{"id":192685,"date":"2017-05-13T05:31:45","date_gmt":"2017-05-13T09:31:45","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/a-stolen-nsa-tool-is-being-used-in-a-global-cyberattack-the-atlantic\/"},"modified":"2017-05-13T05:31:45","modified_gmt":"2017-05-13T09:31:45","slug":"a-stolen-nsa-tool-is-being-used-in-a-global-cyberattack-the-atlantic","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/a-stolen-nsa-tool-is-being-used-in-a-global-cyberattack-the-atlantic\/","title":{"rendered":"A Stolen NSA Tool Is Being Used in a Global Cyberattack &#8211; The Atlantic"},"content":{"rendered":"<p><p>    The shadow of ousted FBI director James Comey hung over the    Senate Intelligence committees worldwide threat hearing    yesterday. Like Banquos ghost in Macbeth, the presence of    Comeys absence was everywhere. But it wasnt the most surreal    aspect of the day. Here was a hearing on external threats at a    moment when internal threats are growing more serious and scary    than any time in recent memory. Just 24 hours later, the    magnitude of that danger came into sharp focus as cyber attacks    using stolen NSA tools hit an estimated 45,000 computers in    more than 70 countries, disrupting Britains health system and    sending officials from Moscow to Madrid back to paper and pens.  <\/p>\n<p>    Global Ransomware Attack Stuns Systems in Up to 74    Countries  <\/p>\n<p>    Insider threats are not new but the speed and scale of their    destructive impact are. In 2001, Robert Philip Hanssen, a    25-year veteran of the FBI, was    caught hiding a garbage bag full of classified documents in    a dead drop under a Virginia park bridge. His arrest ended a    15-year mole hunt for one of the most damaging traitors in    American history. Hanssen was found to have passed a few    thousand highly classified documents to the Soviets over two    decades, including the names of dozens of American agents.    Several were killed as a result of his treachery.  <\/p>\n<p>    Today, trusted insiders can steal and release classified    information in terabytes, not trash bags, all in a matter of    days, not decades. Chelsea Manning downloaded the contents of    more than 250,000 State Department cables on a fake Lady Gaga    CD, lip syncing to Lady Gaga's Telephone as he exfiltrated    the data. Former NSA contractor Edward Snowden stole an    estimated 1.5 million documents, including information about    some of the most highly classified programs in the U.S.    governmentand not just by copying what he happened to see on    his desktop.  <\/p>\n<p>    A bipartisan review by the House Intelligence Committee found    that Snowden deliberately sought access to classified programs    by tricking coworkers into giving him their security    credentials and by searching their network drives without their    permission, downloading away. The vast majority of the    documents he stole, the report concludes, have    nothing to do with programs impacting individual privacy    intereststhey instead pertain to military, defense, and    intelligence programs of great interest to Americas    adversaries. Snowdens operation took just 10 months before he    high-tailed it to Hong Kong.  <\/p>\n<p>    And for all the efforts to glue shut thumb drives and call for    better procedures to detect when trusted officials become    untrustworthy, the breaches just keep coming. In the past year,    press reports have made public another wave of breaches    believed to have been perpetrated by insiders at both the NSA    and CIA that stole and released some of nations most    sophisticated cyber hacking tools, including the WannaCry    ransomware used today. In February, a second former NSA    contractor, Hal Martin, was    indicted for stealing classified documents. How many    exactly? The Justice Department believes it could be as much as    50 terabytesthats the equivalent of 500 million pages.  <\/p>\n<p>    At yesterday's hearing, Director of National Intelligence Dan    Coats delivered a 28-page threat    assessment about the dangers confronting the United States.    Two lines look awfully ominous today: Trusted insiders who    disclose sensitive or classified US Government information    without authorization will remain a significant threat in 2017    and beyond. The sophistication and availability of information    technology that increases the scope and impact of unauthorized    disclosures exacerbate this threat.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.theatlantic.com\/international\/archive\/2017\/05\/nsa-cyberattack\/526644\/\" title=\"A Stolen NSA Tool Is Being Used in a Global Cyberattack - The Atlantic\">A Stolen NSA Tool Is Being Used in a Global Cyberattack - The Atlantic<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The shadow of ousted FBI director James Comey hung over the Senate Intelligence committees worldwide threat hearing yesterday.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/a-stolen-nsa-tool-is-being-used-in-a-global-cyberattack-the-atlantic\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-192685","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/192685"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=192685"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/192685\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=192685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=192685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=192685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}