{"id":948,"date":"2012-03-19T21:27:08","date_gmt":"2012-03-20T01:27:08","guid":{"rendered":"http:\/\/techtonictimes.com\/?p=948"},"modified":"2015-07-26T11:41:42","modified_gmt":"2015-07-26T11:41:42","slug":"smug-son-of-a-breach","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/","title":{"rendered":"IT Security and the Smug, Son Of A Breach !"},"content":{"rendered":"<figure id=\"attachment_949\" aria-describedby=\"caption-attachment-949\" style=\"width: 380px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-949\" title=\"pg-1-russia-arms-getty\" src=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg\" alt=\"\" width=\"380\" height=\"285\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg 380w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty-300x225.jpg 300w\" sizes=\"(max-width: 380px) 100vw, 380px\" \/><\/a><figcaption id=\"caption-attachment-949\" class=\"wp-caption-text\">Anatoly Antonov, Russian Deputy Defense Minister<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>When an IT Security breach and a physical security breach converges, we have a Tsunami of\u00a0 sorts.<\/p>\n<p>Don&#8217;t you want to slap this guy &#8217;til he bleeds?<\/p>\n<p>You don&#8217;t have to. The Cosmos will take care of him.<\/p>\n<p>His main offense? He makes &#8216;<a href=\"http:\/\/articles.cnn.com\/2012-02-09\/world\/world_anonymous-explainer_1_chat-room-internet-caf-anonymous-members?_s=PM:WORLD\"><em><strong>Anonymous<\/strong><\/em><\/a>&#8216; seem like the good guys.<\/p>\n<p>In this case maybe they are:<\/p>\n<h3 style=\"text-align: justify;\"><em>To the Syrian people: The world stands with you against the brutal regime of Bashar Al-Assad. Know that time and history are on your side &#8211; tyrants use violence because they have nothing else, and the more violent they are, the more fragile they become. We salute your determination to be non-violent in the face of the regime&#8217;s brutality, and admire your willingness to pursue justice, not mere revenge. All tyrants will fall, and thanks to your bravery Bashar Al-Assad is next.<\/em><\/h3>\n<h3 style=\"text-align: justify;\"><em>To the Syrian military: You are responsible for protecting the Syrian people, and anyone who orders you to kill women, children, and the elderly deserves to be tried for treason. No outside enemy could do as much damage to Syria as Bashar Al-Assad has done. Defend your country &#8211; rise up against the regime! &#8211; <strong>Anonymous<\/strong><\/em><\/h3>\n<h6 style=\"text-align: justify;\"><strong><em>Antonov&#8217;s reponse to helping Syria with the Massacre\u00a0 of its own people:<\/em><\/strong><\/h6>\n<h3 style=\"text-align: justify;\">&#8220;<em>Russia enjoys good and strong military technical cooperation with Syria, and we see no reason today to reconsider it, it&#8217;s part of our contractual obligations, when we supply weapons, we have to provide training.&#8221;<\/em><\/h3>\n<p>Of course such smugness begs the question; was Anonymous justified in exposing the Russian government&#8217;s insensitivity to human life? Does their God-complex, however palpably hypocritical appeal to your\u00a0 own humanity when you consider the plight of the Syrian people? Or does it cause you to temper your loathing?<\/p>\n<p>Would you now excuse them, however momentarily for <a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/2011\/04\/\" target=\"_blank\"><strong>hacking<\/strong><\/a> your <strong>Personal Identifiable Information<\/strong> (PII) in light of this &#8216;greater&#8217; good?<\/p>\n<p>Don&#8217;t you sometimes hate the greys of life especially when they cause you to re-evaluate your convictions about right and wrong?<\/p>\n<h4>Would you say this is one of those times?<\/h4>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; When an IT Security breach and a physical security breach converges, we have a Tsunami of\u00a0 sorts. Don&#8217;t you want to slap this guy &#8217;til he bleeds? You don&#8217;t have to. The Cosmos will take care of him. His main offense? He makes &#8216;Anonymous&#8216; seem like the good guys. In this case maybe they [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":949,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,80,88,97],"class_list":["post-948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techtonic-times","tag-breach","tag-personal-identifiable-information","tag-russia","tag-syria"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This Time The Hacker Is The &#039;Good Guy.&#039; Too Bad He Is Annoymous. So much for IT Security<\/title>\n<meta name=\"description\" content=\"Terrorism, whether on the ground, or in cyber space still spells terror.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Time The Hacker Is The &#039;Good Guy.&#039; Too Bad He Is Annoymous. So much for IT Security\" \/>\n<meta property=\"og:description\" content=\"Terrorism, whether on the ground, or in cyber space still spells terror.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-20T01:27:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-26T11:41:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"380\" \/>\n\t<meta property=\"og:image:height\" content=\"285\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"IT Security and the Smug, Son Of A Breach !\",\"datePublished\":\"2012-03-20T01:27:08+00:00\",\"dateModified\":\"2015-07-26T11:41:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/\"},\"wordCount\":367,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg\",\"keywords\":[\"breach\",\"Personal Identifiable information\",\"Russia\",\"Syria\"],\"articleSection\":[\"Techtonic Times\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/\",\"name\":\"This Time The Hacker Is The 'Good Guy.' Too Bad He Is Annoymous. So much for IT Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg\",\"datePublished\":\"2012-03-20T01:27:08+00:00\",\"dateModified\":\"2015-07-26T11:41:42+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"Terrorism, whether on the ground, or in cyber space still spells terror.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg\",\"width\":380,\"height\":285},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security and the Smug, Son Of A Breach !\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Time The Hacker Is The 'Good Guy.' Too Bad He Is Annoymous. So much for IT Security","description":"Terrorism, whether on the ground, or in cyber space still spells terror.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/","og_locale":"en_US","og_type":"article","og_title":"This Time The Hacker Is The 'Good Guy.' Too Bad He Is Annoymous. So much for IT Security","og_description":"Terrorism, whether on the ground, or in cyber space still spells terror.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/","og_site_name":"TechTonic Times","article_published_time":"2012-03-20T01:27:08+00:00","article_modified_time":"2015-07-26T11:41:42+00:00","og_image":[{"width":380,"height":285,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"IT Security and the Smug, Son Of A Breach !","datePublished":"2012-03-20T01:27:08+00:00","dateModified":"2015-07-26T11:41:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/"},"wordCount":367,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg","keywords":["breach","Personal Identifiable information","Russia","Syria"],"articleSection":["Techtonic Times"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/","name":"This Time The Hacker Is The 'Good Guy.' Too Bad He Is Annoymous. So much for IT Security","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg","datePublished":"2012-03-20T01:27:08+00:00","dateModified":"2015-07-26T11:41:42+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"Terrorism, whether on the ground, or in cyber space still spells terror.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2012\/03\/pg-1-russia-arms-getty.jpg","width":380,"height":285},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/smug-son-of-a-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IT Security and the Smug, Son Of A Breach !"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=948"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/948\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/949"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}