Larry Wise, the Superintendent of the Shelby City Ohio’s Wastewater Treatment Plant, found a nude photograph of Mr. Richard Wolf on Mr. Wolf’s city-owned computer. Mr. Wise’s supervisor, Shelby Utilities Director Brad Harvey, involved the local police. The investigation discovered that Mr. Wolf spent 100 hours on-the-clock perusing adult-themed web sites and ultimately searching for, locating and communicating with a professional dominatrix. During the investigation, Mr. Wolf admitted that he did, in fact, use his work computer inappropriately and that his behavior was “unethical and wrong.”
Mr. Wolf was initially convicted of a number of crimes, including “Unauthorized access to a computer.” Under Ohio law, his actions were a felony. Mr. Wolf was sentenced to fifteen months in prison, ordered to pay a $5,000 fine and ordered to pay restitution of $2,392 to the city for the 100 hours of wages. On another charge, one count of solicitation (for Mr. Wolf’s efforts in soliciting a prostitute), Mr. Wolf was sentenced to 60 days in jail and a $500 fine.
The state established the prescription monitoring database in 2003 to track the sales of addictive drugs, largely in response to the widespread abuse of the painkiller OxyContin in Southwest Virginia.
“This particular database was one where it’s very important to have real-time information, to have it in electronic form,” Governor Tim Kaine said.
The Web site for the state’s prescription monitoring program was penetrated by a hacker who claimed to have accessed records for more than 8 million patients and more than 35 million prescriptions.
Virginia law requires notification of individuals whose personal information may have been accessed due to a computer security breach. The law states that notification must be provided “without unreasonable delay.”
The FBI and the Virginia State Police are investigating the matter.
Computer spies have broken into the DoD’s most expensive weapons program in history. The program is the $300B the Joint Strike Fighter, also known as the F-35 Lightning II. The intruders entered through two or three contractors’ networks. Lockheed Martin is the lead contractor on the program, and Northrop Grumman Corp. and BAE Systems PLC also play major roles. The intruders compromised several terabytes of data related to design and electronics systems responsible for diagnosing a plane’s maintenance problems during flight. Forensic investigators are unable to determine what data has been taken because the spies inserted technology that encrypts the data as it’s being stolen. Many have alluded to source IP addresses being those originating from within China but IP spoofing makes this ambiguous.
Within China’s borders, it controls Internet service providers and wireless networks. This leaves computers and PDAs susceptible to being monitored and infected with bugs – even remotely across the Internet.
Equipment left unsupervised in hotels, vehicles, or even in airport security screening can be hacked, mined and bugged.
“There is a high likelihood — virtually 100% — that if an individual is of security, political, or business interest to Chinese … security services or high technology industries, their electronics can and will be tampered with or penetrated,” says Larry Wortzel, who chairs the U.S.-China Economic and Security Review Commission, a federal panel that monitors China-related security issues for Congress.
India’s outsourcing industry has been struggling after January 30th’s Internet outage caused by the disconnect of two undersea cables. The effects span from Egypt to Bangladesh – India, Pakistan, Egypt, Qatar, Saudi Arabia, the United Arab Emirates, Kuwait, and Bahrain are all affected. Most notably, this has caused a slowdown in traffic on Dubai’s stock exchange. The outage was not noticed until Thursday the 31st when the workday began.
The Internet Service Providers’ Association of India claims this outage has caused a loss of half its bandwidth. .US companies have felt the impacts on its customer service outsourcing call centers such as Bank of America. Officials note the repairs could take up to one week. There is speculation that a ship’s anchor is to blame .