Feeds

CIA men censured over high-security smut

Saucy secrets within sick secretive organisation

  • alert
  • submit to reddit

Remote control for virtualized desktops

The CIA is investigating up to 160 employees for posting "inappropriate" messages to a secret chat room, stored deep in the bowels of the intelligence agency's computer system.

The chat room was invite-only and remained undetected for five years until "routine security checks" located it. Between five and ten employees have been suspended on full pay for six months. Apparently, the people behind the chat room were maverick types (aren't they always?) who have heavy technical knowledge and went to great lengths to hide it from senior management - although some senior managers have been fingered as members.

So what were they discussing? How to destabilise a small country, set up native death squads, order assassinations, take a piece of drug trafficking profit for allowing passage? Don't be daft, you don't need a secret chat room for that in the CIA. No, they were sending smutty jokes and porn. You'd think that murder was more serious than a quick tommy, but what really got up de management's nose was the fact that they didn't know about it. CIA heads are the ultimate control freaks.

Those involved with this "willful misuse of computers" have been given five days to respond to the top nobs - effectively precluding them from getting any legal help because lawyers have to be screened for months - and those found guilty face the boot. Something that the originators seemed only too aware of, judging by posted comments.

Which is all a bit hypocritical when you come to think about it. By managing to conceal a chat room for years within its own organisation, those in charge should be applauded. If they'd done the same thing abroad, they'd be stooping from the weight of their medals. And of course there is the incredible irony of getting fired for making something so secret that no one could find it when former CIA director John Deutch was merely slapped on the wrist for writing top-secret documents on a Net-linked insecure home computer. There's one rule for them and one for us, I tell you. ®

Related Stories

CIA head slapped in Net porn exposé
Former CIA Director apologises to Congress
Hard drives with nuke secrets vanish from Los Alamos

Beginner's guide to SSL certificates

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.