


Sprint Routers Stolen; NYC Internet Outage Ensues 407
cbnet2004 writes "This story on eWEEK reports that late Sunday night a number of Sprint's DS-3 network cards were stolen from a Verizon colocation center at 38th St in Manhattan. Some customers apparently have service back but a number remain down -- it could be a while. The latest rumor on this situation is that some fiber optic cables were cut as well; this could put the affected customers out for days more."
Was it easy? Why was it not major? (Score:5, Interesting)
This quote sort of caught me off-guard as I imagine some customers might disagree:
Fleckenstein said that the outage was "not major," and not large enough to require a report to the Federal Communications Commission.
The beginning of the article states:
A handful of corporate customers were left without e-mail and Internet access Monday after the theft of networking equipment from a New York City office late Sunday.
So, I would guess that the "handful" of corporate customers who lost service probably felt it was major to them. I understand the notion that it was not major in the sense of being more widespread, I just think his comment could have been worded better.
Happy Trails!
Erick
Re:Was it easy? Why was it not major? (Score:5, Insightful)
Re:Was it easy? Why was it not major? (Score:5, Interesting)
Ar....that remind me of my days in a research lab.
Security guards downstair would be 'notified' whenever someone is attempting to reboot those SGI workstations at night. The problem was that SGI hanged up quite often. When this happen, we should either move to another workstation, wait til tomorrow morning. Sometime we had no choice but to trouble those security guards when we ran out of unhanged SGI.
Initially those security guards were nice to us as we didn't do reboot very often - until someone decided to replace all those SGI workstations with NT Alpha. You imagine how irritating to have been called 2-4 times every night.
Soon after the SGI were replaced by NT Alpha, those reboot-alarms were removed for obvious reason.
Re:Was it easy? Why was it not major? (Score:4, Interesting)
Not sure about SGI, but most standard UNIX machines can be rooted if you can get a custom boot floppy to boot so you can access the filesystem. NT is more difficult to compromise this way due to its convoluted/security-by-obscurity NTFS. That is not to say that NT is more secure, merely that this particular method is less useful.
Re:Was it easy? Why was it not major? (Score:3, Informative)
What I meant is that it is harder to reset the root/admin password and/or install keyboard sniffers etc. And there is no such thing as a NT boot floppy, you mean a set of 4 uber-hacked disks at the minimum to get some sort of command prompt. NT is famous for being a royal PITA to repair from floppies, that is why there are bootable Linux CDs with (partial) NTFS support on them so you can at least try. Most
Re:Was it easy? Why was it not major? (Score:4, Informative)
That can be a boot floppy too.
On a NT/2000/2003 box, PDC/AD-PDC etc, I can get complete root access in less than 10 minutes, provided I can boot from CD/floppy. (If the file system is encrypted, then no go, but I suspect that is very rare.)
Sure NT/2000 can be a pain to *fix* if the filesystem trashes a bunch of things. But we're talking about a system that is functioning properly.
And with the shatter exploits, priviledged escalation is trivial on a Win box.
Frankly, for most boxes, local access is game over, but for Win boxes, it's pretty dang easy. Just do a google search for "NT reset password" - the first link is a free-ware utility that will do it easily for you. Ironically, it uses Linux and Linux drivers to do it for you...
Cheers,
Greg
Re:Was it easy? Why was it not major? (Score:3, Funny)
DataCenter Security (Score:4, Interesting)
Admittedly in these datacenters there were cameras everywhere..
And of course there are stupid people in these places -- like the folks (not from our company) that were wandering around and wondered "What does this Emergency Shutoff Button on this big power unit do?" Shut off a big portion of the datacenter. The result being certain folks permanently banned and better warnings/protection around the EPO buttons. (admittedly that's a tough one -- 'cause when you need to turn it off you REALLY don't want to waste time..)
Re:Was it easy? Why was it not major? (Score:3, Funny)
This happened when the lab was completely full in the middle of the day.
Re:Was it easy? Why was it not major? (Score:5, Insightful)
How can they not figure out who did it? (Score:5, Informative)
Sure, I could have brought in a stick and poked at lots of other customer's gear, thru the chainlink cubicles, but I mean, I was signed in and on camera.
Check the log - when did the affected net go down and who was there at the time?
It has got to be a short list of visitors and guards or somebody is really stoopid.
Re:How can they not figure out who did it? (Score:5, Informative)
The phrase collocation facilities could cover a wide range of facility types. It could cover a datacenter like you are thinking of, manned 24/7, or it could be a small switching center where Sprint has leased a rack from Verizon that is normally unmanned unless someone from Sprint or Verizon actually is working on the equipment.
There is one of the later near my apartment. Basically, a building smaller than a small house, with equipment from the ILEC and maybe one or two CLECs. I assume they have an alarm or security cameras, but someone could break the door, and be in and out, long before any police could arrive.
Unmanned Vz facilities (Score:5, Informative)
Re:How can they not figure out who did it? (Score:3, Interesting)
Re:Was it easy? Why was it not major? (Score:5, Funny)
Then again, I suppose it does take some network connectivity to build a Beowulf cluster...
Re:Was it easy? Why was it not major? (Score:5, Interesting)
We lost our direct extension phone dialing ability to them (could use the full 10 numbers though) and they completely disappeared from our network. They still had regular internet connectivity through a 100mbit cogent line and were able to access other company resources through our other offices Citrix metaframe farms [note 1] with almost full capacity but we still recieved numerous calls at our office as only the road warriors were actually used to using that method for access. We have the licences, horsepower, redundancy, and data sharing ability for this exact reason, well actually in case of another terrorist attack but it works for this too
[note 1]
One thing stood out above all of this. About a year ago, a discussion at a network/desktop meeting lead to a disagreement but eventually a gadget VBS workstation AD weenie created a script on the pc's to "automatically" select connections to our fellow offices Citrix servers through the internal network if you were plugged into the internal network. It was to "eliminate" any http or https confusion as you technically did not need https if you were already on the company WAN, I guess the KISS approach was not a challenge. That was all fine and dandy until today when the route was down. They eventually pushed out an undo so you could connect either way but I wanted to call up and laugh and say I told ya so but I decided not too. What comes around goes around.
Re:Was it easy? Why was it not major? (Score:3, Interesting)
That bugs me more than people bringing down the Internet via theft...
sujal
Re:Was it easy? Why was it not major? (Score:3, Interesting)
Potential Suspects (Score:5, Funny)
Re:Potential Suspects (Score:5, Funny)
I think we found them [slashdot.org] already....
Be on the lookout for... (Score:5, Funny)
Re: Be on the lookout for... (Score:5, Funny)
I don't see anything unusual yet [ebay.com]
That's odd .... (Score:5, Funny)
How many people were affected by this?
Re:That's odd .... (Score:5, Funny)
Good question, but now I guess we have a pretty good idea where all the FP trolls are from.
Haha (Score:5, Funny)
Who'd you sell it to? Dude will be busted. Someone walks up to you in an alley and say "wassup cuz you wanna buy a ds3 innernet?" it raises eyebrows.
Re:Haha (Score:3, Funny)
(In reality, stolengoods.com is just a parked domain, no need to waste your time.)
Re:Haha (Score:5, Funny)
We are talking NYNY here, right? Here in the Midwest, our impression is that no one would blink if you walked up to them and tried to sell them an oil drilling rig or an Aegis cruiser.
Re:Haha (Score:3, Funny)
Wanna buy?
p
Re:Haha (Score:5, Funny)
Imagine some druggie snorting coke off of a WinXP CD with the ds3 card, "Dude this is way better than a mirror and razorblade..."
Re:Haha (Score:5, Funny)
I would have bought it in a second. Cash. (Score:4, Interesting)
My point is, Seth was not special, there are many many places to off high end network gear.
Re:Haha (Score:3, Interesting)
Hmm (Score:4, Funny)
Story from the mysterious future... (Score:5, Funny)
NIC thieves busted! Traced by MAC Address when the stolen components were plugged in.
Re:Story from the mysterious future... (Score:5, Funny)
MOD UP! (Score:3, Funny)
Re:Story from the mysterious future... (Score:5, Funny)
Re:Story from the mysterious future... (Score:4, Funny)
Disgruntled? (Score:5, Funny)
I'm surprised it didn't happen sooner.
Re:Disgruntled? (Score:5, Insightful)
Small Business Killer (Score:3, Interesting)
The tiny company went out of business a few monthes later.
It is sad that we can't just put things in locked rooms and c
That's the same combination on my luggage! (Score:5, Funny)
Poor security or inside job? (Score:5, Interesting)
It'll be interesting to see where this investigation goes.
Re:Poor security or inside job? (Score:5, Insightful)
I have shopped around for a data center more than once. The people who take you on the tours are so eager for your business (at least nowdays) that they show you just about everything. One company even took me into a place where pretty much all the connectivity in Seattle passes through (a level 3 node or something, I can't recall the name.) This place was secured by two locked doors with no guards and street level access. I have seen plenty more 'security' that would be pretty easy to bypass. If you were a terrorist, it would be pretty damn easy to destroy many of these places.
The more (Score:3, Interesting)
Reading the Article and (Score:3, Funny)
Re:Reading the Article and (Score:5, Funny)
:)
Did anyone check ebay? (Score:3, Funny)
Probably being sold on the street (Score:3, Interesting)
stolen for money? (Score:2, Interesting)
man.... (Score:3, Funny)
so. (Score:4, Interesting)
1. An employee stole the stuff and cut the wires to make it look like a vandal.
2. A vandal actually did it and will soon sell the goods on ebay
3. Spring is making the whole thing up to cover up their incompetence
4. The entire world is on crack.
Personally, I would vote choice 1.
You forgot.... (Score:3, Funny)
6. PROFIT!!!!
OMGOMGOMG! (Score:4, Funny)
Thanks!~~~
Re:OMGOMGOMG! (Score:3, Funny)
CASE SOLVED (Score:5, Funny)
"late Sunday night a number of Sprint's DS-3 network cards were stolen from a Verizon colocation center at 38th St in Manhattan"
This can also be read:
"late Sunday night a number of MAJOR TELCO's DS-3 network cards were stolen from a RIVAL MAJOR TELCO colocation center at 38th St in Manhattan"
The reward money can be sent to my spam-obfuscated email addy.
Re:CASE SOLVED (Score:5, Interesting)
VZ, especially in NYC, has a bad reputation for these antics.
Re:CASE SOLVED (Score:4, Funny)
Re:CASE SOLVED (Score:4, Funny)
Sweet validation. (Score:3, Funny)
Physical Security (Score:5, Insightful)
Most people spend way too much time on thinking of attacks from the Internet or employees, but usually don't look at someone who wants to sabotage the equipment. Computer rooms usually contain all of the proprietary data in a company, and most companies don't put that much effort into patrolling computer rooms for people who shouldn't be there. Executives should make sure that physical security is part of the I.T. plan from the beginning and not an afterthought.
I'm assuming in this case it was in a Verizon C.O. which are usually somewhat secure, but something like this could happen anywhere, computer sabotage I think will become more and more common in the future as businesses rely more and more on them.
Re:Physical Security (Score:4, Informative)
1.) If it's plugged into the internet, it can be hacked.
2.) If they get to your hardware, you're fucked.
I'm still voting that it's an inside job.
~Will
Joint terrorism task force??? (Score:5, Insightful)
That's just great. Not that I don't hope they find the crooks to walked off with this stuff - but once the word "terrorism" pops up, all of the sudden I'm thinking Patriot Act.
These thieves might have gotten themselves some kick butt network hardware - but I bet they won't get themselves due process
Re:Joint terrorism task force??? (Score:5, Insightful)
I see a problem. Last year the Patriot act was only for infringing the constitutional rights of terrorists. Last week, it was only for terrorists and drug smugglers. Today it's terrorists, drug smugglers, and network card theives. Who's up next for loss of due process? People accused of robbery? Fraud? Speeding? Keeping overdue library books?
If you start denying due process to anyone it erodes the rights of everyone. Now we're seeing that slippery slope in action.
Re:Joint terrorism task force??? (Score:4, Informative)
Patriot Act Suppresses News Of Challenge to Patriot Act
By Dan Eggen
Washington Post Staff Writer
The American Civil Liberties Union disclosed yesterday that it filed a lawsuit three weeks ago challenging the FBI's methods of obtaining many business records, but the group was barred from revealing even the existence of the case until now. The lawsuit was filed April 6 in U.S. District Court in Manhattan, but the case was kept under seal to avoid violating secrecy rules contained in the USA Patriot Act, the ACLU said. The group was allowed to release a redacted version of the lawsuit after weeks of negotiations with the government.
"It is remarkable that a gag provision in the Patriot Act kept the public in the dark about the mere fact that a constitutional challenge had been filed in court," Ann Beeson, the ACLU's associate legal director, said in a statement. "President Bush can talk about extending the life of the Patriot Act, but the ACLU is still gagged from discussing details of our challenge to it."
A Justice Department spokesman declined to comment on the case.
The ACLU alleges that a section of the act is unconstitutional because it allows the FBI to request financial records and other documents from businesses without a warrant or judicial approval. The group also says such requests, known as "national security letters," are being used much more broadly than they were before the Patriot Act. The bureau has issued scores of the letters since late 2001 that require businesses to turn over electronic records about finances, telephone calls, e-mail and other personal information, according to previously released documents. The letters, a type of administrative subpoena, may be issued independently by FBI field offices and are not subject to judicial review unless a case comes to court.
The ACLU's complaint focuses on the use of national security letters to obtain information held by "electronic communication service providers." The group says the letters could force Internet providers to turn over names, screen names, e-mail addresses and other customer information without proper notice to the people involved. The lawsuit names as defendants Attorney General John D. Ashcroft, FBI Director Robert S. Mueller III and FBI Senior Counsel Marion E. "Spike" Bowman. A second plaintiff has joined the ACLU in filing the lawsuit, but that plaintiff's identity has been redacted from the public copy of the complaint.
Re:Joint terrorism task force??? (Score:5, Insightful)
If we take away rights from whoever is unpopular with the government today, then we don't have rights, period. The whole IDEA of rights are to protect you from the government and other citizens. The worst scumbags in the world have rights. In fact, it's probably the scumbags who most SHOULD have them, because they NEED them the most.
The measure of your rights is what you retain when your your government hates you and wants you dead. Rights that you have only when popular aren't rights, but privileges, which are revocable.
Any group of people that values life over freedom is easy to enslave.
Re:Joint terrorism task force??? (Score:4, Insightful)
So you only get due process if you're suspected of a LITTLE crime? Once you add a few zeroes after the dollar sign, the rules change?
That's funny, after watching the way white collar criminals were dealt with (enron, etc), I was under the impression you were only given due process if you had a few extra zeroes after the dollar sign.
And by due process I of course mean a red carpet...
Well, that explains that... (Score:5, Funny)
No wonder eWeek was the first on the story, even though it took them a while to publish it.
Fiber Optics Cable Dynamics (Score:3, Interesting)
100K or so a year for fixing fiber optic cables... I'm definently in the wrong field. Of course, those technicians have to be very precise or else you get refraction in the wire.
Re:Fiber Optics Cable Dynamics (Score:5, Interesting)
I imagine fiber repair guys earn their pay, especially when it's out in some muddy hole and they have a couple hundred strands to fuse together while everyone is breathing down their necks.
Just wondering out loud... It would be really cute if some of the fiber repair guys worked for the NSA. "Of course there's a blip in the TDR, that's where we repaired it." "Okay, nevermind."
Working in the NOC (Score:5, Interesting)
Re:How they did it (Score:5, Insightful)
What's amazing (and it may not be the case, as we don't know all of the details, I'm sure) is that a simple correlation of the start time of the network down event and the sign-in log and security cameras (if any) hasn't been done to ID who did it. These facilities aren't particularly heavily trafficed by people on Sunday evenings, and they usually aren't all that big.
the verizon dude now sez (Score:4, Funny)
Osama World OnLine! (Score:3, Funny)
Large chat rooms available for to discuss with the experts on a variety of subjects: cultural assimilation, border crossings, language skills, practical chemistry, and MORE.
GIRLS, GIRLS, GIRLS!!!!!
Find the young Islamic girl of your dreams -- hajib optional. All credit cards accepted.
Visit Osama World OnLine NOW!!!
Routers Missing - Happens a lot. (Score:5, Interesting)
To be fair, I hadn't connected them yet, so they were just in the cabinet not powered up, and I was going to bring them up the next time I returned to that location, which was going to be in about 3 months. All to often, in a production environment, when there is an emergency, anything not powered up is often considered fair game. I'm sure that the routers are still in use at the company, I just can't find them.
Most colo space in our company is pretty secure. You'd have a pretty tough time getting in if you weren't supposed to be there. Even if you did get in to the colo space, most customers keep the stuff that they manage themselves in locked cages, inside the already secured colo space. Perhaps it was Verizon employees just trying to screw over Sprint. Or perhaps Sprint didn't secure their stuff properly.
------Can you hear me now?.
I am so NOT surprised. (Score:5, Funny)
I found it - (Score:3, Funny)
Well... maybe not found it... but sure found a replacement!
I wonder if Sprint can afford it.
Hmm... I wonder if I just put myself, or them, on the FBI watch list...
New York Theives... If it aint locked down (Score:4, Insightful)
Who would want this? Its big its heavy and useless to anyone but me (It powered a flash for my camera.)
Stolen.
So were the dirty clothes.
Basically if your not carefull or tie stuff down in NY it will be stolen. I got over it but I still miss New York
Re:New York Theives... If it aint locked down (Score:4, Insightful)
Forget co-lo. Go solo (Score:3, Insightful)
I do.
I've been to one of their data centers. I met the former black ops specialist who's responsible for building them up and locking them down. Take a router? Ha. You can't get in door of the datacenter, much less into the datacenter.
I'll go back to my own equipment when I need my 1000th redundant DB master. Then I think I can afford to build the redundantly powered, redundantly backed up, quadratically backboned, overly secured, continuously manned building that goes around important production servers. Funny how the facility is usually left out of the equation not only of the cost but of the requirements for 24x7 uptime.
I've seen one too many people lingering in the XO co-lo facility on Barranca in Irvine, CA (last time I was there, anyway) reading the ID tags and ip addresses of the servers in adjacent cages. No thanks. I think I can begin to keep out Internet intruders, but physical accessors always have an advantage (cloop.o or not).
But Quietly.. (Score:5, Insightful)
38th street datacetner (Score:3, Interesting)
I mention this because I have some anecdotal evidence that shows that as secure as the mantrapped and biometrically scanned datacenters are, they really arnt.
Location: Exodus, New Jersey (its the datacenter that was in the big new building above the first path station in NJ - I just cannot remember the name of the building or the train station!)
Time: summer 1999
Issue: company needs to move 16 servers, 2 routers, a firewall, some switces and hubs out of the datacenter.
Procedure to enter: get signed in via biometric security and massive checkin procedure at front door. To get to the front door, you have to walk by the freight elevator, as well as a little wooden door with a twist lock on it.
How I got my kit out: I simply "borrowed" a hand cart, and walked out the back door (the little one I passed on the way to the checkin facility) The twist lock was on the inside, so I just un-locked it and walked out without anyone seeing me.
This made me feel REALLY secure.
Stolen or damaged? (Score:5, Interesting)
My business initally heard stolen equipment but we were later told that it was caused by damaged equipment from a "Verizon union employee".
I was not on the call but that type of information is VERY specific and there is no gray area or room for interpetation there. I assume this is either totally 100% completely false or someone else knows something more.
Hmm... (Score:3, Funny)
FP !!! (Score:5, Funny)
Isn't it obvious? (Score:3, Funny)
Switch room ops (Score:5, Interesting)
The physical security is usually pretty good. About on par with a normal Fortune 500 company, where you scan into areas that you have a reason to be in. The switch room is usually a little harder to get in, especially since 9/11. At Nextel, they actually hired armed guards for a short while when we almost hired an alleged Felon. A competitors security guard recognized him and tipped off our security. Turns out he was supposedly part of a crew that carted off entire racks of telecom equipment.
Getting back on topic. The cards sound like they are the DS3 that pop into a larger fiber demark, like an OC12, 48 or 192. The cards are pretty small and just have coax-looking DS3 plugs on the front (in, out, and monitor). These aren't cards you could really ever use anywhere else. It almost sounds like someone accidentally yanked the wrong cards during maintenence. Although, most telecoms are very religious about not doing maint during the day (if the outage started at night, tho, I'd say it was a switch tech who screwed up).
The reason I'd assert this is the theft was too small to be of any other value. Three DS3 cards aren't going to fetch much, and they're tainted goods. If you're malicious, you're not going to just grab 3. If you're damaging a competitor, grabbing 3 cards is somewhat silly. We commonly have a backhaul path in preparation for things such as this. For example, when I worked at Nextel a fiber dig broke a couple DS3s we had going through PacBell. Within 4 or 5 hours, we swung the traffic over to other DS3s that bypassed the carrier and area with the break.
On a side note, it was also an eye opener that the "Protected, Redundant" Ring-topology that we were paying extra for was not being provided by the Telco. Let's just say there were some very colorful conversations going on between companies at the VP level.
Re:Switch room ops (Score:3, Informative)
Someone mentioned tracking by MAC address... an OC-3/DS3 is a channelized TDM line. 28 DS1 channels of serial data. This is below IP layer. The only identification is going to be a serial number. This will only matter if someone attempts to connect it with a service contract with the manufacturer.
Someone
new Nigerian Scammer (Score:4, Funny)
Terrifying 911 call from incident (Score:5, Funny)
Slashdot user: I just lost all Internet!!!
911: Excuse me?
Slashdot user: I was just about to first post to Slashdot, and I clicked "Submit," and nothing happened. I tried to ping them to see if I was dreaming, but got nothing, so I tracerouted and found out I couldn't get past localhost.
911: I don't understa...
Slashdot user: My god, this first post would have done wonders for my karma! And now I've been beaten by a goatsex troll...
911: Sir, this line is used strictly for emerencies...
Slashdot user: THIS IS AN EMERGENCY, DAMN IT!!! Send ambulences! DSL repairmen! Cowboyneal! I won't leave this computer until I get my Internet back, and I only have half a can of Mountain Dew to live on till then!
38th Street CO (Score:3, Informative)
38th Street C.O. is just about the highest trafficked C.O. in the world, in terms of Frame Terminations and the like. Being in Central Manhattan, near one of the major CoLoc Hotels nearby, only increases the data throughput on all the eqpt therein.
Vandalism is most likely, performed by another company's techs.
Also- when they say it's not considered a "major" failure, it's b/c Verizon is strictly governed by the PSC's guidelines as to what constitutes "major". These guidelines provide the framework that determines how Verizon (and others) are/can be fined each year with respect to how many/long outages.
Stupid Security (Score:3, Interesting)
We used to have a rack in a very prominent facility with lots of excellent security measures.
Unfortunately every one of these security measures could be easily bypassed.
The security guards didn't even ask us any questions or look at our ID when we moved our gear out of there. I'm glad we did!
Hollywood Movie (Score:5, Funny)
Vixie gives it an allow ACL.
Cisco's "Packet" magazine calls it "this season's most secure flick".
NANOG calls it "an interface to remember".
(ignore the creative liberties. I was out of ways to tie things together...)
No Comment (Score:3, Funny)
Sucks...
COs are typically rigorous on uptime/reliability (Score:3, Informative)
First off, let me just say that the one thing telcos get right is engineering for uptime and reliability. When companies talk about "dial tone" reliability, there's a reason for it. Think about it, when was the last time your phone stopped working (assuming you're still with a Baby Bell for local calls)? They have engineered triple redundancy for power for the station:
1. Two independent power feeds from separate substations each running at 50% with a crossover switch. If one station goes down, the other flips to 100% draw with no downtime.
2. Failing that, 2 diesel powered generators with enough fuel to run the CO for 3 weeks without interruption.
3. Failing that, enough lead acid batteries to run the entire station for 13 hours. Some of those dated back to the 60s, but were maintained in pristine condition.
Now, the one thing I will say is that co-located equipment was treated like it was coated in anthrax. It was maintained in a separate cage that could not be accessed from the main building. All co-located equipment was accessed from a separate street level entry that only had a single door and no monitoring. So if the stolen equipment was from Sprint in a Verizon CO, odds are that no one from Verizon was even watching it. (This was back when the 94 telecom bill was just coming into effect, so all of these rules were new...)
For the main building, we had to be escorted at all times, and the engineer we were with got antsy if we bumped against any of the equipment (including some great old magnetic physical switches that were still in use for some old lines). But I wasn't too impressed with the overall security. Some locked doors and a security guard but nothing fancy. That said, if any of Verizon's equipment had broken/shut down I'll guarantee that they have an immediate monitoring/notification system.
Hmm... (Score:3, Informative)
It's hard to imagine anybody would be so stupid, but then, it wouldn't be the first time.
Re:vulnerability (Score:3, Insightful)
Sure it does. Suppose your data is encrypted using your public key, and you keep your private key with you. If your data is worth more than the media it's stored on, you've just averted a catastrophe by keeping it from falling into the wrong hands.
Re:vulnerability (Score:5, Interesting)
Re:This is really bad. (Score:5, Funny)
Then, if your hosting company isn't full of morons, you will restore it from the multiple backups.
Re:This is really bad. (Score:5, Funny)
I don't need to worry about that because most of my equipment is steel already. Except my Powerbook, which is aluminum.
What if a terrorist had got in there and blew up all our data.
That would be terrible. I remember one time when I spilled all of my data on the floor. I was cleaning it up for days; it's almost impossible to get data out of a carpet once it dries!
For terrorists this would be a major blow to interest banking which they so abbhor.
I'm sure Osama bin Laden is at this very moment plotting to destroy those infidel bankers that are keeping his billions secure and earning him a nice revenue stream through his investments.