Iranians Compromised a Highly Sensitive CIA Covert Communications System in 2011 by Using Google Search: Report (yahoo.com) 154
In 2011, Iran was able to use Google's search functionality to hack into a secret CIA communication network that was being used to contact agents and informants around the world -- a breach that appears to have triggered the exposure and execution of Agency sources in China and Iran, Yahoo News reported Friday.
Ooops (Score:1)
Re:Ooops (Score:5, Insightful)
the compromised communications system tried to work by "security through obscurity"-- it used publicly-visible websites that were indexable and searchable, and didn't realize that once one was compromised, you could look at what was on it, and use well-crafted search terms to find them all.
Re: (Score:2)
Google didn't even screw up, it worked as intended.
the compromised communications system tried to work by "security through obscurity"-- it used publicly-visible websites that were indexable and searchable, and didn't realize that once one was compromised, you could look at what was on it, and use well-crafted search terms to find them all.
Who thought "security through obscurity" was a viable option when people's lives literally hung in the balance?
Re: (Score:2)
Who thought "security through obscurity" was a viable option when people's lives literally hung in the balance?
Who knew you could search the internet?
Re: (Score:2)
Re: (Score:1)
You might think that but it is highly probable this was intentional. These are under cover agents, if they were visiting "hidden" websites from some of these countries that could have been detected. Going to technically open websites, even if obscure, might not raise the same type of red flags.
I'm just guessing from the article that this was a "push" type site so those visiting it didn't actually identify themselves so what appears to have happened is the foreign agencies discovered the sites purpose and
Re: (Score:2)
There wasn't only one public facing website, there were hundreds of them, probably one for each potential source. But once the Iranians discovered one of them, they used Google to find similar websites, and then started to monitor them, as the sites shared some technicalties, being built by the same organization, probably with the same tools and maybe they even shared some elements.
Re: (Score:2)
For example, if we were in CHina, you could not have posted the the opposite without your gov knowing and punishing you for it.
Pakistan had to give CHina a port and must alllow a number of the oil pipes that America was accused of wanting (which had ZERO value to the west, but huge value to China). [ft.com]
Sr Lanka had t [qz.com]
Re: (Score:2)
The English and French owned the Suez canal, until they didn't.
China will learn the hard way. Right now they are building, when the building is done, they will learn about kleptocracies too.
Blame America (Score:3, Insightful)
If you consider USA evil — more evil than Iran and China — then you are in a wrong place. Learn Chinese and Farsi and fuck off to that part of the world, both physical and virtual...
Re: (Score:3, Insightful)
I consider US spies committing crimes in other countries evil.
Re: (Score:2)
I won't get all preachy and pretend the U.S. has some kind o
Re: (Score:1)
It really comes down to "the ends justify the means", and it rarely does once you are on that path, because you can justify any action once you go down that road.
I'm sure we had really pure intentions when we taught our torture techniques to all those South American dictatorships. Or assassinated or smeared all those leaders who were unsympathetic to our business interests.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
That's completely irrelevant. The alternative to their ending up in Guantanamo was death, and any other country (except, maybe, Israel) would've shot them on the spot [umb.edu] — and you wouldn't have cared... Indeed, you didn't care when we were doing just that with a certain Nobel Peace Prize laureate at the helm [theguardian.com].
Re: (Score:2)
It is a trilemma, and it is very real:
Bush chose the third. Obama — in his Nobel Peace Prize winner's mercy — the first. Would you pick the second? Let the guys, who've just engaged you in a firefight, go?
No, I can't. Nobody has so far — Somali pirates are let go [cnn.com], because there is no fourth choice...
(Further anonymous replies will be ignored.)
Re: (Score:2)
what happened to the constitutional guarantee of a trial? Why is that not an option?
Re: (Score:2)
IANAL, but I doubt, enemy combatants are covered by that guarantee — certainly not if they are outside of the US proper. And what crime would you accuse them of?
I don't know. But, as the already-cited case of Somali pirates shows, it is not — and not only in the case of the blood-thirsty AmeriKKKan goon$, but for the gentle Canadians [cnn.com] and enlightened Europeans [usatoday.com] as well...
Why don't you stop blaming America for a seco
Re: (Score:2)
Re: (Score:2)
Anyone convinced, US is evil, ought to not live here, nor communicate with us — except, maybe, by delivering an ultimatum and/or accepting our surrender. It is my right to demand, that such people act in accordance with their own words.
Do I really need to explain this to someone publicly lamenting the diminishing of honour "these days"?
Re: (Score:3)
I was asking because I was curios to find out if he was a hypocrite, which is fairly common for his type. BUT, he did not answer.
However, I would say that if you are a patriot and true American, then you would understand what the bill of rights is all about.
Re: (Score:2)
So do I, don't I?
You don't, it seems...
Re: (Score:2)
OTOH, you would boot them out of here if you could for their saying that they hate us. that is what I'm saying you can not do.
Besides, That guy, appears to be a dutch Muslim, which in itself is a bit odd.
I prefer that they are out in the open about how they operate and think. So do others.
Re: (Score:2)
No. Quit projecting your own inclinations on others. What I said is precisely what I meant: whoever thinks America is evil, ought to pack up and leave to whatever place he believes is less evil.
His not doing it betrays height of hypocrisy.
I doubt strongly, he considers his new homeland much better than the US — considering Netherlands being a staunch ally of ours, the staunchest outside
Re:Blame America (Score:5, Insightful)
Re: (Score:2)
They can call us evil and great Satan and whatever — but if they do it while in America and/or on an American web-forum, they are hypocrites.
Re: (Score:2)
Re: (Score:2)
(Just in case, you aren't sarcastic...)
Please, cite one instance in the humanity's history, where this approach worked.
Some people are further from perfection than others.
For example, I'm sure, you'll agree, that some people need to be incarcerated — or, maybe, even killed — for the things they've done. Which means, people's actions could trigger adversarial re
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Not Jewish, Proudly circumcised. Womens dont like that shit man. Trust me I got some homies with that extra dick skin. They also get dick cheese and other nasty shit. Seriously though its unhealthy not to cut that shit off. and what better time to do than when a new born when you dont even feel it. I also know people who have had it done as kids and adults. They said they wish their parents had cared earlier.
Re: (Score:1)
Translation: Because I was mutilated as a baby, everyone else should be.
Pro-tip: dick cheese is a sign of poor hygene. Mutilation might prevent dick cheese but it won't prevent the nasty bacteria developing in the surrounding areas if you don't keep clean.
Re: (Score:2)
So your approach to personal hygiene is just to cut off anything you can't be bothered to wash ?
Re: (Score:2)
by no means am I using that as the defining factor.
Re: (Score:1)
No Iran has not violated the nuclear agreement [0] Are you a Trump MAGA person? If not, why are you misinformed on this issue?
Also, let's review the record:
Most Americans don't know that the US overthrew the democratically elected government of Iran in 1953 (Operation Ajax) [1]. Eisenhower and Truman were presidents then.
The US also supported then US-ally Saddam Hussain in his war against Iran financially and with weaponry [2] from 1980-1988 even though Saddam was using biological weapons for ethnic cleansi
Re: (Score:2)
That's not an apology, it's a statement of some of the inarguable facts around the event. It's also not an admission of guilt.
Re: (Score:2)
Re:Ooops (Score:5, Insightful)
Google didn't do anything but index web pages. The CIA controllers who didn't take the extremely simple and well-known measures to prevent indexing are the ones who were evil.
It's like saying car manufacturers are evil because someone used their product to rob a bank. Only the bank opened up the vault as a drive-through instead of actually securing it in any way.
TL;DR the CIA and Iran/China used convenient tools on the internet for spycraft. The CIA didn't use it prudently however, and got agents and informants killed due to their carelessness.
and worse Ooops (Score:5, Informative)
That was actually in the news three years ago, but because of secrecy, the details of exactly what he warned about was left out. Now we know: https://www.mcclatchydc.com/ne... [mcclatchydc.com] or https://www.thestate.com/news/... [thestate.com]
"The CIA case involves former contractor John Reidy, who asserts he was punished after warning of a “catastrophic failure” in the spy agency’s operations. “It was a recipe for disaster,” Reidy wrote in his appeal, which was redacted by intelligence officials. “We had a catastrophic failure on our hands that would ensnare a great many of our sources.” His lawyer, Kel McClanahan, said Reidy was in charge of identifying foreign sources and systems in the telecommunications and computer fields that would be of interest to U.S. intelligence agencies.
Reidy also was responsible for developing intelligence operations against those targets, his lawyer said. McClanahan said his client is not permitted to discuss the case in more detail even with him because the CIA says the information is classified.
Reidy asserts that he first detected vulnerabilities in a CIA program in 2006, according to the appeal filing obtained by McClatchy. Signs of the problems included “anomalies in our operations and conflicting intelligence reporting that indicated several of our operations had been compromised,” he wrote, adding that he noticed “sources abruptly and without reason ceasing all communications with us.”
Re: (Score:2)
But if a gun is used, it is the fault of the gun manufacturer. So if Smith & Wesson is responsible for shooting, then Google is responsible for this.
Gun manufacturers immune from liability (Score:2)
But if a gun is used, it is the fault of the gun manufacturer.
Actually, by law, if a gun is used in a crime it is explicitly not the fault of the gun manufacturer.
The 2005 "Protection of Lawful Commerce in Arms Act" makes gun manufacturers immune from liability for use of their guns.
http://time.com/4967018/las-vegas-shooting-gun-lawsuits/
https://en.wikipedia.org/wiki/Protection_of_Lawful_Commerce_in_Arms_Act
https://www.snopes.com/fact-check/gun-manufacturers-crimes-products/
Re: (Score:2)
Context: States trying to pass laws that make manufactures liable for their product working as designed and intended.
Re: (Score:2)
Actually, by law, if a gun is used in a crime it is explicitly not the fault of the gun manufacturer. The 2005 "Protection of Lawful Commerce in Arms Act" makes gun manufacturers immune from liability for use of their guns.
Context: States trying to pass laws that make manufactures liable for their product working as designed and intended.
Close. The context is that lawyers discovered that there is money to be made from suing manufacturers of products that kill people. After they went after asbestos and then after tobacco, an obvious next target in the category of "somebody who makes a product that kills lots of people" is "companies that make guns."
The fact that killing people is (as you put it) "the product working as designed and intended" would not be a very good defense.
Re: (Score:2)
It's a great defense.
Companies are not liable for what people do with their products,
Shitheal states were trying to pass laws to make the gun manufacturers liable for their products _working_correctly_. That's because absent those laws, gun manufactures were not liable. No more than car manufacturers are liable for shitty drivers.
Re: (Score:2)
It's a great defense. Companies are not liable for what people do with their products,
That's an editorial comment, not a legal principle.
Companies, in fact, can be liable for what people do with their product. This is specifically true when what their product does is kill people.
Shitheal states were trying to pass laws to make the gun manufacturers liable for their products _working_correctly_. That's because absent those laws, gun manufactures were not liable. No more than car manufacturers are liable for shitty drivers.
An excellent example. Car manufacturers are subject to a whole plethora of regulations for safety. Gun manufacturers, none.
Re: (Score:2)
An excellent example. Car manufacturers are subject to a whole plethora of regulations for safety. Gun manufacturers, none.
None? So the BATFE and various state laws which apply to gun manufacturers and gun sellers and gun owners are a myth?
I have always said that the California and Massachusetts approved firearms rosters are not about safety. Can I quote you?
Yea, no safety laws at all [giffords.org].
Guns, regulated like cars? (Score:2)
You are perfectly aware that guns do not have safety regulations anywhere as seriously cars.
Actually Google had very little to do with this. (Score:5, Interesting)
Most of the methods Iranians used would have been familiar to George Smiley. They looked at what the Americans obviously knew about Iran and figured out who could have told them. Then they leaned on those people and found out how they were communicating with the CIA.
This is where Google came in. These people were using phony websites to communicate with the CIA, and Iranian intelligence used Google to uncover similar websites. Then they hacked into those websites after which they had the keys to the kingdom.
It was the CIA's reliance on a bodged-together, vulnerable system that killed those assets. They used it even after they'd been warned by their own analysts in 2008 that it had been compromised.
Re: (Score:2)
I'm not even sure they hacked those websites. I think they just logged which IPs connect to those domains, and then spied on those.
Many stories, not just one [Re:And how did Rus...] (Score:2)
So how did Russia get the names of US agents, one former FSB and one current FSB, and one hotel cleaner, six days after Trump got the unredacted piss memo with the names of those agents in?
I'm not sure what your point is. The article here is about one intelligence failure, which was in 2011. You're asking about a different intelligence failure, six years later. The existence of one intelligence failure doesn't say much about the other one.
...There is ONE article by "Zach Dorfman and Jenna McLaughlin" and this is it. Just because you read it, don't assume its true.
Yes, it is one article. Once you read it, however, you see that there were earlier articles on the same leak which just didn't have the actual details.
https://www.pulitzer.org/files/2015/national-reporting/mcclatchy/10mcclatchy2015.pdf [pulitzer.org]. (alternate source:
What is behind the link? (Score:2)
This (Score:4, Informative)
In 2013, hundreds of CIA officers â" many working nonstop for weeks â" scrambled to contain a disaster of global proportions: a compromise of the agencyâ(TM)s internet-based covert communications system used to interact with its informants in dark corners around the world. Teams of CIA experts worked feverishly to take down and reconfigure the websites secretly used for these communications; others managed operations to quickly spirit assets to safety and oversaw other forms of triage.
âoeWhen this was going on, it was all that mattered,â said one former intelligence community official. The situation was âoecatastrophic,â said another former senior intelligence official.
From around 2009 to 2013, the U.S. intelligence community experienced crippling intelligence failures related to the secret internet-based communications system, a key means for remote messaging between CIA officers and their sources on the ground worldwide. The previously unreported global problem originated in Iran and spiderwebbed to other countries, and was left unrepaired â" despite warnings about what was happening â" until more than two dozen sources died in China in 2011 and 2012 as a result, according to 11 former intelligence and national security officials.
The disaster ensnared every corner of the national security bureaucracy â" from multiple intelligence agencies, congressional intelligence committees and independent contractors to internal government watchdogs â" forcing a slow-moving, complex government machine to grapple with the deadly dangers of emerging technologies.
In a world where dependence on advanced technology may be a necessary evil for modern espionage, particularly in hostile regions where American officials canâ(TM)t operate freely, such technical failures are an ever present danger and will only become more acute with time.
âoeWhen these types of compromises happen, itâ(TM)s so dark and bad,â said one former official. âoeThey can burrow in. It never really ends.â
A former senior intelligence official with direct knowledge of the compromise said it had global implications for the CIA. âoeYou start thinking twice about people, from China to Russia to Iran to North Korea,â said the former official. The CIA was worried about its network âoetotally unwinding worldwide.â
Yahoo Newsâ(TM) reporting on this global communications failure is based on conversations with eleven former U.S. intelligence and government officials directly familiar with the matter who requested anonymity to discuss sensitive operations. Multiple former intelligence officials said that the damage from the potential global compromise was serious â" even catastrophic â" and will persist for years.
More than just a question of a single failure, the fiasco illustrates a breakdown that was never properly addressed. The governmentâ(TM)s inability to address the communication systemâ(TM)s insecurities until after sources were rolled up in China was disastrous. âoeWeâ(TM)re still dealing with the fallout,â said one former national security official. âoeDozens of people around the world were killed because of this.â
***** EAT AT JOE'S
One of the largest intelligence failures of the past decade started in Iran in 2009, when the Obama administration announced the discovery of a secret Iranian underground enrichment facility â" part of Iranâ(TM)s headlong drive for nuclear weapons. Angered about the breach, the Iranians went on a mole hunt, looking for foreign spies, said one former senior intelligence official.
The mole hunt wasnâ(TM)t hard, in large part, because the communications system the CIA was using to communicate with agents was flawed. Former U.S. officials said the internet-based platform, which was first used in war zones in the Middle East, was not built to withstand the sophisticated counterintelligence efforts of a s
Re: (Score:2)
... In 2013 ...From around 2009 to 2013, the U.S. intelligence community experienced crippling intelligence failures related to the secret internet-based communications system, a key means for remote messaging between CIA officers and their sources on the ground worldwide. ...until more than two dozen sources died in China in 2011 and 2012 as a result, according to 11 former intelligence and national security officials.
So another scandal under Obama and Clinton that was buried. He was easily the most protected president by the media since Kennedy.
Re: (Score:2)
Looks like this Yahoo-only news story is being picked up by the right-wing echo chamber. Since the news media isn't picking up on this story, I'm going to call it fake news.
Not yahoo-only, in fact, it was reported here before Yahoo picked it up: https://foreignpolicy.com/2018... [foreignpolicy.com]
and here: https://www.thisisinsider.com/... [thisisinsider.com]
http://www.thedrive.com/the-war-zone/22952/chinas-dismantling-of-cia-spy-ring-highlights-growing-dystopian-like-surveillance-state
https://www.foxnews.com/us/officials-fear-china-compromised-us-covert-communications-report-says
and it's been picked up elsewhere: https://arstechnica.com/tech-p... [arstechnica.com]
It Wuz HaXX0Rz1!!1!11!!!1!!!1! (Score:1)
Come on guys, if you can google it, it's not "hacking".
In fact, "hacking" isn't even about computer security; if you think it is you lack Clue and are likely spouting nonsense. Which is exactly what most of the "computer security" s'kiddies do for a living. So here: Somebody left the door wide open, and instead of pointing to the culprit you find some other idiots to point to, just to deflect the blame. Syeah right, "hacking". Nope, sheer unadulterated incompetence.
This Internet Thing... (Score:3)
Seems insecure.
Maybe we should go back to typewriters.
Re: (Score:2)
not just the internet, this whole computer thing seems pretty insecure.
Almost seems like the eggheads who designed and created these things did it that way on purpose, so there'd always be a strong demand in the future for people who understand this stuff.
Problem pre-dates Obama [Re:Obama's CIA was th...] (Score:2)
30 Chinese assets executed. Iranians use Google to break into a classified information system. Covertly funded "Friendly rebels" become ISIS. Obama was one of the worst presidents ever.
If you dig down into the references, you see that the first realization that there was a problem dates back to 2006, two years before Obama was elected:
Reidy asserts that he first detected vulnerabilities in a CIA program in 2006, according to the appeal filing obtained by McClatchy. source: https://www.thestate.com/news/... [thestate.com]
Re: Obama's CIA was the worst ever (Score:1)
Just leave it on the ground! (Score:2)
It wasn't hard (Score:2)
They made sure Google indexed their malware web site Shemales4CIA.
Re: (Score:2)
Why is this data even available to Google or any public connection for that matter? Stupid...
Well, I'm not totally sure, but it seems to me that covert human operatives on foreign soil need some way to communicate "in the clear" with their handlers. This means that the idea was to communicate over public networks.... Thus the use of public webpages...
Google is in the business of scanning and cataloging public pages then providing links based on search criteria.
However, why somebody didn't prevent these pages from being scanned though any number of available methods is beyond me..
Re: (Score:2)
It sounds like the problem was the CIA was sloppy and made all their web pages similar enough they were easy to Google. Iran and China then rounded up everyone frequenting those pages.
Why don't they just use public pages? The internet has no shortage of discussion forums, many of which must be frequented by millions of people, even in Iran and China.
Re:why (Score:4, Interesting)
Why don't they just use public pages? The internet has no shortage of discussion forums, many of which must be frequented by millions of people, even in Iran and China.
MMOs. MMOs make the perfect medium for covert communication. Think about how many hundreds, if not thousands of games there are that allow communication between players, many with world-wide player bases. You have behemoths like WoW with multiple servers in multiple regions down to $2 cellphone games. Even if a country were able to go through the arduous task of figuring if or what game is being used, simple tradecraft basics make monitoring difficult. It could be coded messages, set times to meet, or even something as simple as sending/giving a player a certain item or buying/selling an item at a certain price had different or predetermined meanings. Unless a target is already under surveillance and their machine is compromised an agency would have to covertly find/add a back door or crack and track every game available (and with VPNs and other methods even games NOT available) within it's borders.
Re: (Score:2)
You mean Reddit isn't an MMO?
Re: (Score:2)
However, why somebody didn't prevent these pages from being scanned
Because that would have bumped them up a notch on a list of suspicious sites. A storefront or other site that would be expected to want a good position in search engine listings, but tries to hide instead.
Why not use a combination of request attributes (or looks for some whitelisted client certificates) to switch the behavior of the web site from innocuous to the CIA portal. There are a number of different techniques one can use to present one face to Google and the world an another to trusted users.
Long Article, Quick Summary (Score:5, Informative)
There was still some old fashioned spying going on. Without a double agent to show the Iranians a sample website, they never would have figured out which strings to search for.
The bigger question is, did Iran share this information with China and Russia? If so, what did they get in exchange?
Re:Long Article, Quick Summary (Score:5, Interesting)
This is a really long article that can be summarized in about two paragraphs:
Well, plus one more very important paragraph:
They were told there was a problem. They ignored it, and fired the person who told them.
Comment removed (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
You have to wonder why the CIA didn't simply block the Google bot from trawling their web site.
Re: (Score:2)
The thing that surprises me is that these were out on the public internet and not hidden sites on TOR. At least then Google wouldn't be trawling them. TOR is far from perfect, but it's way better than what they were doing.
Re: (Score:2)
We did that?! (Score:1)
I thought Russia was the one that did that!
Re: (Score:1)
Re: (Score:2)
OR search Spy Games clips on YouTube before you settle down to watch your favorite VHS on your still-functional VCR.
You can scan for Dinner Out while you're at it. They don't make movies like *that* anymore.
Enjoy =)
Re: (Score:2)
Excellent expression of asymmetrical warfare (Score:3)
And neither the first nor last example.
The future of real warfare between states isn't limited to military force. It's likely that any military actions will be preparatory and sustaining, but not decisive. Attacks on infrastructure, denial of access to critical information and resources, and isolation from allies can all be accomplished with information technology.
This example is most instructive in that it shows how states with limited resources in some areas can be capable, even formidable adversaries in others. The US has the most capable military assets available, with only a few (but notable) exceptions where adversaries have sufficient assets to cause major losses to US forces and potentially prevail in regional conflicts. But in so-called 'cyber' warfare, the US has no discernible advantage. Relatively small, impoverished, or militarily weak states have equal capabilities. And non-state players can be just as capable.
For the US, the only real hope is that it has undisclosed capabilities, which is entirely likely, or that it will focus on developing those. Sadly, unlike military force, which takes in some instances a generation to develop new and overwhelming advantages, cyber warfare changes year,y, actually, monthly, and these advances are shared virtually instantly among allies, requiring no factories, manufacturing techniques, or natural resources beyond manpower, intellect, and thought. Ask aerospace engineers - it takes so much less time to devise a new weapon system than it does to actually manufacture and refine it to the point of usefulness. And cyber warfare is cheaper too, by every measure, to develop and deploy.
I'm confident in assuming that the US and others have the means to detect and monitor electronic communications among allies and adversaries worldwide, with few exceptions. And they constantly have to refine those methods to keep up with the changing landscape. And the only way to do that is to deploy an intercept system that captures everything, everywhere, all the time, and keeps it for analysis and exploitation. All this means our government is compelled to violate our privacy and civil rights, if not explicitly, then implicitly, as it captures all the things always, just to be able to find the enemy's vulnerabilities and secrets.
It's a nasty business. We have no other choice. Our enemies will certainly do so, and without a shred of restraint. If they can prevail at our expense, they will indeed. And this example shows that there is no hope of ever turning back from this state. It will only get worse. All attempts to secure our information systems will only succeed in making it more difficult to find the enemy. They will use all security measures to improve their methods. But we must improve security, no matter, for all the other reasons. A vicious circle, one impossible to stop.
Corrected headline: (Score:2)
"CIA Exposed a Highly Sensitive Communications System on the Public Internet, Where it Could be Compromised by Iranians Simply Using Google Search"
The real question is: How inept is the CIA? (Score:2)
Hi-tech vs low-tech (Score:2)
Re: (Score:2)
Re: (Score:2)
High latency and low bandwidth may seem like disadvantages, but at the same time it slows down and limits the discovery scope. The problem with the low latency, high bandwidth methods is that once you hack one, you can hack the rest by running a script (or a google search). This is what happened here. The low tech, old methods are also susceptible to high tech discovery methods (high tech digital surveillance, data mining, etc), but their main advantage was that if you compromise one dead drop, you didn't c
Re: (Score:2)
The problem is that people could understand low tech easier, so when there was only low tech for secret communications and low tech for detection, it worked and people understood why. With high tech, low tech methods are easier to crack too. Unfortunately, a lot of people in high ranking positions think that if they can't think of a way to hack something, or simply don't understand it (try to explain specter vulnerability to career bureaucrat) they consider it secure, and make decisions accordingly - "it's
Used Google? Typical sensational headline. (Score:3)
Come on, Google as a tool was about as important as they fact that they used the internet developed by US own DARPA. Oh, and they likely used Intel or AMD CPUs, and probably US made Windows or Linux, paired Chrome or Edge or Firefox too.Or maybe they used an iPad, so let's change the headline to using Apple.
The article makes it sounds like Google was the weakness here. If it wasn't for Google search, they would have used other tools with the same result. While interesting news, the headline on Slashdot is just sensationalism - notice the linked article does not have Google in the headline, or any other splashy company names.
This fully reminds me of.. (Score:2)
MAD Mag Spy vs. Spy comic. And with the bombs
How Dare Iran! (Score:2)
How dare they even think about using counterespionage techniques against the US! Don't they know that they are just supposed to do nothing and let the US win? /s
Learn from history. (Score:2)
The UK had the best spies in position to spy on passing troop trains.
The Germans waited for the information collected to be passed back up spy networks and found the spies.
The UK failed at having a good way to pass information back quickly and with no way of getting detected.
During WW2 UK spies had poor radio and code security skills.
The ability to detect radio use and lo
Re: (Score:2)
With the raw data that our personal tracking devices contain and share with the phone company,
As a spy, you want your observable behavior to blend in with the crowd. Hiding (too much) is just as suspicious as standing out.
This is why everyone needs to use secure communications and encryption*. Of course, this makes law enforcement snooping that much more difficult. One has to balance the safety of our friends working in hostile countries with the possibility that some people might abuse security to swipe some Disney content. It appears that Mickey Mouse won out over some lives in this case.
*It wou