Please quote where Kurt made the "sole root cause" claim. I dont feel like reading back through archives, and let's not forget you're the one making the claims here.
-- Espi On Mon, Sep 2, 2013 at 9:51 PM, Ken Schaefer <[email protected]> wrote: > From the email you just replied to: > > > Certainly the failure was epic, and heads will/should roll. > > I thought "heads should roll" was a euphemism that was used in the US? Am > I mistaken? Chalk it down to cultural misunderstanding then. > > For the record - I'm not excusing failure. Find me anywhere where I've > said "too bad, shit happens" > > I'm challenging your claim that the sole root cause for this debacle is > "incompetent management". You made the claim - you back it up. For the > record, I put some reasons out there why I think it's not that simple, by > way of explanation for my challenge. However, let's not forget you're the > one making the claims here. > > Cheers > Ken > > -----Original Message----- > From: [email protected] [mailto: > [email protected]] On Behalf Of Kurt Buff > Sent: Tuesday, 3 September 2013 1:46 PM > To: [email protected] > Subject: Re: [NTSysADM] Re: Finally. > > So, are you stating that it's your belief that nobody in this incident > should be fired? > > And, since you don't like my analogy, let's try another - BP in the Gulf > of Mexico spilled millions of barrels of crude oil. Should nobody be > faulted for failing at that core competency? Or is any failure excusable > because, well, it's at scale, and therefore hard? > > Kurt > > On Sun, Sep 1, 2013 at 8:46 PM, Ken Schaefer <[email protected]> wrote: > > Faulty analysis IMHO > > > > "Making money" is what any for-profit company aims for - not something > that is specific to banking. A bank's aim is to marry savers and borrowers. > Exxon wants to "make money", but it does that through producing energy > products. The NYT aims to "make money", but it does that through selling > access to news. Those are the "core missions" of the organisations in > question. > > > > Likewise, the core mission of the NSA would be to safeguard the USA from > external threats, and it does this through the collection and analysis of > signals intelligence. The core mission of the NSA isn't to "ensure that > nothing ever gets leaked". Just because it has "security" in the name > doesn't mean that it's whatever security thing you think is important. > > > > Certainly the failure was epic, and heads will/should roll. But you > ascribed a single factor as the root cause of the problem, yet you've > provided no analysis to justify that claim. All you've provided is a bunch > of irrelevancies (how much computing power the NSA has, the fact you've > designed more secure systems, and something about banks "making money"). > How does any of that show that institutionalised "management incompetence" > is at fault here? > > > > Cheers > > Ken > > > > -----Original Message----- > > From: [email protected] > > [mailto:[email protected]] On Behalf Of Kurt Buff > > Sent: Monday, 2 September 2013 1:20 PM > > To: [email protected] > > Subject: Re: [NTSysADM] Re: Finally. > > > > This is an agency which has the name of the National *Security* > > Agency. It has, nearly since its inception, been at the forefront of > > both security and computing, with its computing power measured in > > ACRES - see the Bamford books (especially The Puzzle Palace). It was > > also known to insiders as "No Such Agency" or "Never Say Anything", > > and had always been far more secretive (until Bamford published his > > books) than the other major intelligence agencies, such as DIA, CIA, > NRO, etc. > > > > If a bank were to so spectacularly fail at its core mission - to make > money - for reasons *entirely in its control*, you'd call for someone's job > to be vacated, wouldn't you? > > > > The NSA failed spectacularly at *its* core mission - security - and > regardless of the scale of the organization, it failed utterly. This is one > case for which the word 'epic' is warranted. The scope and scale of the > failure is astonishing. Many jobs should be vacated. > > > > Kurt > > > > On Sun, Sep 1, 2013 at 5:21 PM, Ken Schaefer <[email protected]> wrote: > >> Yes, I think it does. > >> > >> Small orgs are much more agile than large enterprises: > >> - it's easy/easier to gather requirements, > >> - requirements have fewer conflicts (because there are fewer > >> stakeholders) > >> - they don't tend to work 24x7 or require 5 9s uptime, so things can > >> be shutdown, upgraded, replaced, migrated with relative ease > >> > >> The bigger and the more "information heavy" the enterprise is, the less > agile it becomes in terms of remediating older systems. Many of the > projects for the bank I work for (as a touch point) register hundreds of > dependencies - some over a thousand. Just moving a data centre (as an > example) is a 42 month exercise. Sometimes things get missed. > >> > >> I personally haven't run into any security architects at any of the > large accounts I've worked at that have your level of confidence in the > systems and processes that they have in-place. So, either they're > incompetent (possible - I'll give you that), or the problem is more complex > than you make it out to be. > >> > >> Personally, I think security in non-trivial environments is hard: how > do I vet every piece of code coming into my environment? How do I audit it > continuously? How do I make sure that no one's restored a backup somewhere? > How do I know no-one's tapped my network? A business user hasn't > mis-applied permissions to an application? Etc. How do I do all of this in > a timely manner, so that I close the holes before they're exploited? There > is no silver bullet that solves this - which is why everyone's still > struggling and we still have incidents. > >> > >> Even in well run organisations, using technology largely from a single > vendor, there's still outages and things that go wrong (e.g. Microsoft's > Azure storage, or the recent O365 outage). I agree that sometimes people do > stupid things - I'm sure that happens in small environments too. But in big > environments, even with the best intentions, smart people and good > processes, things still go wrong. > >> > >> Cheers > >> Ken > >> > >> -----Original Message----- > >> From: [email protected] > >> [mailto:[email protected]] On Behalf Of Kurt Buff > >> Sent: Monday, 2 September 2013 9:52 AM > >> To: [email protected] > >> Subject: Re: [NTSysADM] Re: Finally. > >> > >> Nope. Does that matter? Well, I suppose you think it does, but I doubt > it. With scale should come resources, and the NSA obviously does have > resources, including people with far more training, and who of whom are > smarter, than me. > >> > >> There are no excuses for this. > >> > >> Kurt > >> > >> On Sun, Sep 1, 2013 at 4:25 PM, Ken Schaefer <[email protected]> wrote: > >>> You've designed "more secure" systems at scale (40K+ employees) in an > information heavy organisation (bank, accountancy etc.)? > >>> > >>> Cheers > >>> Ken > >>> > >>> -----Original Message----- > >>> From: [email protected] > >>> [mailto:[email protected]] On Behalf Of Kurt Buff > >>> Sent: Monday, 2 September 2013 4:01 AM > >>> To: [email protected] > >>> Subject: Re: [NTSysADM] Re: Finally. > >>> > >>> Aside from reading all those Le Carre novels? > >>> > >>> I've already designed more secure systems than were obviously in > place, as have many people on this list, perhaps including you. > >>> > >>> Kurt > >>> > >>> On Sat, Aug 31, 2013 at 7:35 PM, Ken Schaefer <[email protected]> wrote: > >>>> And what are your qualifications/experience, that allow you to make > >>>> such a call? (I’m assuming that you have no inside knowledge of how > >>>> the NSA works, and are relying on the public > >>>> speculation/allegations at el Reg etc.) > >>>> > >>>> > >>>> > >>>> Cheers > >>>> > >>>> Ken > >>>> > >>>> > >>>> > >>>> From: [email protected] > >>>> [mailto:[email protected]] > >>>> On Behalf Of Kurt Buff > >>>> Sent: Sunday, 1 September 2013 12:03 AM > >>>> To: [email protected] > >>>> > >>>> > >>>> Subject: Re: [NTSysADM] Re: Finally. > >>>> > >>>> > >>>> > >>>> On the evidence, absolutely. > >>>> > >>>> For an intelligence/espionage operation to be so thoroughly pwned > >>>> because of such amazingly poor internal operational security, there > >>>> can be only one conclusion - management responsible for internal > security should be fired. > >>>> > >>>> I'm just glad they weren't, and I hope that what Snowden took is > >>>> enough to bring them down, and that it's all revealed to the public. > >>>> > >>>> > >>>> > >>>> Kurt > >>>> > >>>> > >>>> > >>>> On Sat, Aug 31, 2013 at 4:20 AM, Ken Schaefer <[email protected]> wrote: > >>>> > >>>> So, you’re saying that the feared NSA, which has a bunch of > >>>> un-discovered rootkits, which able to undertake some of the most > >>>> advanced espionage in the world, is managed by idiots? Seriously? > >>>> > >>>> > >>>> > >>>> From: [email protected] > >>>> [mailto:[email protected]] > >>>> On Behalf Of Jon Harris > >>>> Sent: Saturday, 31 August 2013 6:17 AM > >>>> To: [email protected] > >>>> Subject: RE: [NTSysADM] Re: Finally. > >>>> > >>>> > >>>> > >>>> Generally from I have seen in state (Florida) organizations is > >>>> that they don't like promoting anyone but a moron into supervisory > positions. > >>>> Occasionally someone will make a mistake and promote an intelligent > >>>> person but not often. I would suspect this is the case with the > >>>> Feds as well (worked with them too). Several times I have seen > >>>> them hire those with less brains and longer tongues and large lips > >>>> over those with brains. As long as this keeps happening then we > >>>> will continue to see this happen. It will be a long time before > >>>> they get rid of all the defective management personnel as I would > >>>> think private companies would have little to gain by keeping them > >>>> (maybe why they seem to concentrate in public jobs?) and in a > government job it is MUCH harder to get rid of them. > >>>> > >>>> Jon > >>>> > >>>> > >>>> ________________________________ > >>>> > >>>> Date: Fri, 30 Aug 2013 14:34:15 -0400 > >>>> Subject: Re: [NTSysADM] Re: Finally. > >>>> From: [email protected] > >>>> To: [email protected] > >>>> > >>>> +13 > >>>> > >>>> On Aug 30, 2013 11:05 AM, "Kurt Buff" <[email protected]> wrote: > >>>> > >>>> On Fri, Aug 30, 2013 at 10:52 AM, Micheal Espinola Jr > >>>> <[email protected]> wrote: > >>>>> > >>>>> I accidentally hit CTRL-Enter before finishing that email... and > >>>>> apparently that's a shortcut to instantly-send a message in Gmail. > Yay! I > >>>>> love learning new things... but anyways - So, yea, this Forbes > article was > >>>>> the first I have seen that highlights the real underlying IT > >>>>> problem regarding Snowden - aside from other OT issues. > >>>> <snip> > >>>>>> > >>>>>> I may have missed some article by someone else somewhere, but Its > >>>>>> to see Forbes 'get it' before anyone else... > >>>>>> > >>>>>> > >>>>>> http://www.forbes.com/sites/timworstall/2013/08/30/if-the-nsa-rea > >>>>>> l l y -let-edward-snowden-do-this-then-someone-needs-to-be-fired/ > >>>>>> > >>>>>> -- > >>>>>> Espi > >>>> > >>>> > >>>> Agreed- massive failure on the part of many people in the NSA in > >>>> implementing security procedures. > >>>> > >>>> Of course, what Snowden showed, beyond that, is the massive failure > >>>> that is government policy and practices regarding > >>>> surveillance/espionage in general, so I'm actually quite happy > >>>> Snowden was able to do what he did. > >>>> > >>>> Kurt > >>>> > >>>> > >>> > >>> > >> > >> > > > > > > >

