All mistakes? Interesting generalization. I had a businesswoman tell me all generalizations are false...and I've yet to prove her wrong
- WJR On Tue, Sep 3, 2013 at 2:45 PM, Daniel Chenault <[email protected]> wrote: > Which brings me back to something a successful businessman told me: all > mistakes are due to either laziness or incompetence. > I have yet to prove him wrong. > In the context: I don’t want to do the work of creating a security > protocol and then having to create all the sub-admins and relevant groups. > Let the contractor handle it. That’s lazy > Not only do I not know how to do set security permission I didn’t even > know that could be done. That’s incompetence. > I just can’t wrap my mind around the idea of someone knowingly creating > this open door without there being some pay-off in the end-game. > > *From:* Jon Harris <[email protected]> > *Sent:* Tuesday, September 03, 2013 2:32 PM > *To:* [email protected] > *Subject:* RE: [NTSysADM] Re: Finally. > > Ken I think there is a big difference between cultures in this case. > Government is more of an "old boys club" that promotes (at least from what > I have seen personally) on the basis of who can do what for the person > doing the hiring, or to pay off some "favor" the person or a person > supporting the hire did. These people, at the NSA and a lot of the other 3 > letter GOV, are either former or kin to former military. Not all are but > they are out numbered by those that are. Look at all the really stupid > things the military has done, not just the US but all of them. They let > their ego's control what they think they can do and to whom they can do it. > > Many of the private businesses I have seen would not put up with this > attitude nor would they care if there was a favor owed. They want someone > that can do the job first. Sure some private businesses run as an "old > boys club" but when they do they end up killing the business. Only the GOV > has unlimited resources(1) to keep paying incompetents to run things and to > also protect them from getting fired or prosecuted. > > Jon > > (1) They just up taxes or take money from other things to make up the lost > money. > > > From: [email protected] > > > To: [email protected] > > Subject: RE: [NTSysADM] Re: Finally. > > Date: Tue, 3 Sep 2013 04:51:26 +0000 > > > > From the email you just replied to: > > > > > Certainly the failure was epic, and heads will/should roll. > > > > I thought "heads should roll" was a euphemism that was used in the US? > Am I mistaken? Chalk it down to cultural misunderstanding then. > > > > For the record - I'm not excusing failure. Find me anywhere where I've > said "too bad, shit happens" > > > > I'm challenging your claim that the sole root cause for this debacle is > "incompetent management". You made the claim - you back it up. For the > record, I put some reasons out there why I think it's not that simple, by > way of explanation for my challenge. However, let's not forget you're the > one making the claims here. > > > > Cheers > > Ken > > > > -----Original Message----- > > From: [email protected] [mailto: > [email protected]] On Behalf Of Kurt Buff > > Sent: Tuesday, 3 September 2013 1:46 PM > > To: [email protected] > > Subject: Re: [NTSysADM] Re: Finally. > > > > So, are you stating that it's your belief that nobody in this incident > should be fired? > > > > And, since you don't like my analogy, let's try another - BP in the Gulf > of Mexico spilled millions of barrels of crude oil. Should nobody be > faulted for failing at that core competency? Or is any failure excusable > because, well, it's at scale, and therefore hard? > > > > Kurt > > > > > On Sun, Sep 1, 2013 at 8:46 PM, Ken Schaefer <[email protected]> wrote: > > > Faulty analysis IMHO > > > > > > "Making money" is what any for-profit company aims for - not something > that is specific to banking. A bank's aim is to marry savers and borrowers. > Exxon wants to "make money", but it does that through producing energy > products. The NYT aims to "make money", but it does that through selling > access to news. Those are the "core missions" of the organisations in > question. > > > > > > Likewise, the core mission of the NSA would be to safeguard the USA > from external threats, and it does this through the collection and analysis > of signals intelligence. The core mission of the NSA isn't to "ensure that > nothing ever gets leaked". Just because it has "security" in the name > doesn't mean that it's whatever security thing you think is important. > > > > > > Certainly the failure was epic, and heads will/should roll. But you > ascribed a single factor as the root cause of the problem, yet you've > provided no analysis to justify that claim. All you've provided is a bunch > of irrelevancies (how much computing power the NSA has, the fact you've > designed more secure systems, and something about banks "making money"). > How does any of that show that institutionalised "management incompetence" > is at fault here? > > > > > > Cheers > > > Ken > > > > > > -----Original Message----- > > > From: [email protected] > > > [mailto:[email protected]] On Behalf Of Kurt Buff > > > Sent: Monday, 2 September 2013 1:20 PM > > > To: [email protected] > > > Subject: Re: [NTSysADM] Re: Finally. > > > > > > This is an agency which has the name of the National *Security* > > > Agency. It has, nearly since its inception, been at the forefront of > > > both security and computing, with its computing power measured in > > > ACRES - see the Bamford books (especially The Puzzle Palace). It was > > > also known to insiders as "No Such Agency" or "Never Say Anything", > > > and had always been far more secretive (until Bamford published his > > > books) than the other major intelligence agencies, such as DIA, CIA, > NRO, etc. > > > > > > If a bank were to so spectacularly fail at its core mission - to make > money - for reasons *entirely in its control*, you'd call for someone's job > to be vacated, wouldn't you? > > > > > > The NSA failed spectacularly at *its* core mission - security - and > regardless of the scale of the organization, it failed utterly. This is one > case for which the word 'epic' is warranted. The scope and scale of the > failure is astonishing. Many jobs should be vacated. > > > > > > Kurt > > > > > > On Sun, Sep 1, 2013 at 5:21 PM, Ken Schaefer <[email protected]> wrote: > > >> Yes, I think it does. > > >> > > >> Small orgs are much more agile than large enterprises: > > >> - it's easy/easier to gather requirements, > > >> - requirements have fewer conflicts (because there are fewer > > >> stakeholders) > > >> - they don't tend to work 24x7 or require 5 9s uptime, so things can > > >> be shutdown, upgraded, replaced, migrated with relative ease > > >> > > >> The bigger and the more "information heavy" the enterprise is, the > less agile it becomes in terms of remediating older systems. Many of the > projects for the bank I work for (as a touch point) register hundreds of > dependencies - some over a thousand. Just moving a data centre (as an > example) is a 42 month exercise. Sometimes things get missed. > > >> > > >> I personally haven't run into any security architects at any of the > large accounts I've worked at that have your level of confidence in the > systems and processes that they have in-place. So, either they're > incompetent (possible - I'll give you that), or the problem is more complex > than you make it out to be. > > >> > > >> Personally, I think security in non-trivial environments is hard: how > do I vet every piece of code coming into my environment? How do I audit it > continuously? How do I make sure that no one's restored a backup somewhere? > How do I know no-one's tapped my network? A business user hasn't > mis-applied permissions to an application? Etc. How do I do all of this in > a timely manner, so that I close the holes before they're exploited? There > is no silver bullet that solves this - which is why everyone's still > struggling and we still have incidents. > > >> > > >> Even in well run organisations, using technology largely from a > single vendor, there's still outages and things that go wrong (e.g. > Microsoft's Azure storage, or the recent O365 outage). I agree that > sometimes people do stupid things - I'm sure that happens in small > environments too. But in big environments, even with the best intentions, > smart people and good processes, things still go wrong. > > >> > > >> Cheers > > >> Ken > > >> > > >> -----Original Message----- > > >> From: [email protected] > > >> [mailto:[email protected]] On Behalf Of Kurt Buff > > >> Sent: Monday, 2 September 2013 9:52 AM > > >> To: [email protected] > > >> Subject: Re: [NTSysADM] Re: Finally. > > >> > > >> Nope. Does that matter? Well, I suppose you think it does, but I > doubt it. With scale should come resources, and the NSA obviously does have > resources, including people with far more training, and who of whom are > smarter, than me. > > >> > > >> There are no excuses for this. > > >> > > >> Kurt > > >> > > >> On Sun, Sep 1, 2013 at 4:25 PM, Ken Schaefer <[email protected]> wrote: > > >>> You've designed "more secure" systems at scale (40K+ employees) in > an information heavy organisation (bank, accountancy etc.)? > > >>> > > >>> Cheers > > >>> Ken > > >>> > > >>> -----Original Message----- > > >>> From: [email protected] > > >>> [mailto:[email protected]] On Behalf Of Kurt Buff > > >>> Sent: Monday, 2 September 2013 4:01 AM > > >>> To: [email protected] > > >>> Subject: Re: [NTSysADM] Re: Finally. > > >>> > > >>> Aside from reading all those Le Carre novels? > > >>> > > >>> I've already designed more secure systems than were obviously in > place, as have many people on this list, perhaps including you. > > >>> > > >>> Kurt > > >>> > > >>> On Sat, Aug 31, 2013 at 7:35 PM, Ken Schaefer <[email protected]> wrote: > > >>>> And what are your qualifications/experience, that allow you to make > > >>>> such a call? (I’m assuming that you have no inside knowledge of how > > >>>> the NSA works, and are relying on the public > > >>>> speculation/allegations at el Reg etc.) > > >>>> > > >>>> > > >>>> > > >>>> Cheers > > >>>> > > >>>> Ken > > >>>> > > >>>> > > >>>> > > >>>> From: [email protected] > > >>>> [mailto:[email protected]] > > >>>> On Behalf Of Kurt Buff > > >>>> Sent: Sunday, 1 September 2013 12:03 AM > > >>>> To: [email protected] > > >>>> > > >>>> > > >>>> Subject: Re: [NTSysADM] Re: Finally. > > >>>> > > >>>> > > >>>> > > >>>> On the evidence, absolutely. > > >>>> > > >>>> For an intelligence/espionage operation to be so thoroughly pwned > > >>>> because of such amazingly poor internal operational security, there > > >>>> can be only one conclusion - management responsible for internal > security should be fired. > > >>>> > > >>>> I'm just glad they weren't, and I hope that what Snowden took is > > >>>> enough to bring them down, and that it's all revealed to the public. > > >>>> > > >>>> > > >>>> > > >>>> Kurt > > >>>> > > >>>> > > >>>> > > >>>> On Sat, Aug 31, 2013 at 4:20 AM, Ken Schaefer <[email protected]> > wrote: > > >>>> > > >>>> So, you’re saying that the feared NSA, which has a bunch of > > >>>> un-discovered rootkits, which able to undertake some of the most > > >>>> advanced espionage in the world, is managed by idiots? Seriously? > > >>>> > > >>>> > > >>>> > > >>>> From: [email protected] > > >>>> [mailto:[email protected]] > > >>>> On Behalf Of Jon Harris > > >>>> Sent: Saturday, 31 August 2013 6:17 AM > > >>>> To: [email protected] > > >>>> Subject: RE: [NTSysADM] Re: Finally. > > >>>> > > >>>> > > >>>> > > >>>> Generally from I have seen in state (Florida) organizations is > > >>>> that they don't like promoting anyone but a moron into supervisory > positions. > > >>>> Occasionally someone will make a mistake and promote an intelligent > > >>>> person but not often. I would suspect this is the case with the > > >>>> Feds as well (worked with them too). Several times I have seen > > >>>> them hire those with less brains and longer tongues and large lips > > >>>> over those with brains. As long as this keeps happening then we > > >>>> will continue to see this happen. It will be a long time before > > >>>> they get rid of all the defective management personnel as I would > > >>>> think private companies would have little to gain by keeping them > > >>>> (maybe why they seem to concentrate in public jobs?) and in a > government job it is MUCH harder to get rid of them. > > >>>> > > >>>> Jon > > >>>> > > >>>> > > >>>> ________________________________ > > >>>> > > >>>> Date: Fri, 30 Aug 2013 14:34:15 -0400 > > >>>> Subject: Re: [NTSysADM] Re: Finally. > > >>>> From: [email protected] > > >>>> To: [email protected] > > >>>> > > >>>> +13 > > >>>> > > >>>> On Aug 30, 2013 11:05 AM, "Kurt Buff" <[email protected]> wrote: > > >>>> > > >>>> On Fri, Aug 30, 2013 at 10:52 AM, Micheal Espinola Jr > > >>>> <[email protected]> wrote: > > >>>>> > > >>>>> I accidentally hit CTRL-Enter before finishing that email... and > > >>>>> apparently that's a shortcut to instantly-send a message in Gmail. > Yay! I > > >>>>> love learning new things... but anyways - So, yea, this Forbes > article was > > >>>>> the first I have seen that highlights the real underlying IT > > >>>>> problem regarding Snowden - aside from other OT issues. > > >>>> <snip> > > >>>>>> > > >>>>>> I may have missed some article by someone else somewhere, but Its > > >>>>>> to see Forbes 'get it' before anyone else... > > >>>>>> > > >>>>>> > > >>>>>> http://www.forbes.com/sites/timworstall/2013/08/30/if-the-nsa-rea > > >>>>>> l l y -let-edward-snowden-do-this-then-someone-needs-to-be-fired/ > > > >>>>>> > > >>>>>> -- > > >>>>>> Espi > > >>>> > > >>>> > > >>>> Agreed- massive failure on the part of many people in the NSA in > > >>>> implementing security procedures. > > >>>> > > >>>> Of course, what Snowden showed, beyond that, is the massive failure > > >>>> that is government policy and practices regarding > > >>>> surveillance/espionage in general, so I'm actually quite happy > > >>>> Snowden was able to do what he did. > > >>>> > > >>>> Kurt > > >>>> > > >>>> > > >>> > > >>> > > >> > > >> > > > > > > > > > > >

