{"id":200114,"date":"2017-06-21T03:56:07","date_gmt":"2017-06-21T07:56:07","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/oversight-report-shows-nsa-failed-to-secure-its-systems-following-the-snowden-leaks-techdirt\/"},"modified":"2017-06-21T03:56:07","modified_gmt":"2017-06-21T07:56:07","slug":"oversight-report-shows-nsa-failed-to-secure-its-systems-following-the-snowden-leaks-techdirt","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/oversight-report-shows-nsa-failed-to-secure-its-systems-following-the-snowden-leaks-techdirt\/","title":{"rendered":"Oversight Report Shows NSA Failed To Secure Its Systems Following The Snowden Leaks &#8211; Techdirt"},"content":{"rendered":"<p><p>    It appears the NSA hasn't learned much since Ed Snowden left with several thousands of its    super-secret documents. Agency officials were quick to claim    the leaks would cause untold amounts of damage, but behind the scenes,    not much was being done to make sure it didn't happen again.  <\/p>\n<p>    A Defense Department Inspector General's report obtained via    FOIA lawsuit by the New York Times shows the NSA fell short of several security    goals in the post-Snowden cleanup. For an agency that was    so concerned about being irreparably breached, the NSA still    seems primed for more leakage. Charlie Savage reports:  <\/p>\n<p>      The N.S.A. failed to consistently lock racks of servers      storing highly classified data and to secure data center      machine rooms, according to the report, an investigation by      the Defense Departments inspector general completed in 2016.      The report was classified at the time and made public in      redacted form this week in response to a Freedom of Information Act lawsuit      by The New York Times.    <\/p>\n<p>      The agency also failed to meaningfully reduce the number      of officials and contractors who were empowered to download      and transfer data classified as top secret, as well as the      number of privileged users, who have greater power to      access the N.S.A.s most sensitive computer systems. And it      did not fully implement software to monitor what those users      were doing.    <\/p>\n<p>    Let's not forget the NSA wants to be engaged in ensuring the    cybersecurity of the nation. It's repeatedly asked for more    power and a better seat in the CyberWar room. But it doesn't    even take its OWN security seriously. The NSA told its    oversight it was engaging in 40 \"Secure the Net\" initiatives,    directly after the first Snowden leak. Two years later, it told    Congress it had completed 34 of 40 STN initiatives. The term    \"completion\" apparently has multiple definitions, depending on    who's using the word. The IG sampled only seven of the    initiatives and found four were mostly done and three were    nowhere near completed. Extrapolating from the sampling, it's    safe to assume the NSA's internal security efforts are only    slightly more than half-baked.  <\/p>\n<p>    The three the NSA failed to implement are of crucial    importance, especially if it's looking to keep its in-house    documents safe at home. From the report [PDF]:  <\/p>\n<p>      NSA officials did not effectively implement three PRIVAC      [Privileged Access]-related STN initiatives:    <\/p>\n<p>      - fully implement technology to oversee privileged user      activities;    <\/p>\n<p>      - effectively reduce the number of privileged users;      and    <\/p>\n<p>      - effectively reduce the number of authorized DTAs [Data      Transfer Agents].    <\/p>\n<p>    First off, the NSA -- prior to the Snowden leaks -- had no idea    how many users had privileged access. Post-Snowden, things    hardly improved. Considering the tech capabilities of the    agency, it's incredibly amusing to see how the NSA \"tracked\"    privileged users.  <\/p>\n<p>      NSA officials stated they used a manually kept      spreadsheet, which they no longer had, to identify the      initial number of privileged users.    <\/p>\n<p>    Pretty much useless, considering this number the NSA couldn't    verify (thanks to its missing spreadsheet) was supposed to be    used to establish a baseline for the planned reduction in    privileged users. Despite missing this key data, the NSA moved    ahead, \"arbitrarily revoking access\" and asking users to    reapply for privileged status. It then reported a reduction by    citing the number of users it denied restoration of access    privileges. It did not factor in any new users it    granted privileged access to or tally up the number of accounts    it never bothered to revoke.  <\/p>\n<p>    As the fully-redacted chart presumably points out (according to    the text above it), the NSA had a \"continued and consistent    increase in the number of privileged users once the [redacted]    enrollment process began.\"  <\/p>\n<p>    The NSA also claimed it had reduced the number of DTAs. And    again, the NSA had no receipts.  <\/p>\n<p>      Although repeatedly requested, NSA officials could not      provide supporting documentation for the total number of DTAs      before and after the purge or the actual number of users      purged.    <\/p>\n<p>    The NSA's objectively-terrible internal controls (again)    ensured no number could be verified.  <\/p>\n<p>      NSA did not know how many DTAs it had because the      manually kept list was corrupted during the months leading up      to the security breach.    <\/p>\n<p>    The NSA handled these missing numbers the same way it had    privileged users: it made up a new baseline, arbitrarily    decided it could show a downtrend in DTAs, and delivered this    as \"proof\" of another completed security initiative.  <\/p>\n<p>    The report points out repeatedly the NSA's failure to provide    documentation backing its STN claims -- either from before the    initiatives took force or after they supposedly hag been    completed. The IG's comments note the NSA's response to the    report ignored its detailed description of multiple failures in    order to spin this as a \"win\" for the agency.  <\/p>\n<p>      Although the Director, Technology Directorate NSA\/CSS      Chief Information Officer, agreed, he did not address all the      specifics of the recommendation. Therefore, we request that      the director provide additional comments on the final report      that identify specific actions NSA will take.    <\/p>\n<p>    Here's how the NSA portrayed the report's findings:  <\/p>\n<p>      While the Media Leak events that led to Secure the Net      (STN) were both unforeseen and serious, we consider the      extensive progress we made in a short time to be a \"good      news\" story.    <\/p>\n<p>    Sure, if you consider a half-done job securing NSA assets to be    \"good news,\" rather than just an ongoing series of security    holes left halfway unplugged while agency officials testify    before Congressional oversight in front of a \"MISSION    ACCOMPLISHED\" banner backdrop.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.techdirt.com\/articles\/20170619\/10215037616\/oversight-report-shows-nsa-failed-to-secure-systems-following-snowden-leaks.shtml\" title=\"Oversight Report Shows NSA Failed To Secure Its Systems Following The Snowden Leaks - Techdirt\">Oversight Report Shows NSA Failed To Secure Its Systems Following The Snowden Leaks - Techdirt<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> It appears the NSA hasn't learned much since Ed Snowden left with several thousands of its super-secret documents. Agency officials were quick to claim the leaks would cause untold amounts of damage, but behind the scenes, not much was being done to make sure it didn't happen again.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/oversight-report-shows-nsa-failed-to-secure-its-systems-following-the-snowden-leaks-techdirt\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-200114","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200114"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=200114"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200114\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=200114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=200114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=200114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}