Amongst other news outlets, CIO reports on a hacker attack on the German parliament (Bundestag) that occured four weeks ago and is still ongoing:
Trojans introduced to the Bundestag network are still working and are still sending data from the internal network to an unknown destination, several anonymous parliament sources told German publication Der Spiegel.[German]
All software and hardware in the German parliamentary network might need to be replaced[1]. More than four weeks after a cyberattack, the government hasn't managed to erase spyware from the system, according to a news report.
Some MPs have concerns to call experts from the foreign intelligence service, the Bundesnachrichtendienst, for help, because the agency would gain access to the legislative process, a possible violation of the principles of Separation of Powers.
[1] Apparently about 20.000 machines are affected
(Score: 2) by kaszz on Sunday June 14 2015, @12:00AM
The reason encryption by design were left out was lack of need on a purely research network that only allowed educational, government, military and big (relevant) business to even send or receive any IP packet. Abuse got you *plonk* in the physical way. Encryption software did also lack consistency, good documentation (no searchengines of any kind!) and would tax the computing capacity hard. Consider the capacity of Sun-2 machine that used a 10 MHz Motorola 68010 microprocessor with a proprietary MMU, and an operating system based on 4.1BSD. Ain't gonna crunch anything hard there. Focus were also on doing good, gentlemen honor. People that did bad were located and *plonked* mercilessly.
strncpy() vs strcpy(). Well sloppy thinkers will always be that in most cases. The problem comes when the negative feedback loop doesn't reach them.
If commercial ISP had forced users to read net etiquette and required them to read and sign. And also disconnected anyone breaking those rules. The internet had proberbly been better off. But one can suspect that profits came first.