Eight agencies plugged in and activated the USBs we left lying around
USBs we left lying around at eight agencies were plugged into agency networks and activated. The
USBs then ‘phoned home’. While our USBs did not pose a threat to the agency networks, the exercise
clearly demonstrated how this type of attack can provide unauthorised access to an agency network.
Significantly, it is also extremely difficult to detect once it has been established.