US Mounted 231 Offensive Cyber-operations In 2011, Runs Worldwide Botnet 367
An anonymous reader sends this news from the Washington Post:
"U.S. intelligence services carried out 231 offensive cyber-operations in 2011, the leading edge of a clandestine campaign that embraces the Internet as a theater of spying, sabotage and war, according to top-secret documents [from Edward Snowden]. Additionally, under an extensive effort code-named GENIE, U.S. computer specialists break into foreign networks so that they can be put under surreptitious U.S. control. Budget documents say the $652 million project has placed 'covert implants,' sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers into the millions. ... The implants that [an NSA group called Tailored Access Operations (TAO)] creates are intended to persist through software and equipment upgrades, to copy stored data, 'harvest' communications and tunnel into other connected networks. This year TAO is working on implants that “can identify select voice conversations of interest within a target network and exfiltrate select cuts,” or excerpts, according to one budget document. In some cases, a single compromised device opens the door to hundreds or thousands of others."
Re:wow (Score:5, Insightful)
Allies? (Score:4, Insightful)
Allies, "ALLIES", we don't need no stinkin' Allies. All of it, ALL OF IT, ours, we, want it all, exploit it, burn it, the whole world, it's ours, Ours, OURS.
Seriously out of control. Looks like Chinese hardware is the least of the worlds problems. With the US Stupidity Services trying to purposefully break everyone's networks and insert back doors that only they, and their contractors, and anyone who wants to pay those contractors knows about.
Morons there is no such thing as an exclusive back door. Once you broken the security of other countries networks, you leave access for anyone waiting to exploit, bet anything you like those morons did not at all to monitor and ensure those back doors were not exploited by others. I wonder how many times now the US government has blatantly lied about cyber attacks they launched that have been discovered and then blamed on other countries and pseudo organisation like Anonymous.
How many attacks have they launched they were designed to do nothing else but increase their budget?
Now, for the other angle, is this treason? (Score:1, Insightful)
If Snowden leaked this at this point he's exposing information on operations, methods, everything.
At what point does it cross the line and become treason? Is there a line which gets crossed where every Snowden supporter would say "this has gone too far"?
Re:Now, for the other angle, is this treason? (Score:5, Insightful)
Re:wow (Score:5, Insightful)
This is why the critical infrastructure, whose failure could cost lives and fortunes, doesn't belong on the network. The sluice gates on the dam, the control rods in the reactor, the ventilator machine standing between granny and the reaper—none of that belongs on a network. So what if you have to pay someone to get off his ass and check an inconvenient readout manually: at least that's a job created in an otherwise machine-driven economy.
Re:Now, for the other angle, is this treason? (Score:5, Insightful)
What operatives? None of the people involved in this are working undercover, they're working in cubicles in office blocks in the US.
Re:at what point do illegal, secret acts of war (Score:5, Insightful)
Re: Serious question for the Linux community (Score:2, Insightful)
We don't and its safe to say that from the gov Linux is just as vulnerable as the rest
Re:wow (Score:5, Insightful)
Norton 360 that is completely worthless against their root kit?
For all we know, Norton 360 might *be* their root kit.
Re:Now, for the other angle, is this treason? (Score:4, Insightful)
It is really, really easy to turn a blind eye to the evil one's government perpetrates when that evil is not directed at one's self or one's loved ones, and when in fact these benefit in some way from said evil.
Does all this evil keep our economy strong (possibly at the expense of other economies)? Does it keep stuff cheap at walmart? Does it keep the movies and tv programs flowing? Does it keep most of us basically comfortable in our lives? Then maybe we just won't bother sticking our necks out for a bunch of foreigners who offer nothing to us in return.
What is it that you want people to do exactly? Do you think we have any control over what intelligence agencies do? If we try to stop them then their allies will be in the position to do to us and our loved ones exactly what the US intelligence agencies are capable of doing to people in your country.
You don't seem to understand how things work. The US citizen cannot stop the US government because your government would work with the FBI to stop that. It would be called terrorism. The penalty for terrorism is harsh and can even include death.
If someone in your country tried to take on the intelligence agency of your country, then if your country is allied with the US government then the CIA would destroy those people/terrorists.
The only realistic solutions which aren't suicide or completely insane all take time. Decades. The government agencies can be made less abusive over time, and made to follow the laws of war or at least make it clear to us what rules they follow.
Re:Now, for the other angle, is this treason? (Score:5, Insightful)
If Snowden leaked this at this point he's exposing information on operations, methods, everything. At what point does it cross the line and become treason? Is there a line which gets crossed where every Snowden supporter would say "this has gone too far"?
As a non-US citizen and potentially impacted by the US govt actions, I don't have any incentive to say "this has gone too far".
Re:wow (Score:5, Insightful)
Considering that the US has been, in recent years espousing the theory that cyber-attacks should be treated as real acts of war, suitable for real retaliation with real weapons, I would say it's pretty terrifying.
Re:wow (Score:4, Insightful)
So what if you have to pay someone to get off his ass and check an inconvenient readout manually: at least that's a job created in an otherwise machine-driven economy.
But that cuts into profits and corporations have shown repeatedly they'll throw anyone/anything under the bus to maintain their profit margin.
Re:Now, for the other angle, is this treason? (Score:4, Insightful)
Or maybe you should be asking: should the government have no limit as to what it can do in the name of protecting the country from supposed foreign conspiracies.
Re:holy shit (Score:5, Insightful)
Then you shouldn't take and store photos and videos (obviously using and on your computer). You shouldn't use phone (since it has a microphone and possibly camera).. You shouldn't use Windows, ... and Android, ...oh and Linux and almost every connected device and software.
Basically it is a frightening fact that we can hardly run from ubiquitous surveillance since the whole connected electronics devices can be used for spying on us. Unless you leave in a farm, do not have communication devices and spend cash only. But I doubt even that would be enough.
Can we have Orwell's 1984 instead?
"Persist across software and equipment upgrades" (Score:4, Insightful)
If they have really developed software which can do that, they should share their techniques with the commercial world. Software that can continue to run even after a system upgrade? Sign me up.
Re:Now, for the other angle, is this treason? (Score:5, Insightful)
That's seriously a good question. The ironic answer is that the knowledge that would be sufficient to make an informed decision (as to where the line should be other than an annoyingly vague "whatever doesn't make it worse for humanity") is being withheld from us. Any actual example we could use would be based on what we already know, which isn't going to be whatever the government is still keeping secret - the good _and_ the bad.
Which puts us all between something of a rock and a hard place.
Having read this particular article, it doesn't mention any specific operations, nor any specific methods. I say "specific" because, while it does reveal that the US government is exploiting vulnerabilities in software and hardware (really not a surprise), it does not reveal specifics that would allow an enemy to distinguish between "US government exploit" and "random joe exploit".
I also found this part interesting: "The NSA designs most of its own implants, but it devoted $25.1 million this year to “additional covert purchases of software vulnerabilities” from private malware vendors, a growing gray-market industry based largely in Europe." Apparently, providing 25.1 million dollars of additional demand for unethical behaviour is now within the NSA's newest line in the sand, to go along with global warrant-less electronic surveillance of everyone including its own citizens within its own borders.
Which means here's the thing:
The US government crossed its constitutional line under a veil of secrecy from its own people and then said: I'll keep going.
Edward Snowden crossed his personal line under the orders of the US government and then said: I'm turning whistleblower.
So right now, I'm a lot more worried about the US government's limits than Snowden's.
Cyber Combat: Act of War (Score:4, Insightful)
Pentagon Sets Stage for U.S. to Respond to Computer Sabotage With Military Force
http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html [wsj.com]
Re:Now, for the other angle, is this treason? (Score:5, Insightful)
That depends of if we decide the NSA has gone far enough to be considered a domestic enemy of the people. It lies to congress, it lies to the citizens, and it may be lying to the president as well. That doesn't sound much like a legit government agency. It spies on Americans and subverts the Constitution. That sounds like something an enemy does.
Re:Allies? (Score:5, Insightful)
John Bolton [theguardian.com] has a more nuanced view. No doubt you will disagree.
I'm not particularly nuanced, I don't suppose. Point taken. But are you now posting op-eds in support of your claim? By John Bolton, no less... The pinnacle of nuance, to be sure. But all right, rather than shoot the messenger, which would be easy here, let's look at what he wrote. (Note to others, the following quotes are Bolton, not cold fjord)
Snowden initially violated his oath to safeguard the national security secrets entrusted to him by revealing National Security Agency (NSA) programs arguably affecting the privacy of US citizens
Conventiently not mentioning his other, more fundamental, oath to protect the US constitution? Also, "arguably affecting the privacy"... We can omit the "arguably" here, it seems to me; that has been Snowden's main point (which has not been creditably disputed, as far as I know).
Snowden's sympathizers and anti-American activists have so far largely controlled his story line
Cleverly mentioning "Snowden sympathizers" and "anti-American activists" in close conjunction. The implication being, without actually demonstrating, that they are one and the same. Echoes of Al-Qaeda and Iraq, a decade ago. Bolton's statement that these have "controlled the story line" is arguably true, but not for lack of trying.
We do not yet know whether Snowden jeopardized US agents, but vital sources and methods of intelligence gathering and operations are clearly at risk
Hm, that contradicts the point you were making about how thousands of operatives were already in grave danger. Although I suppose you will say that you were talking about UK operatives. Ok, I'll give you that, sort of.
Snowden has given Beijing something it couldn't achieve on its own: moral equivalence. Now, China can portray itself as a victim, besieged by America, and simply trying to defend itself.
Do you really not see the hypocrisy here? For years the West has accused China and Russia of doing exactly what they were themselves doing all along. So the "damage" here is that the falsely claimed moral highground is now exposed as dishonest fiction.
Snowden's initial leaks on NSA programs also caused substantial political harm, above and beyond the intelligence damage. Several European governments which co-operated with the US are now predictably running for the tall grass, endangering the continuity of existing programs and damaging prospects for future co-operation
Again, taking for granted that *of course* the US were spying on allies, this doesn't even need defending in Bolton's world. The damage is in showing the hypocrisy. Bolton thinks this is a wonderful argument, I say that this statement, coming from a senior US (ex)official, just discredits US diplomacy even further.
As with the Bradley Manning/WikiLeaks exposure of thousands of classified State Department and Pentagon cables, Europeans want to know why Washington can't protect sensitive information.
False, Europeans want to know why their supposed partners in Washington are treating them like adversaries. The bulk of the cables, I might add, turned out to be "embarrassing" rather than "dangerous" to the US.
But Beijing does not deserve moral equivalence, given the intensity of its cyber-attacks against America. The key point is that China struck first, developing a pronounced asymmetric advantage.
I don't know who struck first, if that even makes sense, but I notice Bolton doesn't give any argument to support his claim. What has been revealed though, is that the West was striking for a long time while publicly denying it.
Then he does a bit of character assassination, I am in no position to judge either way. My personal impression, though it should not count for much, is that Snowd
Comment removed (Score:4, Insightful)
All supposedly for catching terrorists, right? (Score:4, Insightful)
And yet Russia can call us up and say "Hey, there are two Chechen refugee brothers in Boston who we think are terrorists" and NOTHING HAPPENS.
Re:wow (Score:5, Insightful)
This is why the critical infrastructure, whose failure could cost lives and fortunes, doesn't belong on the network.
Didn't help Iran when STUXNET hit, did it?
The truth is: if you have no network-connection, people start using USB-sticks over and over - which creates a completely different attack-surface.
Air-gapping critical infrastructure isn't a bad idea - but it can't be an excuse to not secure these system at all.