Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 14 submissions in the queue.
posted by martyb on Friday August 19 2016, @01:03PM   Printer-friendly
from the Who-knows-what-evil-lurks-in-the-hearts-of-machinery?-The-Shadow-Brokers-do! dept.

Excerpt:

"It's certainly possible that an NSA [National Security Agency] hacker goofed massively and left files in the wrong place at the wrong time. Human error can never be ruled out. Russian cybersleuths carefully watch for possible NSA operations online—just as we look for theirs—and even a single slip-up with Top Secret hacking tools could invite a disastrous compromise.

However, it's far more likely that this information was stolen by an insider. There's something fishy about the official story here. It's far-fetched to think a small group of unknown hackers could infiltrate NSA. Furthermore, explained a former agency scientist, the set-up implied in the account given by The Shadow Brokers makes little sense: "No one puts their exploits on a [command-and-control] server...That's not a thing." In other words, there was no "hack" here at all.

It's much more plausible that NSA has a Kremlin mole (or moles) lurking in its ranks who stole this information and passed it to Russian intelligence for later use. This isn't surprising, since NSA has known since at least 2010 of one or more Russian moles in its ranks and agency counterintelligence has yet to expose them."


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by Anonymous Coward on Friday August 19 2016, @01:17PM

    by Anonymous Coward on Friday August 19 2016, @01:17PM (#390048)

    It's far-fetched to think a small group of unknown hackers could infiltrate NSA.

    Yeah it's far fetched to believe that the NSA has insecure practices:
    http://motherboard.vice.com/read/in-2012-edward-snowden-helped-nsa-fix-its-microsoft-macros-problem [vice.com]

    Starting Score:    0  points
    Moderation   +3  
       Insightful=1, Informative=2, Total=3
    Extra 'Informative' Modifier   0  

    Total Score:   3  
  • (Score: 3, Insightful) by Jeremiah Cornelius on Friday August 19 2016, @02:43PM

    by Jeremiah Cornelius (2785) on Friday August 19 2016, @02:43PM (#390089) Journal

    If there's a mole in the ministry? I hope it's actually hundreds of them.

    --
    You're betting on the pantomime horse...
  • (Score: 1, Interesting) by Anonymous Coward on Friday August 19 2016, @11:38PM

    by Anonymous Coward on Friday August 19 2016, @11:38PM (#390336)

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256

    It is not a surprise to anyone who realized that S in NSA stands for Surveillance. Their budget doubled after the twin tower incident, and while their spending is opaque, it seems that more than half of their budget is dedicated to surveillance now: it has truly became their primary goal. Incidentally, this goal directly conflicts with security, unless we understand by that the security of the state actors from they call the cancer of democracy, which would, if given a chance, work tirelessly to improve the conditions of 99% at the expense of the richest and most powerful 1%.

    To stress the last point, the public security is harmed by the NSA-style total surveillance immensely. For one, it is utterly improbable that data products assembled at NSA will not leak to criminals. Most of them already have. It has been fashionable lately to point fingers at the Russian scene, but the source of cracks is irrelevant, as is the culture of security incompetence within NSA. Cases of Manning and Snowden demonstrate the ease of copying humongous quantities of classified data without detection; in both cases the leaks were sourced thanks to the voluntary confessions made by intruders themselves. It would be trivial for a competent, full-fledged insider to let out any amount of data without a risk of being uncovered, and shifting the agency's focus from security to surveillance only compounded this problem by presenting a wider attack surface to the outsiders.

    ~ Anonymous 0x9932FE2729B1D963
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v2

    iQIcBAEBCAAGBQJXt5fDAAoJEJky/icpsdljioMQAJR/ktoIjl9B+8kh1/B8DqIo
    8KrMqd1KC+F8eXu+d2YHpx6lOUc0xaXeK5BX+0W5B3VQEzmAjjsQRKKzEQx3q2Tr
    OReYhFD1dnsLNmyj2PENoZucQUf9kW8AWhvyHndSHzv85ggXVjofEUPgHmWggWxt
    iLpvVjSmGwczIWAoxr8isl64A6zXB1me3H72JEaZp0/b891ewZBDeRKq89e5BIhb
    8bnC2MC/wg7uQfD97kCQcaCbnEQEsRm4Een+z3KS5BgPER1f4JVThYmVvANbbf/Q
    3YP7EJg5dwkPkBk3QOhEUGb9OfG/aTkt8eDacF8qjkotW0YN2Ug4DFHx7JhfDrUV
    AKN0lpVMfhmllzw9R4BRpCvBzlv0uz6Rv6uOQiwBQf5yQDeiAFEBHSEkqTIMczVY
    /FfqfAZBQdAdeX3ZcNoTRgcc2W8k+LSsglAPxXa7fXQfiA79GumPzyLNq+3SQSBy
    WlEP4izB+jGlbGO9JBeIDG+Fg8vXbFfNPfIE+bnK1y54kh9QNtURhvUwm+Xmm9hD
    mgZyUS8jpb0l/ySeNmXETWe44EoEgTveh5odUTToxhZbEJPfJKuK8r5gXp5tJoJD
    JRFER+xqx8FCsyGBcWxQvh4AXo03+KONGrRhloxHQsDAnxmR30TVVve9PNSvHphH
    EmQ80r/u8boOoJXDqWF5
    =QjpK
    -----END PGP SIGNATURE-----