Word: breaching
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...working at the Los Alamos National Laboratory, in the mid-1980s, China stole sophisticated nuclear weapons know-how to replicate America's W-88 warhead, a miracle of miniaturized firepower. Last week the New York Times, elaborating on a January story in the Wall Street Journal, reported the security breach was being soft-pedaled by an Administration intent on warming to China. "We know the Chinese, through espionage, got information about the W-88 from Los Alamos," a White House official told TIME. "But we still don't know--although we are trying to figure out--just how much...
...Yesterday, Harvard and Radcliffe officials expressed differing opinions on the responsibility for the ongoing security breach...
...begins to look as if establishment candidates have a solid lock on the party," says Carney,"the social conservatives could start to rebel" They might choose to unite around one of the several conservatives now running -- perhaps Pat Buchanan or Gary Bauer -- and create the kind of intra-party breach that gave the first George Bush such a headache when he ran for the Oval Office...
...what is even more frightening about this breach of liberty is that none of the defendants owned or operated the Web site. The owner, Neal Horsley, was not among the defendants but attests to the fact the web-site was his creation and that he was solely responsible for its design and maintenance...
...last" only works on the current machine, for example, login4, so to be thorough, one must log in to all 10 of the general login machines and all 33 of the workstations.) I immediately change my password and notify Harvard security of the intrusion. Without the "last" command, this breach could carry on for much longer...