National Security Agency
Oooh look you can use highlight. Come up with a real argument.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
National Security Agency
noiceNational Security Agency
The folks from Imperva have found a new cryptomining bug out in the wild that targets database servers and application servers. What's unique about this thing is it's worm-like behavior and creation using NSA exploits that were leaked into the wild. This sucker shouldn't be able to mess with your servers if you have them appropriately patched and if you have your firewall rules set properly. However, expect hackers to continue to leverage the NSA exploits and build better and better malware. Thanks again NSA.
Recently cryptojacking attacks have been spreading like wildfire. At Imperva we have witnessed it firsthand and even concluded that these attacks hold roughly 90% of all remote code execution attacks in web applications.
Oooh look you can use highlight. Come up with a real argument.
If your the NSA and it's stolen from you, that should damn well be negligence.
No.
Nothing is perfectly secure. Perfectly secure doesn't exist in the functional world.
If someone stole it from the NSA, it was either negligence, not negligence, or it was by plan and as intended, (which I don't really think is the case, but it's possible so I put it in).
If it's negligence, you can expect the negligent party was punished although we may never hear about it because airing your dirty laundry in public is rarely a good thing to do. It would make them look bad.
If it wasn't negligent then it was an issue of miss-placed trust. The Intelligence community works on a trust system. Mercenaries can always be bought out from under you, and zealots come with their own issues. But trustworthy believers are best but you still have to worry about a believer who "has a crisis of faith" so to speak.
Unless you know which of the three this is, then I think you are being too critical and jumping the gun on a blanket claim of negligence.
Now I really wish I could read this article.
Whether I did it legally for my job or not, I have responsibility to make sure it doesn't escape. NSA are morons for letting virus code outside a contained facility. IT IS THEIR FAULT FOR NOT IMPLEMENTING PROPER CONTROLS. Did you see Oppenheimer walk out with uranium or implosion detonators?
Ladies and gentlemen, kju is the example of what's wrong with modern government: No f'n accountability.
I disagree, given the impact that state level actors can have globally, right up to total annihilation. We should absolutely demand accountability regardless of the complexities involved.
So an unsecure Security Agency isn't negligent? Gotcha.Oooh look you can use highlight. Come up with a real argument.
What makes you think that it "walked" out of an NSA facility?
This is an assumption. Not all NSA work is done inside NSA secured facilities. Much of the information the NSA works with is collected by the Military Intelligence units of the US military. In fact, most of the man power inside the NSA is active duty military, not government civilians or contractors.
I know if I were running some program where I was using a bunch of tools loaded on a laptop for operational work, I wouldn't be running the shit out of the downtown office. Fuck that, I'd put a couple of guys on a plane and fly them somewhere where they could operate anonymously, outside of the target's sphere of influence, but with access to the target. If these people I send on this mission are soldiers, well I wouldn't send soldiers off alone like that, they'll do stupid shit like get their laptop stolen. I could send government civilians, but chances are they'll get noticed, (OPM hack for the lose). So maybe contractors who weren't risked by the OPM hack, but that's younger ones again but maybe not too young to be trustworthy ..... not.
What's most likely is while deployed with the tools, someone decided they wanted their own personal copy. From there it just gets more sordid, but there is almost nothing you can do in situations like this except put faith in your people, while you watch for odd behavior, (like buying tickets for Hong Kong), and hoping that they don't get too damned crazy.
Then obviously you have a security problem. It's still the organizations responsibility to prevent these kind of leaks.
The CONTRACTOR was compromised with a FULL SET of source code. What the hell is he doing with a full set of source? What the hell is it doing at home? How the f- did it get there? Even field agents don't need source if they are just running attack vectors.
Jebus, I can control labs halfway around the world using a secure private connection from my desktop at my OLD job, and you are telling me NSA can't do that with an appropriate uplink and exit node at the attack point? I guess there could be extenuating circumstances (like subs), but you still shouldn't have source code on a sub. Executable only.-encrypted until runtime at that.
It doesn't have to be servers. Old network printers can run SMBv1. Those type of devices never get updates. Everyone thinks "It's a printer, what harm could it do?" Let me rephrase that, "It's a computer with network access that has access to printer hardware" Another case in point: Those very popular network cams from years ago with hard coded root admin passwords. Many of them still don't have updates.
When I was at UofM there was a novel netware server that ran for years. Hardly anyone used it but it ran non stop. When it came time to shut it down, they couldn't find it. They looked everywhere. Finally it came down to testing switches and finally tracing network cables. When they traced one cable it went into a wall and disappeared.I just want to know who these morons are running unpatched servers...
Hey look it’s the same shills who couldn’t admit the NSA collects on US citizens. Big surprise.
I just want to know who these morons are running unpatched servers...
Is that sarcasm? I dont see how this is their fault. Something they built to exploit our enemies (well within their mission parameters) was effectively stolen and is now being used for nefarious purposes...so remind me again why this is their fault?
You admitted it last time. Flip flopped LOLThey don't, you are still incapable of understanding that.
At least you're right that this hasn't changed. Of course if you knew anything at all about what you were talking about instead of referencing people who are just as ignorant as yourself then maybe we could have a discussion on it. But no matter how often people who do know something try to explain to you what's actually happening, you would rather ignore that and keep believing this tired bullshit.
In fact, if you could even give me the correct definition of "collects" regarding Intelligence Activities it would be the start of something new.
You admitted it last time. Flip flopped LOL
Long winded flip flopper, I guess.No I didn't, you still don't understand the meaning of the word "collected" used by the Intel Community.
I'll give you an example.
I'm doing voice collection listening to radios.
I am rolling up and down through the frequency range that I am tasked to monitor and I hit a signal and start listening, I also hit the voice recorder because if it's a valid collection target I don't want to miss anything they've said.
3 minutes later the exchange is over, it was a good intercept, and I now must log it and report it. Later on, I'll send the taps in for other linguists to go over in detail. This was a valid collection target.
Now I continue looking for the next signal and I roll onto a new one, start the tape recorder and start listening. Almost right away I hear Spanish so I keep listening, but the signal is very strong and the direction of the signal puts it crossing some US Territory, within Twenty seconds of listening I realize this is not a target I am tasked to collect on and it's probably Spanish speaking US Persons, I roll off the frequency, annotate in my log that the intercept wasn't a valid target and probably US persons.
I am not allowed to collect on US Persons, I rolled off the frequency as soon as I was aware that it was likely US persons talking, but the part of the conversation I intercepted will not be deleted until later after the tap is analyzed. My log will Identify that the second intercept was US persons, the Analysts will skip that part of the tap. When the tape isn't needed anymore it will be erased and reused, but no additional effort is required to "wipe the information off the tap or anything". It's just that no analysis will be done, and the conversation won't be data-based.
This is the difference between "Collection" and just an intercept. They still have part of the conversation on tape, but no analysis was done and it wasn't stored in a manner that they can readily retrieve the conversation.
Now, this is based on about thirty years of accepted procedure. Now if you ask them, "Do you collect radio communications of US Citizens" then the answer is no, but if you see those log files and dig up the tapes, you might be convinced otherwise. But that would be because the word collect has a specific meaning to the Intelligence Community and they have to be very serious about it.
Long winded flip flopper, I guess.
If I wasn’t lazy I’d just quote you, but I’m busy doing nothing.
Nah you cried and pissed and moaned and I’m pretty sure called me a smart ass, but I was right.So you call me out, I not only refute it, but take my time to carefully explain it, even after you seemingly won't take the time to at least look up a definition for one word, or look up what you claim is the proof for your own claim.
Perhaps it just isn't important enough to you after all ?
Maybe you're not really interested in the truth at all and just want to enjoy your ......... opinion.
Nah you cried and pissed and moaned and I’m pretty sure called me a smart ass, but I was right.
Your long winded explanations to yes and no questions always make me laff. So long and thanks for them.
If you’re worried about it and have enough time on your hands go look.If you were right, then I apologized?
I'm known to do that, not above it.
Maybe you just imagine that I am pissing and moaning. Just like now, you want to act like I'm entertaining you but I'm not trying to entertain you. Educate you yes, not entertain.
But the NSA has nothing at all to do with this. The NSA isn't law enforcement, they don't give a damn if your iPhone is encrypted, that's not their business. The FBI, yes, the NSA nope, not really.
So since we are off topic and you are admittedly too lazy to really do anything but make up shit for your comfortable fantasy life, or fruitlessly try to troll me, I'll let you get on with it and allow this thread to return to it's purpose.
https://www.reuters.com/article/us-...uses-ex-lovers-watchdog-idUSBRE98Q14G20130927They don't, you are still incapable of understanding that.
At least you're right that this hasn't changed. Of course if you knew anything at all about what you were talking about instead of referencing people who are just as ignorant as yourself then maybe we could have a discussion on it. But no matter how often people who do know something try to explain to you what's actually happening, you would rather ignore that and keep believing this tired bullshit.
In fact, if you could even give me the correct definition of "collects" regarding Intelligence Activities it would be the start of something new.
https://www.reuters.com/article/us-...uses-ex-lovers-watchdog-idUSBRE98Q14G20130927
Then this shouldn't be possible
But it happened. So.....
They are collecting data on AmericansWhat shouldn't be possible?
Can you explain what happened to know what you are saying?
In that entire article there was only one single instance of an NSA Employee misusing NSA collection resources on a US Person. That one individual, upon realizing her mistake, immediately reported her error, and was punished, and she did it without knowing the person she had requested the information on was a US Person.
All of the rest either failed to access information on a US person or accessed information on foreigners, not Americans. Read it yourself, look up how many years the report goes back, think of how many hundreds of thousands of workers you are talking about over all those years.
Actually read it for once with a critical eye, it says far more good about the Agency than bad.
In one instance in 2005, a military member of the NSA queried six email addresses of a former American girlfriend - on the first day he obtained access to the data collection system. He later testified that “he wanted to practice on the system” and gained no information as a result of his queries.
They are collecting data on Americans
It's right here when they use the word collection system.
https://nsa.gov1.info/data/
Is this a legit NSA site?
Gottla love then if you have nothing to hide you have nothing to fear bs line.
Why We Collect Your Data
In the past, domestic law enforcement agencies collected data AFTER a suspect had been identified.
They are collecting data on Americans
It's right here when they use the word collection system.
https://nsa.gov1.info/data/
Is this a legit NSA site?
Gottla love then if you have nothing to hide you have nothing to fear bs line.