Reply to post:

IT plonker stuffed 'destructive' logic bomb into US Army servers in contract revenge attack

Jake Maverick

um, reasonable doubt anyone....?

people who don't work in IT don't seem to get it, but it is extremely easy to frame people for these things....I mean really, if you were going to do something like this would you really use your own ID? or somebody else's...? and when you have access to the back end of systems you've effectively got access to everybody's ID....I find it very difficult to believe that somebody who is competent enough to do that job in the first place would do that in a way where it was trackable back to him....I suspect the same on that Litvinenko assassination as well, but morons blindly following the evidence.....there is no easier way to frame people. in the physical world u wd need to plant a cigarrette but, dna, fingerprints or something....much more difficult!

even when you don't have that kind of access still very easy to plant something like, say kiddy porn or whatever on your managers PC.....tell his manager you saw him looking at kiddy porn on his computer, manager checks....he's fired and u get a promotion....how many times do u think that has happened?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon