You may be hearing a knock on the door any minute! Sent from my iPad
On Sep 1, 2013, at 4:03 PM, Webster <[email protected]> wrote: > Not that it means anything to this discussion but I can make a guess as to > some of the software the NSA uses. They have emailed me a couple of times > for copies of my signed scripts since they block Dropbox (pre Snowden). They > have also asked for signed copies of my PDFs since unsigned versions are not > allowed. > > Maybe the NSA reads my site since I get hits from Iran, Iraq and several of > the “stans”. J > > Carl Webster > Consultant and Citrix Technology Professional > http://www.CarlWebster.com > > > From: [email protected] [mailto:[email protected]] > On Behalf Of Daniel Chenault > Sent: Sunday, September 01, 2013 1:08 PM > To: [email protected] > Subject: Re: [NTSysADM] Re: Finally. > > Yes, I do think it matters especially in terms of OpSec (this is not Joe’s > Widget Company we’re talking about after all). Are Lieutenants told the full > details of a battle plan, or only what they need to know to do their job? How > about Sergeants? Continuing the battlefield analogy, what about contractors > (mercenaries in that context)? > If you would prefer, the next time I mention the granularity of “Unix > permission” I will include with that a 20-page discussion on what I mean by > “Unix permissions.” If I mention the 1st Amendment do I have to include the > full text of the amendment? Or can we just stipulate in the interest of > brevity that that is not necessary and is already understood? > Permissions flow downward. The primary one handing out the permissions should > be a stakeholder. The persons below him do have the access he has. Sub-admins > is hardly a new concept; they can be contractors and often are. Authority can > be delegated; responsibility cannot. > > From: Ken Schaefer > Sent: Sunday, September 01, 2013 4:00 AM > To: [email protected] > Subject: RE: [NTSysADM] Re: Finally. > > Do you think it matters, in this case, whether it’s an FTE or a contractor > that has “the keys to the kingdom” – they’d all need to go through the > necessary security clearance, and have the right citizenship etc.? For > someone who /wants/ to betray their country (e.g. for ideological reasons or > monetary inducements), do you think their employment status really matters? > Especially if the penalty for getting caught might include being charged with > treason? > > In a large org like NSA, it’s not a matter of simply knowing “UNIX > permissions” – that’s a gross over-simplification of the types of systems a > large organisation would have. There’d probably be multiple Windows/AD and > Windows/standalone environments, multiple UNIX environments, multiple > mainframe/host environments, plus multiple systems when application > permissions where used. There is no single “key to the kingdom” or a person > that has such a key – except the Head/CEO/etc. > > If you’re saying that every privileged user, from the developer that might > implement a back door, to the network admin who might trace traffic, to the > backup operator that might duplicate a backup to the person who manages the > HR system and who could create a “fake” identity, needs to be an FTE, then I > think you’ll find that just about every large business and government agency > is “in breach” of your fundamental security principles. > > Cheers > Ken > > From: [email protected] [mailto:[email protected]] > On Behalf Of Daniel Chenault > Sent: Wednesday, 4 September 2013 3:08 PM > To: [email protected] > Subject: Re: [NTSysADM] Re: Finally. > > Why were the keys to the castle given to a contractor, a non-stakeholder? > While we may see a certain amount of laxity in this in industry and business > (not to say that's okay, it just happens) in such a sensitive environment, > one with a very real potential to be the target of espionage, the keys to the > castle should only reside in the hands of an employee. An extremely > well-trusted one with a complete knowledge of computer security including > using the granularity of Unix permissions to create admin accounts and groups > with specific perms to do specific functions. > A contractor, in the context of the role within the organization, is not a > stakeholder. If the company or organization fails the only impact to the > contractor is it's time to find another contract ( assuming he wasn't the > cause). Time to find another contract is business-as-usual for a contractor. > When one speaks of "tight security protocols" this is part of the discussion: > a very clear understanding of each position's role within the organization, > how it furthers the mission, the liabilities associated with the position and > a plan to ameliorate those liabilities. That discussion comes before filling > the position with an asset as that also defines the type of asset; in this > context it is employee or contractor. The proper answer is that the system > administrator, the ultimate holder of all security secrets, the role with > complete trust, is someone who has a stake in the success of the mission and > is under the direct authority of a key stakeholder if not key himself. > A contractor in such a sensitive environment should never have the full > authority of that administrator delegated to him. That violates the whole > idea of high security and the reason granularity is exposed in the computer > security model (implementation-specific). > I consider the above to be a rational and reasoned short examination of how > and why the assignments of roles and permissions are to be defined in any > organization where the word "security" is used as part of the priorities and > goals. The higher the need for tight security (say, 1-10) the more scrutiny > each role is given and permissions defined. For the NSA I would say the need > is 11. > But that's all just my opinion late on a Saturday night. I could be wrong. > > On Aug 31, 2013, at 21:37, "Ken Schaefer" <[email protected]> wrote: > > And what are your qualifications/experience, that allow you to make such a > call? (I’m assuming that you have no inside knowledge of how the NSA works, > and are relying on the public speculation/allegations at el Reg etc.) > > Cheers > Ken > > From: [email protected] [mailto:[email protected]] > On Behalf Of Kurt Buff > Sent: Sunday, 1 September 2013 12:03 AM > To: [email protected] > Subject: Re: [NTSysADM] Re: Finally. > > On the evidence, absolutely. > > For an intelligence/espionage operation to be so thoroughly pwned because of > such amazingly poor internal operational security, there can be only one > conclusion - management responsible for internal security should be fired. > > I'm just glad they weren't, and I hope that what Snowden took is enough to > bring them down, and that it's all revealed to the public. > > Kurt > > > On Sat, Aug 31, 2013 at 4:20 AM, Ken Schaefer <[email protected]> wrote: > So, you’re saying that the feared NSA, which has a bunch of un-discovered > rootkits, which able to undertake some of the most advanced espionage in the > world, is managed by idiots? Seriously? > > From: [email protected] [mailto:[email protected]] > On Behalf Of Jon Harris > Sent: Saturday, 31 August 2013 6:17 AM > To: [email protected] > Subject: RE: [NTSysADM] Re: Finally. > > Generally from I have seen in state (Florida) organizations is that they > don't like promoting anyone but a moron into supervisory positions. > Occasionally someone will make a mistake and promote an intelligent person > but not often. I would suspect this is the case with the Feds as well > (worked with them too). Several times I have seen them hire those with less > brains and longer tongues and large lips over those with brains. As long as > this keeps happening then we will continue to see this happen. It will be a > long time before they get rid of all the defective management personnel as I > would think private companies would have little to gain by keeping them > (maybe why they seem to concentrate in public jobs?) and in a government job > it is MUCH harder to get rid of them. > > Jon > > Date: Fri, 30 Aug 2013 14:34:15 -0400 > Subject: Re: [NTSysADM] Re: Finally. > From: [email protected] > To: [email protected] > > +13 > On Aug 30, 2013 11:05 AM, "Kurt Buff" <[email protected]> wrote: > On Fri, Aug 30, 2013 at 10:52 AM, Micheal Espinola Jr > <[email protected]> wrote: > > > > I accidentally hit CTRL-Enter before finishing that email... and > > apparently that's a shortcut to instantly-send a message in Gmail. Yay! I > > love learning new things... but anyways - So, yea, this Forbes article > > was the first I have seen that highlights the real underlying IT problem > > regarding Snowden - aside from other OT issues. > <snip> > >> > >> I may have missed some article by someone else somewhere, but Its to see > >> Forbes 'get it' before anyone else... > >> > >> http://www.forbes.com/sites/timworstall/2013/08/30/if-the-nsa-really-let-edward-snowden-do-this-then-someone-needs-to-be-fired/ > >> > >> -- > >> Espi > > > Agreed- massive failure on the part of many people in the NSA in > implementing security procedures. > > Of course, what Snowden showed, beyond that, is the massive failure > that is government policy and practices regarding > surveillance/espionage in general, so I'm actually quite happy Snowden > was able to do what he did. > > Kurt > >

