Comment

NSA Chief Alexander: We Don't Abuse Power, "And That's No Bullshit"

38
dog philosopher ஐஒஔ௸7/31/2013 3:29:03 pm PDT

re: #32 HoosierHoops

ave

Great observation Kragar.. When you log into a Database you are audited. When you view Tables the same is true.. When you make queries on Tables or joining views you are audited in a report. I’m sure there are red flags in those reports. I’m sure they have security on files. In fact, our files are encrypted that doesn’t allow any copy function to any other device like thumb drives or DVD’s or Hard drives. How they hell did Manning walk off with all those cables? Pisses me off.

QED the safeguards can be bypassed

i’ve seen the data flow monitoring applications that can be setup to red flag any disallowed data or file transfer, but in the end anything can be hacked