The NSA watches you poop.

  • Guest, it's time once again for the massively important and exciting FoH Asshat Tournament!



    Go here and give us your nominations!
    Who's been the biggest Asshat in the last year? Give us your worst ones!

chaos

Buzzfeed Editor
17,324
4,839
They just bring this up to enlighten the last caveman on this planet that this strange guy which calls himself Alexander the Great, is in serious need of mental observation.
Rest of mankind thought so allready weeks ago.
But it doesn't really have anything to do with him. That space is a NETCOM space, it was built for the Army GNOSC/ACERT/NETCOM people back in the day who are tenants of the INSCOM building. I doubt Alexander even went down there more than a few times. It currently houses ARCYBER/ACERT/NETCOM, still no INSCOM people in there. He didn't petition to have it built, NETCOM did. He didn't pay for it, NETCOM did.
 

chaos

Buzzfeed Editor
17,324
4,839
Like I said, it isn't even that great. The article describes it as "chrome", nah, it is riveted sheet metal. And soldiers have to clean that shit. The screens are big, but the image quality sucks. Every year someone gets the same idea to put the Super Bowl on all the screens, making it like a 300" screen or whatever it is, but the image quality sucks so bad it is like watching them while wearing someone else's glasses. The doors are slow, noisy, and 100% unnecessary. And they break all the time. The "captain's chair" goes unoccupied 99% of the time, only people being briefed sit there and if it were me, I wouldn't want to sit there if I was being briefed. It limits your field of vision.
 

tad10

Elisha Dushku
5,533
599
Like I said, it isn't even that great.
rrr_img_43724.jpg
 

chaos

Buzzfeed Editor
17,324
4,839
Surprised not to see anything here about the NSA influencing private encryption standards/NIST standards and putting in possible back doors. Fanaskin is slippin.
 

chaos

Buzzfeed Editor
17,324
4,839
The NIST RNG thing turned out to be real, but the RNG that was compromised was one that no one uses because why. The other encryption stuff I think is still rumor mill at this point. But shit we had dozens of pages theorizing about killing journalists with death rays so I didn't think that would stop anyone.
 

fanaskin

Well known agitator
<Silver Donator>
56,028
138,799
NSA FISA Business Records Offer a Lot to Learn

Things I learned there include:
* NSA's internal infrastructure runs on Unix. (Linux is a branch of Unix.) Their analysts log in to Unix machines with logins and passwords, as we do, and they use the standard Unix/Linux file access controls ("user, group, and other" permissions).

* They use web servers and web browsers and HTML and URLs to deliver their data to their "customers" at the FBI, CIA, and NCTC.

* NSANET, their internal Internet, is not encrypted! (It is almost certainly protected by link encryption and fiber signal strength monitoring when it crosses from one place to another, but not inside their secured buildings.) It's just a bunch of machines plugged into Ethernets, running standard protocols, like what all of our infrastructure uses.

* I'm guessing the reason NSANET isn't encrypted is because they don't seem to have any better encryption protocols for general use inside NSA than we do outside. E.g. they don't seem to have automatic end-to-end encryption. So in order to be able to buy standard machines and plug them in and use them, they have to run their whole net unencrypted. (I think it's funny that because my old effort to embed automatic Opportunistic Encryption in Linux and IPSEC failed, therefore NSA's internal network isn't encrypted. Like they couldn't do it themselves!)

* They use a "PKI" (public key infrastructure) to control access to some databases inside NSANET. When they wanted to stop one part of NSA's tech infrastructure from accessing the telephone metadata, hey removed the "certificate" that gave it access credentials.

In other words, when it comes to general purpose computing, they are running on almost exactly the same kind of infrastructure we are -- nothing better. This makes sense, but I had expected that with billions of tax dollars every year they had made some improvements in the security, authenticity and integrity of their protocols and software. (But, I worked at Sun, which spent billions of dollars a year on engineering their hardware and software, and Sun's machines weren't much better than their competitors' at security, authenticity or integrity either.) We in the outside world *invented* all of NSA's infrastructure. They buy it from us, and are just "users" like most computer users. (Yes, they have programmers and they write code, but their code seems mostly applications, not lower level OS improvements or protocols. I'm not talking about the parts of NSA that find security holes in other peoples' infrastructure, nor the malware writers.)

So go read the document anyway! Don't believe what I tell you... draw your own conclusions.

Also it seems that:

* The vast majority of the information that they are squirting around inside NSA, searching and correlating, comes with no particular restrictions other than those that they impose internally (like not revealing things that disclose their sources and methods) and the general restrictions on releasing information about US persons. They got that data "legally", or anyway, "fair and square", by stealing it from signals in other countries, and they can do what they want with it. Having to deal with a judge who can put arbitrary restrictions on what they can do with a large database is a novel experience for them, and one that neither their personnel nor their infrastructure is properly set up to handle. That's why they found that data was "leaking" from the telephone metadata database nine or ten ways that they hadn't yet noticed until they did an end-to-end review. The leaks were mostly fairly minor, but if they hadn't been forced to do the review, it's clear that more and more of NSA would have just been treating the telephone metadata like any other piece of stolen data.

* Their "need to know" culture and the maze of classifications and code words often prevents the right hand from knowing what the left hand is doing. This is deliberate and is to help figure out who the insider threats ("moles") are, based on who had access to what info before it leaked outside NSA. But the result is also that nobody is really in charge. There are too many details that don't percolate up and down the chain of command, so stuff happens that isn't supposed to happen. Like, the programmers who wrote the code for accessing the stored database of telephone metadata knew that it could only be accessed with a search term ("selector") that met the court's standard for "RAS" ("Reasonable Articulable Suspicion"), so they coded the software to check for that. But the separate programmers who wrote the code for IMPORTING new data into the database from the telcos, didn't know that, so they wrote an "Alert list" (renamed "Activity Detection List" during the review) that would send a note to an analyst whenever new data came in for any selector on the list (e.g. when someone of interest to that analyst made a phone call). These selectors were not restricted to those that met the court's standards, and indeed most of the selectors on the list did NOT meet the standard (it had 1,935 RAS approved selectors and 15,900 unapproved ones). This is not because they tried to get around the court -- but because they were not in control of their own infrastructure, because of lack of internal sharing of relevant information. Free cultures really do outperform authoritarian ones!

* The vast majority of the information that they are squirting around inside NSA, searching and correlating, comes with no particular restrictions other than those that they impose internally (like not revealing things that disclose their sources and methods) and the general restrictions on releasing information about US persons. They got that data "legally", or anyway, "fair and square", by stealing it from signals in other countries, and they can do what they want with it. Having to deal with a judge who can put arbitrary restrictions on what they can do with a large database is a novel experience for them, and one that neither their personnel nor their infrastructure is properly set up to handle. That's why they found that data was "leaking" from the telephone metadata database nine or ten ways that they hadn't yet noticed until they did an end-to-end review. The leaks were mostly fairly minor, but if they hadn't been forced to do the review, it's clear that more and more of NSA would have just been treating the telephone metadata like any other piece of stolen data.

* Their "need to know" culture and the maze of classifications and code words often prevents the right hand from knowing what the left hand is doing. This is deliberate and is to help figure out who the insider threats ("moles") are, based on who had access to what info before it leaked outside NSA. But the result is also that nobody is really in charge. There are too many details that don't percolate up and down the chain of command, so stuff happens that isn't supposed to happen. Like, the programmers who wrote the code for accessing the stored database of telephone metadata knew that it could only be accessed with a search term ("selector") that met the court's standard for "RAS" ("Reasonable Articulable Suspicion"), so they coded the software to check for that. But the separate programmers who wrote the code for IMPORTING new data into the database from the telcos, didn't know that, so they wrote an "Alert list" (renamed "Activity Detection List" during the review) that would send a note to an analyst whenever new data came in for any selector on the list (e.g. when someone of interest to that analyst made a phone call). These selectors were not restricted to those that met the court's standards, and indeed most of the selectors on the list did NOT meet the standard (it had 1,935 RAS approved selectors and 15,900 unapproved ones). This is not because they tried to get around the court -- but because they were not in control of their own infrastructure, because of lack of internal sharing of relevant information. Free cultures really do outperform authoritarian ones!
 

chaos

Buzzfeed Editor
17,324
4,839
How about purposely sabotaging IPSEC prior to implementation in IPv6? I feel like I'm doing your job for you, fanaskin, and I don't have any tin foil.
 

fanaskin

Well known agitator
<Silver Donator>
56,028
138,799
you can contribute what you are more familiar with instead of looking for a singular source. The legal and public battle is more interesting to me.
 

fanaskin

Well known agitator
<Silver Donator>
56,028
138,799
The nypd spying unit/story should get more attention

Without Any Legal Basis, The NYPD Has Been Classifying Its Own Documents For More Than A Decade
But the NYPD is doing something no other city law enforcement agency has done: classifying its own documents.
Since at least 2003, the New York Police Department has been labeling some of its internal documents "Secret," a designation that has baffled government secrecy experts, journalists and civil liberties lawyers.

By labeling documents "secret," the Intelligence Division appears to be operating its own in-house classification system, similar to those used at federal agencies like the CIA, where Intel's chief, David Cohen, previously worked for 35 years.

Some of the documents also include the caveat, in all-caps, that "No portion of this document can be copied or distributed without the exclusive permission of the policy commissioner or deputy commissioner of intelligence."
Why is this "baffling?" Because the NYPD's in-house classification system has nothing legal to back it up.
"You know what that [label] means? It means diddly," said Robert Freeman, executive director of New York's Committee on Open Government. "I think the police department is following the lead of the federal government. The difficulty is, in my opinion, it does not have a legal basis for doing that."

Christopher Dunn, associate legal director at the New York Civil Liberties Union, told HuffPost he has only seen the label on documents created after 2001. He agreed with Freeman that "as far as I know, this marking has no legal significance."
The NYPD remains a law unto itself. Bloomberg has referred to it as the "seventh biggest army in the world" (and his own "personal army")