When Dan Egerstad blogged about being able to compromise (or gain the ability to compromise) systems used by governments and agencies around the world he must have known it would attract attention. He fears persecution, especially by the USA, but that's probably a bit of an over-reaction.
Essentially he just sniffed packets at ToR nodes, and was able to catch usernames and passwords being sent unencrypted. All of that aside, it's interesting to see some of the usernames and passwords being used on some of the systems. My personal favorites there are "temp" and "password."
Makes you think :)