Feeds

Obama security in Oz lost booklet FAIL

Procedures manual leaked to press via Canberra gutter

Intelligent flash storage arrays

The frenzy and excitement surrounding President Obama’s visit to Australia seems to have been too much even for some hapless staffer in the entourage: a booklet outlining his down-to-the-minute schedule and details of his security convoy has been found in a Canberra street.

According to The Age, which found the booklet, it also contains the phone numbers of key staffers, seating arrangements for the presidential motorcade, and even “which limousine door the President will use at events.”

The phone numbers in the book were apparently a goldmine if the booklet had ended up in the wrong hands, with military, Australian Federal Police, and consular personnel listed. “The booklet also names a long-serving member of Mr Obama's Secret Service unit”, The Age says.

Since the President has already departed our fair shores ex-Darwin for his next round of speechifying, El Reg presumes there’s no longer any imminent danger of the US losing a head of state to a gay communist crocodile attack, but the lost document would be considered a serious breach of security.

The “In-Confidence” book runs to 125 pages, and the newspaper also says its warning states that the information it holds must not be communicated to “any person not authorized to receive it”.

Too late for that, we fear. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.