions on up to to multibillion-dollar foreign exchange and interbank settlements, without so much as a hiccup. Other than its size, what struck me about the room was its solitude; not a person was present. When I asked our tour guide why, he said, "We don't want anyone in here." He said he'd had a deuce of a time persuading IBM to grant us clearance. I was lucky; if the visit had been scheduled this week, it almost certainly would have been canceled. Over the weekend, the Department of Homeland Security issued a terror alert raising the threat level for financial institutions in New York, New Jersey, and Washington. While the financial-services industry has tried to strike a "business as usual" posture, my hunch is that the data center, still quiet as ever, is humming with activity as banks test their emergency backup plans, for if ever an occasion warranted it, this is it. I've asked IBM if this is the case; it declined to comment. But it's a safe bet that the telecom pipe that connects into the sinews of American finance is bulging with information this week, if only as an exercise.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice one
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0845
Published: 2015-04-17
Format string vulnerability in Movable Type Pro, Open Source, and Advanced before 5.2.13 and Pro and Advanced 6.0.x before 6.0.8 allows remote attackers to execute arbitrary code via vectors related to localization of templates.

CVE-2015-1318
Published: 2015-04-17
The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).

CVE-2015-1852
Published: 2015-04-17
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-mid...

CVE-2015-1856
Published: 2015-04-17
OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container.

CVE-2013-4866
Published: 2015-04-16
The LIXIL Corporation My SATIS Genius Toilet application for Android has a hardcoded Bluetooth PIN, which allows physically proximate attackers to trigger physical resource consumption (water or heat) or user discomfort.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.