Nuclear Weapons, CyberSecurity and an Unlocked Door.

Robert Siciliano Identity Theft Expert Speaker www.IDTheftSecurity.com

What happens when you have an unlocked door at the home of and employee at the top U.S. nuclear weapons laboratory? How about 3 stolen computers with yet to be disclosed data, that was said to be non-classified. We hope. Were the computers stolen to be resold for crack? Or for nuclear weapons secrets? We may never know. Or we may find out the hard way.

At the Los Alamos National Laboratory in Santa Fe New Mexico dozens more (67 total) systems are currently listed as missing. Officials are conducting a full review of the lab’s policies and procedures governing the use of official computers at employees’ homes.

Situations like this are common in every industry with every conceivable form of data. We just wish it wasn’t data from a nuclear weapons facility.

Its important to point out that the facility has as many as 40,000 computers including desktops, laptops, PDAs, printers and so on. Do the math, less than a .25 percent lost or stolen. The lab has been documented at a better than 99.5 accountability rate.

We know there is no such thing as 100% security whether protecting from hardware or data thieves. Security is an ongoing, never ending, consistent, on your toes, don’t let your guard down, vigilant process.

And its not just criminal hackers causing big problems, lowly burglars looking for their next bag of dope stole a laptop computer from the home of a government employee containing 26.5 million Social Security Numbers, a US primary identifier. This $500 laptop cost millions.

Can you say your organization has a 99.5% success rate?

What policies do you have in place to foster a security minded culture? Here are just a few bullets as examples for you to add too.

# Cover all organizational systems used for processing, storing or transmitting personal information.

# Security risks faced assessed in the development of the policy

# Cost-effective measures devised to reduce the risks to acceptable levels

# Monitored and periodically reviewed.

# Staff and management made aware of the protective security policies and how to implement them.

Robert Siciliano discussing another hack Here

Identity Theft Expert and Speaker on Personal Security: Young, Organized Criminal Hackers Can Hijack Unprotected Computers on a Grand Scale

(BOSTON, Mass. – Dec. 5, 2007 – IDTheftSecurity.com) News reports indicated last week that law enforcement authorities recently arrested a New Zealand-based, 18-year-old alleged leader of a botnet. According to Robert Siciliano, a widely televised and quoted personal security and identity theft expert, law enforcement activities that led to the apprehension of the teenager and others this year are critical in the fight against computer crime. But he also noted that computer users themselves can do a great deal to thwart criminal hackers’ activities.

“Robust law enforcement is a key approach to slowing criminal computer hackers,” said Siciliano. “These criminals need to know that somebody might be watching. But just as important is robust computer system security. Criminal hackers, including those who specialize in botnet activity, take the path of least resistance and often will be dissuaded by computers that have up-to-date antivirus software and hardy firewall protection installed.”

CEO of IDTheftSecurity.com and a member of the Bank Fraud & IT Security Report’s editorial board, Siciliano leads Fortune 500 companies and their clients in workshops that explore consumer education solutions for security issues. An experienced identity theft speaker and author of “The Safety Minute: 01,” he has discussed data security and consumer protection on CNBC, on NBC’s “Today Show,” FOX News, and elsewhere.

On Nov. 30, the Guardian Unlimited reported that law enforcement officials in New Zealand had apprehended an 18-year-old, alleged leader of a botnet hacking ring who went by the online identity of “Akill.” His ring, according to the article, was responsible for the remote control of about 1.3 million computers and the pilfering of $20 million. (Wikipedia defines a botnet as “a jargon term for a collection of software robots, or bots, [that] run autonomously and automatically…on groups of ‘zombie’ computers controlled remotely by hackers.”)

On the same day, Computerworld ran an article covering the events in New Zealand. Computerworld’s report further revealed that the arrest of the teenager was part of Operation Bot Roast, an FBI effort to crack zombie computer rings by working with law enforcement agencies worldwide.

“The FBI’s success in bringing criminal computer hackers to justice is to be applauded,” said Siciliano. “But the lack of attention to computer security on the part of individual users is making law enforcement’s job all the more challenging and urgent. Anyone with a personal computer must take antivirus and firewall security seriously.”

Siciliano added that criminal hackers use computers compromised by spyware and viruses, including those that facilitate botnet activity, to commit identity theft and fraud. Furthermore, he said the ubiquity of Social Security numbers as universal identifiers helps identity thieves both online and off-line. Earlier this year he appeared on “FOX News” to explain how (readers may view YouTube video of his comments below).

Anyone wishing to learn how to protect himself or herself against identity theft may view video of Siciliano at VideoJug.

###

About IDTheftSecurity.com

Identity theft affects us all. Robert Siciliano, CEO of IDTheftSecurity.com and member of the Bank Fraud & IT Security Report’s editorial board, makes it his mission to provide consumer education solutions on identity theft to Fortune 500 companies and their clients.

A leader of personal safety and security seminars nationwide, Siciliano has been featured on “The Today Show,” CNN, MSNBC, CNBC, “FOX News,” “The Suze Orman Show,” “The Montel Williams Show,” “Maury Povich,” “Sally Jesse Raphael,” “The Howard Stern Show,” and “Inside Edition.” The Privacy Learning Institute features him on its Website. Numerous magazines, print news outlets, and wire services have turned to him, as well, for expert commentary on personal security and identity theft. These include Forbes, USA Today, Entrepreneur, Woman’s Day, Good Housekeeping, The New York Times, Los Angeles Times, Washington Times, The Washington Post, Chicago Tribune, United Press International, Reuters, and others.

Visit Siciliano’s Web site, www.IDTheftSecurity.com; blog, www.realtysecurity.com/blog; and YouTube page, http://youtube.com/stungundotcom.

The media are encouraged to get in touch with Siciliano directly:

Robert Siciliano, Personal Security Expert
CEO of IDTheftSecurity.com
PHONE: 888-SICILIANO (742-4542)
FAX: 877-2-FAX-NOW (232-9669)
Robert@IDTheftSecurity.com
www.idtheftsecurity.com

The media may also contact:

Brent W. Skinner
President & CEO of STETrevisions
PHONE: 617-875-4859
FAX: 866-663-6557
BrentSkinner@STETrevisions.biz
www.STETrevisions.biz