Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Government Security United States Privacy Software The Military News Technology

How The US Will Likely Respond To Shadow Brokers Leak (dailydot.com) 110

blottsie writes: The NSA and FBI are both expected to investigate the leak of NSA-linked cyberweapons this week by an entity calling itself the Shadow Brokers, experts with knowledge of the process tell the Daily Dot. However, multiple experts say any retaliation by the U.S. will likely remain secret to keep the tactical advantage. Meanwhile, Motherboard reports that some former NSA staffers believe the leak is the work of a "rogue NSA insider." "First, the incident will be investigated by the National Security Agency as it tracks down exactly what went so wrong that top-secret offensive code and exploits ended up stolen and published for the world to see," reports Daily Dot. "An FBI counterintelligence investigation will likely follow, according to experts with knowledge of the process. [...] Following the investigation, the NSA and other entities within the United States government will have to decide on a response." The response will depend on a lot of things, such as whether or not an insider at the NSA is responsible for the breach -- a theory that is backed by a former NSA staffer and other experts. "The process is called an IGL: Intelligence Gain/Loss," reports Daily Dot. "Authorities suss out a pro and con list for various reactions, including directly and publicly blaming another country. [Chris Finan, a former director of cybersecurity legislation in the Obama administration and now CEO of the security firm Manifold Technology, said:] 'Some people think about responding in kind: A U.S. cyberattack. Doing that gives up the asymmetric response advantage you have in cyberspace.' Finan urged authorities to look at all tools, including economic sanctions against individuals, companies, groups, governments, or diplomatic constraints, to send a message through money rather than possibly burning a cyberwar advantage. Exactly if and how the U.S. responds to the Shadow Brokers incident will depend on the source of the attack. Attribution in cyberwar is tricky or even impossible much of the time. It quickly becomes a highly politicized process ripe with anonymous sources and little solid fact."
This discussion has been archived. No new comments can be posted.

How The US Will Likely Respond To Shadow Brokers Leak

Comments Filter:
  • by Anonymous Coward

    NSA leaked bullshit then claimed their shadow did it.

    Do not believe shit on this fucking site right now regarding security or government.

    Or really anything.

    • by Anonymous Coward

      Yes, down with reasoned assumptions that may only be partially right, but yay for the fox telling us hens everything is fine, right?

      The fact that our own intelligence agencies violate our rights and treat us as enemy combatants leaves me with little sympathy when their own arrogance and ineptitude get then pwnt.

  • by Anonymous Coward
    but was it "intentional"???
  • Easy. (Score:5, Insightful)

    by wierd_w ( 1375923 ) on Thursday August 18, 2016 @07:14PM (#52729309)

    1) there will be a witch hunt.
    The nsa will investigate its own employees against its already existing psych profile sheets to see who is the most likely to have been motivated to steal the data. Then they will set up an internal emtrapment scenario to catch the leaker red handed. They will then be charged with federal espionage, and put into prison.

    2) the same investigation will sift out accomplices and contacts. The trap will not be sprung until positive id has been made on all members of the cell.

    3) the nsa will not directly move against the other members of the cell. Instead it will monitor, and selectively leak false intel to this cell, making it ineffectual, or worse, countereffectual to the foriegn government operating it.

    4) if deemed useful to do so, the cell will be infiltrated with a new "insider", who will actually be collecting and analyzing the cells instructions to better predict and respond to the foriegn power's activities.

    Really, this is not hard.

    • by Anonymous Coward

      Ever heard of Ed Snowden? He explained very frankly that is NOT how the NSA operate.

      It should be obvious when you have the us government employees themselves calling Ed Snowden a treasonist for telling on them.

      And to top it off, you read it on FBI Slashdot. Who are you really though?

      • by Anonymous Coward

        Everybody on this FBI ass BBS need to go watch Citizen Four (Ed Snowden actually explains the NSA ways)

        Everywhere you look something on your computer or website is trying to hijack you. The spies need to fuck off and die. They pretend they are your solution but can you count the debt of your country? Do you feel like they used your money to help you?

        Do you see anybody in burka's trying to kill you or spy on you? No. There is no ISIS neighborhood just FBI and CIA NSA lies.

        Thanks for taking over Slashdot

      • Re:Easy. (Score:5, Interesting)

        by wierd_w ( 1375923 ) on Thursday August 18, 2016 @09:49PM (#52730093)

        I have.

        Note in citizen 4, the first phase of the nsa's activity against Snowden was in sussing out his aberrent behavior, and surveiling his girlfriend, family, and Hawaii place of residence. This is what happens in phase 1) of my short list. A list of persons of interest is produced using psych details, and active monitoring starts. Connections maps are created. Points of surveillance are established, and monitoring priority increases. Phase one ideally (for the nsa) ends with apprehension of their leak, but the process does not end there.

        After sussing out the entry point of the leaker, the companion network is either dismantled, or subtly repurposed for cointel.
        False intel is fed to the group. If the false intel causes the foriegn agency to suspect compromise, it sends the message to that foriegn agency that their action was detected, and that thier methods are not valid any longer. If the foriegn agency fails to change the operational behavior of the cell, then it may become beneficial to plant a double agent. This double agent can then cause the foriegn power to change its policies or public activities, through contaminated or misleading intelligence, created specifically for this purpose.

        That they can conduct such a profoundly invasive phase one investigation using literally any internet connected, or broadcast capable device, along with your financial data, and the information about you provided by your so called friends on social media, is the primary thrust behind snowden's leaks. What the NSA will do, and why they will do it is not going to change. The leaks from snowden concerned the how and the what.

    • Re:Easy. (Score:5, Insightful)

      by Anonymous Coward on Thursday August 18, 2016 @08:03PM (#52729597)

      Sorry for my sloth but....am I correct in understanding that the NSA knew about security holes in important aspects of our cyber infrastructure, and rather than report them so they could be fixed, they sat on them so they could use them "to protect us"?

      They knowing left these holes open, with no idea (nor any way of knowing) whether or not any criminals were exploiting these holes already, to our detriment?

      I'd say they aren't just failing to do their job, they are knowingly doing the opposite of their job. Their conscious inaction put at-risk those they are supposed to protect, is therefore unethical, and constitutes an enormous breach of trust given their position of authority.

      They should all burn. I don't give a shit who spilled the beans, I want the decision-makers at the top to be thrown in jail for this.

      Of course...I am not super-rich, so I won't get my way.

      • Re:Easy. (Score:4, Interesting)

        by wierd_w ( 1375923 ) on Thursday August 18, 2016 @10:03PM (#52730137)

        From ths perspective of people who like to watch, as the nsa does, telling the landlord about where all the best places to peep so they can be fixed, is counter intuitive.

        That the same building techniques are used in thier own house, and that other people who like to watch can peep on them through them, is not seriously considered.

        Instead, only the loss of really good ways to peep is what is considered. If the method of peeping is likely to be discovered, or the architecture behind the means of peeping changes such that the approach becomes less valuable, the peeping Tom may delude himself into thinking that he is doing a service to society and the landlord by pointing out how that peeping may happen. (See for instance, methods used to remotely observe what is displayed on a crt monitor by monitoring the em spectrum for telltale radio artifacts-- who uses crts these days?)

        The nsa is sick, and likes to watch. The very idea that they would feel they should stopper up the holes they look through, or alert people that they are looking at them through them, is counter to their fetish. The very idea is absurd to them. Only somebody that sees by accident, and is disgusted by having seen, has motive to see to it that no such seeing ever happens again, apart of course, from somebody catching somebody peeping on them, and discovering the hole that way.

        From the perspective of the nsa, if they have eno ugh places to peep through, you can putty up holes all day, and they can wack off to watching you do it. Telling you where all the holes are stops that from happening. They want to watch you. Not keep you safe from being peeped on.

      • Re:Easy. (Score:5, Interesting)

        by TheRaven64 ( 641858 ) on Friday August 19, 2016 @04:21AM (#52730997) Journal

        am I correct in understanding that the NSA knew about security holes in important aspects of our cyber infrastructure, and rather than report them so they could be fixed, they sat on them so they could use them "to protect us"?

        Yes. This is a big problem with the NSA and GCHQ, which have the dual missions of securing infrastructure and compromising enemy infrastructure. These missions come into direct conflict when the core of your and your enemy's infrastructure rely on the same components. Germany separates the two missions into separate institutions.

        The same thing came up when Heartbleed was discovered. There were basically two options:

        • The NSA had not found the vulnerability, in which case they were seriously failing in both missions as they'd either failed to notice that OpenSSL is core infrastructure (for the USA and for other countries) or they had failed to fuzz the protocol properly (part of the embarrassment about Heartbleed was that proper testing would have found it years ago). If this is the case, they are incompetent because there was evidence that the vulnerability had been exploited in the wild before the official disclosure.
        • The NSA had found the vulnerability but had decided that being able to attack SSL connections was worth the cost of leaving all financial and a lot of secure government communications vulnerable to foreign intelligence and criminal organisations. If this is the case, then they are incompetent at risk analysis and should not be permitted to engage in risky behaviour.

        There is no interpretation of events that makes them appear competent.

      • Playing devil's advocate (and kinda sounding like a gov shill... sigh...):

        Sorry for my sloth but....am I correct in understanding that the NSA knew about security holes in important aspects of our cyber infrastructure, and rather than report them so they could be fixed, they sat on them so they could use them "to protect us"?

        Considering how much of the global gov/economy mimics the US in terms of software/hardware used, it's not just the U.S. that is vulnerable to these exploits. Just sayin'.

        They knowing left these holes open, with no idea (nor any way of knowing) whether or not any criminals were exploiting these holes already, to our detriment?

        What? And help our adversaries protect their low-hanging fruit?

        I'd say they aren't just failing to do their job, they are knowingly doing the opposite of their job. Their conscious inaction put at-risk those they are supposed to protect, is therefore unethical, and constitutes an enormous breach of trust given their position of authority.

        Here you have a good point. There's this concept of organizational charters for the government. It's the CIA's job to look outside our borders, the FBI's to enforce federal laws within our borders, and the

      • They should all burn. I don't give a shit who spilled the beans, I want the decision-makers at the top to be thrown in jail for this.

        Alas we have already reached the point where despite being caught in lies and multiple smoking guns government itself now openly admits that the connected are above the law and that "no reasonable prosecutor would bring such a case". So while I agree that they should hang for treason it won't happen. They can do whatever they want and can do it more openly and brazenly than ever before.

        • Govt openly admits to reality! News at 11!
          As Douglas Adams said, "People are a problem".
          Sadly, this is the way humans do things.
          Revolutionaries allatime kicking the old bosses out.
          "Meet the new boss, same as the old boss". /endofmorningrambletimeforcoffee

      • The phrase you are looking for is "Deserting your post in the face of the enemy", and usually meets the definition of Treason (but not in the USA).
    • by AmiMoJo ( 196126 )

      That's assuming it was insiders. Snowden said it looked like they got in via an NSA malware staging server. Those kinds of servers will always be weak points.

    • You are assuming that this was an insider. If that assumption is false then your #1 is really a witch hunt (as you designated it, though given the rest of your comment I doubt you understand what the term means).

      "Really, this is not hard."

      Great, thanks for your confidence. You mention Edward Snowden in a comment below to justify this fantasy. An important difference is that in that case they *knew* who had done it. You conveniently overlook the difficulty in conducting this kind of investigation.

      Taking as t

  • by sshir ( 623215 ) on Thursday August 18, 2016 @07:15PM (#52729323)
    It was 3 years ago. Importance of this detail is this: in pre-Snowden era NSA did not have access logs or other internal audit tools. Those were considered risk to security of operations.
    My speculation is that this is why the data dump is so old - to maximally complicate forensic team's job.
  • For you tracking pleasure. Either these guys have gotten complacent or this is a setup. Either way it is fucked up.

  • by Anonymous Coward

    I think you mean a decent human being unlike all the other thugs

  • Unsurprising (Score:5, Insightful)

    by z0idberg ( 888892 ) on Thursday August 18, 2016 @07:27PM (#52729385)

    Not one of the steps involves questioning whether the NSA should be sitting on these 0-day exploits for their own use for years and leaving their own citizens and companies vulnerable to attack, rather than notifying the owners of the code and getting them patched.

    First order of business is finding out who let the cat out of the bag and getting retribution.

    • by sjames ( 1099 )

      It seems to me the first responsibility is to inform each vendor who has a vulnerability that is exploited so the stolen cache of cyberweapons becomes useless.

    • by rtb61 ( 674572 )

      The first step is patience, let the tools spread and behind a wave of script kiddie attacks, the NSA launches a global back door offensive, trying to stick in as many back doors as possible behind a wave of script kiddie attacks, some of which will be prosecuted as cover. A stolen idea back from when crackers (before main stream media renamed them hackers), distributed their software to provide cover for their activities and have the heat taken off when those script kiddies get busted. Kind of odd making t

  • by Anonymous Coward

    because of seth rogen, trust me, it was all because a freaking seth rogen movie

    ive got inside sources and stuff guyz

  • by Anonymous Coward

    The shadow broker leak is pretty boring. Just a bunch of exploit tools for publicly unknown zero days (Yeah sort of redundant but you get what I mean)

    No back doors, no secret keys, no yet unheard of techniques or technologies. Just zero days exploits for popular commercial systems.

    Even the fact that most are security appliances really isn't shocking. Such things promote a false sense of security and users trust them far too much, leading to an easy attack surfaced. - It just reinforces what we've known for

  • by Anonymous Coward

    If the NSA, CIA and FBI would actually use their powers for good and share the information they find to make our systems more fortified we'd be much better off than letting these exploits continue. They sure as fuck are not plugging the holes in their systems or other government systems, they just exploit them. They let our financial industry run around with the same exploits they know about and they are dumb as fuck to think that someone else China, Russia, you name it, are not also discovering these exp

    • by Agripa ( 139780 )

      If the NSA, CIA and FBI would actually use their powers for good and share the information they find to make our systems more fortified we'd be much better off than letting these exploits continue.

      This is the United States Government. They do not do this sort of thing.

  • Snowden? (Score:3, Informative)

    by Razed By TV ( 730353 ) on Thursday August 18, 2016 @07:36PM (#52729435)
    Part of me wonders if this leak is somehow related to Snowden's mysterious messages a couple weeks ago.
    I can't find mention of Shadow Brokers on Google before this hack. (Granted, they may have wanted to remain hidden.) Did the Shadow Brokers exist before this hack? Did they adopt a new name because of the scale?
  • by Anonymous Coward

    Some people think about responding in kind: A U.S. cyberattack.

    I vote we do much worse than that. The very worst, in fact!

    When we figure out who the bastards were, we send them Donald Trump. And no giving him back.

  • by zedaroca ( 3630525 ) on Thursday August 18, 2016 @07:59PM (#52729579)

    Just gave security [slashdot.org] to a lot of previously unprotected American citizens and foreigners.
    It seems like the only agents worth their food are the rogue ones.

  • Hackers breach Russian Command and Control server, auction off exploits.
  • That fits with the way people in large bureaucracy act when they feel they can only talk to the press. Given the US press is still constitutionally protected at least the wider public can have the "collect it all" domestic spying conversation that an internal bureaucracy never will.
    The NSA will try and counter any more walk outs with more automation of the product lines to other agencies. Wider issues of more human security is then the final customers responsibility not with collection.
    More of the buddy
  • How The US Will Likely Respond To Shadow Brokers Leak

    Liara needed that intel so Commander Shepard could thwart actual terrorist attacks.

  • by Anonymous Coward

    If they make a master key to unlock backdoors into everyones houses, and someone copies that key, now everyone can be robbed. This is why we don't have backdoors all unlockable with a master key. Maybe they shoukd have thought of fixing vulnerabilities instead of building a master key to backdoor into people's computers.

  • It quickly becomes a highly politicized process ripe^H^H^H^H rife with anonymous sources and little solid fact.

    There. Fixed that for ya.

  • This release would be very interesting if it broke new ground -- finding a computationally-easy way to break commonly used encryption, or a smoking gun universal back door built into OSes or network gear. From what I've read this is just previously undisclosed, easy to implement and potentially dangerous flaws in network equipment firmware.

    Here's an interesting question from someone not in the security field -- is this basically what hacking groups do? Are they just collecting a huge inventory of bugs by co

    • by Agripa ( 139780 )

      Is this basically what hacking groups do? Are they just collecting a huge inventory of bugs by constantly banging on these devices every possible way they can?

      They also infiltrate their targets and introduce exploits they can take advantage of. The NIST is a good example. Or they might pay the target to include the exploit like with RSA.

  • Maybe they are just trying to work out escape sequences for the Snowden character.

    He was the hero who showed the U.S. how it is violating itself with unconstitutional behavior. Then, once it reaches the epic peak, they will pin him as 'the shadow' broker, or whatever name they come up with, later on, if this attempt fails...

    When this happens the force for those who stand with him and his principles will be pitted against the force of people who at best vaguely understood him as either hero or villian
  • This seems to be clearly part of a larger campaign against the US. Whether true or not, I think that many of the smaller countries and even some of the larger ones feel that America has been the unchecked bully for far too long. Continuously chastising others while performing those same actions. Do as I say, not as I do.
    I can imagine that these players are working in concert to destabilize America with attacks designed to make the average American lose trust in the government and lose faith in the entire po

    • "attacks designed to make the average American lose trust in the government and lose faith in the entire political system."

      Where the fuck have you been. Americans have been distrusting government since the country was founded!! Move along Potsy.
    • Yes, we need a foreign enemy to fear and blame, and thankfully our media will helpfully focus on that rather than the contents of the message. People need to go on believing that the country is fair and just and a force for good in the world, and that it hasn't been hijacked to be the enforcer for rich plutocrats. There needs to be the illusion of choice, since it is better to think of oneself as a citizen rather than merely a subject.

      Never underestimate the power of denial.
  • ...better be some smokin' hot Asaris.

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...