If a person finds a poorly configured system and uses their neglect to access a database felt secure, how can they claim unauthorized access? They were responsible for te choice of software and configuration. The responsibility lies solely with the owner of the database. He used the configuration the organization set up to access the data. Had he used an independent program to access the database through external software tools, that's hacking as hell.
$20 that within 2 weeks someone will have broken and extracted a substantial amount of data from ADP's system. Their pdf is basically daring an organization to try to penetrate their robust and industry leading security processes.
The US broadband speeds will never be in excess of what the Intelligence community can monitor through their systems. If the NSA had to build a west coast center because the amount of data was a burden for them to transmit across the continent at current speeds, imagine the amount of trouble they would have if everyone was at 1 gb speeds. The data would choke their systems, therefore 1 gb speeds are 1 off situations which consumers don't really want anyway.
I think you are exactly right, but I don't think the hue and cry should start yet. The two of them are in with Congress fighting for the right to be king of all media. Men like that will ratchet the intensity up a notch if their program and their career's are on the line.
After Udall and Co. have had their chance, somebody needs to get omto whitehouse.gov and start a petition. It'll be over 100k in about 3 hours.
Techdirt has not posted any stories submitted by tommygilley.