Case #3 (3 of 3): Entering and Breaking
- Major break-in occurred through weaknesses in one vendorís OS (SGI). Root compromises also exploited OS weaknesses (SGI and others).
- The combination of detectable and undetectable bomb attacks hampered DoDís response in resolving attack.
- These attacks required the sophistication of a high school sophomore.