{"id":221664,"date":"2017-06-21T08:10:35","date_gmt":"2017-06-21T12:10:35","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-failed-to-implement-security-measures-says-damning-report-naked-security.php"},"modified":"2017-06-21T08:10:35","modified_gmt":"2017-06-21T12:10:35","slug":"nsa-failed-to-implement-security-measures-says-damning-report-naked-security","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-failed-to-implement-security-measures-says-damning-report-naked-security.php","title":{"rendered":"NSA failed to implement security measures, says damning report &#8211; Naked Security"},"content":{"rendered":"<p><p>    After reading through the 61 pages of redacted content of the    August 2016 DOD Inspector Generals report    on the National Security Agencys (NSA) implementation of the    Secure-the-Net initiative, acquired by The New York Times via    a Freedom of Information Act (FOIA) request, the only image one    can conjure up is that of the Katzenjammer Kids running amok.  <\/p>\n<p>    The NSA data protection (or lack thereof) was thrust into the    spotlight when Edward Snowden, then a contractor in Hawaii,    purloined 1.5m documents. How Snowden carried out his massive    data collection is interesting, as he used his natural access    and then conned his colleagues into giving up their internal    access credentials in his role as the system admin. In the    months that followed there were no shortage of opinions on how    the NSA could or should tighten up its ship.  <\/p>\n<p>    The Secure-the-Net (STN) initiative was launched    post-Snowden, which included 40 specific recommendations    focused on insider threats to NSA systems, data, and    infrastructure. Seven of those recommendations were designed    to secure network access, protect against insider threats and    provide increased oversight of the personnel with privileged    access.  <\/p>\n<p>    The seven STN initiatives were:  <\/p>\n<p>    The Department of Defense (DOD) report reviewed the NSAs    progress on tightening up its ship with respect to the seven    STN recommendations. The audit was conducted at four    facilities between January and July of 2016.  <\/p>\n<p>    The DOD report takes the NSA to the woodshed. Not because the    NSA didnt attempt to implement, but rather, because they did a    half-ass job in the implementation.  <\/p>\n<p>    The reports scorching verbiage surrounds this partial    implementation of the recommendations: for example, the  <\/p>\n<p>      NSA did not effectively implement the three privileged access      related STN initiatives  because it did not develop an STN      strategy that detailed a structured framework and methodology      to implement the initiatives and measure completeness.    <\/p>\n<p>    For example, with respect to two-factor authentication (2FA),    the NSA implemented it for system admins, but not for those    with privileged access. It is well documented how Snowden    bypassed the then presentprivileged access controls and conned his    colleagues into giving him their credentials  which he    then went on to use to expand his access.  <\/p>\n<p>    A 2FA requirement would have required the owner of the    credentials to have been participatory in Snowdens use of    their credentials. NSA implementation as described in the    report shows how they opted to leave open the very window that    Snowden climbed through to harvest the data he stole.  <\/p>\n<p>    Furthermore, the report goes on to chastise the NSA for not    having a clue about how many individuals had privileged access    in 2014, nor in 2016, and nor could the NSA document how the    purge\/pruning had been carried out. That meant the inspection    team couldnt find out exactly how many people had privileged    access.  <\/p>\n<p>    While focus has largely been on the trusted insider gone bad,    Edward Snowden, the Shadow    Brokers acquisition of NSAs Office of Tailored Access    Operations (TAO)collection tools compromise clearly    indicates a need by the NSA to continue to place their focus on    locking down their own house.  <\/p>\n<p>    How the TAO compromise occurred remains a mystery.    It could have been an insider (contractor or staff) or it might    have been a result of the contractor alleged to have built the    exposed tools, the Equation Group, having themselves been    hacked. Coincidentally, the inspector general report was    published the week after the Shadow Brokers offered the TAO    tools for auction.     An active August 2016 indeed.  <\/p>\n<p>    But what of the     NSA contractor Harold Martin, another NSA    insider?Martin, who worked for Booz Allen Hamilton, he    was found to have hoarded up to 50 terabytes of NSA    information. The indictment on Martin was sealed until    October 2016, but he was arrested on 27 August 2016, yes two    days prior to the arrival of the inspectors general report.    August 2016 was truly a busy month in the world of espionage    and counterespionage.  <\/p>\n<p>    Is it hard to catch an insider?Yes, it is. If the    individual does not exceed their natural access, process and    procedures, they will be difficult to detect, and while it is    safe to say that 100% is not achievable, there are steps which    can be taken to secure the environment to bring the risk as    close to zero as possible. This was the intent of the STN.  <\/p>\n<p>    Has there been any good to come out of the STN? Absolutely, the    National Industrial Security Program of the United States,    marshaled by the Defense Security Service, has brought into    play their mandatory insider threat program at all cleared    facilities and contractors. These programs became mandatory on    June 1 2017.  <\/p>\n<p>    One might recall the     recent arrest of NSA contractor, Reality Winner, also a contractor from Booz    Allen Hamilton, who took a highly classified document    assessing and discussing the Russian military intelligence    entitys (the GRU) hand in meddling in the US election. Winner,    using her privileged access, printed out the report, and then    mailed it to a media outlet. Once the NSA saw the document,    they quickly determined who had had access, who had printed the    document and then who had had contact with a media outlet.  <\/p>\n<p>    What they apparently werent able to do was to determine how    and why Winner had privileged access to information to    information about which she had no need to know.  <\/p>\n<p>    One could argue this rapid-fire capability used to identify    Winner would not have been present without the STN initiatives.    On the other hand, one might surmise the privileged access    portion of NSAs STN program continues to need tweaking.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/nakedsecurity.sophos.com\/2017\/06\/21\/nsa-failed-to-implement-security-measures-says-damning-report\/\" title=\"NSA failed to implement security measures, says damning report - Naked Security\">NSA failed to implement security measures, says damning report - Naked Security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> After reading through the 61 pages of redacted content of the August 2016 DOD Inspector Generals report on the National Security Agencys (NSA) implementation of the Secure-the-Net initiative, acquired by The New York Times via a Freedom of Information Act (FOIA) request, the only image one can conjure up is that of the Katzenjammer Kids running amok. The NSA data protection (or lack thereof) was thrust into the spotlight when Edward Snowden, then a contractor in Hawaii, purloined 1.5m documents.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-failed-to-implement-security-measures-says-damning-report-naked-security.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-221664","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/221664"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=221664"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/221664\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=221664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=221664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=221664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}