{"id":200405,"date":"2017-06-22T04:54:15","date_gmt":"2017-06-22T08:54:15","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/dod-faults-nsa-for-lax-security-implementations-sophos-report-sc-magazine\/"},"modified":"2017-06-22T04:54:15","modified_gmt":"2017-06-22T08:54:15","slug":"dod-faults-nsa-for-lax-security-implementations-sophos-report-sc-magazine","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/dod-faults-nsa-for-lax-security-implementations-sophos-report-sc-magazine\/","title":{"rendered":"DoD faults NSA for lax security implementations, Sophos report &#8211; SC Magazine"},"content":{"rendered":"<p><p>Despite attempts to bolster security at the NSA following Edward  Snowden's leaks, a new report indicates gaps remain.  <\/p>\n<p>    A number of initiatives to strengthen security were mandated at    the National Security Agency (NSA) following the leaks by    Edward Snowden of 1.5 million documents, but implementation of    those procedures lacked teeth, according to a report by the    Department of Defense (DoD).  <\/p>\n<p>    The 61-page report from the DoD's inspector general on the    NSA's putting into practice of the Secure-the-Net (STN)    initiative, faults the agency and, as security intelligence    expert Christopher Burgess, writing for Sophos's Naked    Security blog puts it, \"the only image one can conjure up    is that of the Katzenjammer Kids running amok.\"  <\/p>\n<p>    Once the insider risk was presented by Snowden's leaks, the STN    initiative was put into place offering 40 recommendations    focused on insider threats to NSA systems, data and    infrastructure.  <\/p>\n<p>    Among that group of 40, seven directives specifically addressed    secure network access, protect against insider threats and    provide increased oversight of the personnel with privileged    access.  <\/p>\n<p>    The seven STN initiatives were:  <\/p>\n<p>    The report from the DoD examined the NSA's progress in putting    these seven recommendations into place, based on its study    between January and July 2016 of four facilities.  <\/p>\n<p>    The DoD report, acquired by The New York Times under a    FOIA request, \"takes the NSA to the woodshed,\" Burgess wrote.    While the NSA did attempt to implement the recommendations, it    failed to do an effective job in carrying out implementation,    Burgess said.  <\/p>\n<p>    The NSA only partially got some operations in place, the report    explained. One example regarded two-factor authentication,    which was implemented for system administrators but not for    others with credentials for privileged access (which was how    Snowden was able to exfiltrate data).  <\/p>\n<p>    Perhaps even more critical, the report found that the NSA could    not determine who had elevated access privileges. In light of    Snowden's actions and then the later acquisition by the Shadow    Brokers of NSA materials, there is lax security within the    agency, the DoD report stated.  <\/p>\n<p>    The tightening up of its operations was the intent of the STN    initiatives. While Burgess, a former CIA operations officer,    said some good resulted  primarily an insider threat program    initiated at all facilities  insiders are still capable of    harvesting NSA data, as evidenced by the arrest in May of    Reality Winner, another NSA contractor, who used her privileged    access to remove NSA material regarding Russian interference in    the U.S. presidential election and then provided it to the    media.  <\/p>\n<p>    \"Reality Winner did not have need-to-know access,\" Burgess told    SC Media on Wednesday. He pointed to one of the recommendations    included in the seven STN initiatives: Oversee privileged user    activities. Winner had privileged access, Burgess explained,    but had no need to know about Russian meddling in the    presidential election.  <\/p>\n<p>    \"Had monitoring activity been in place,\" Burgess said, \"she    would have been detected.\"  <\/p>\n<p>    Clearly, Burgess concluded, some tweaking is still needed to    the NSA's STN program to plug insiders' capabilities.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.scmagazine.com\/dod-faults-nsa-for-lax-security-implementations-sophos-report\/article\/670077\/\" title=\"DoD faults NSA for lax security implementations, Sophos report - SC Magazine\">DoD faults NSA for lax security implementations, Sophos report - SC Magazine<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Despite attempts to bolster security at the NSA following Edward Snowden's leaks, a new report indicates gaps remain. A number of initiatives to strengthen security were mandated at the National Security Agency (NSA) following the leaks by Edward Snowden of 1.5 million documents, but implementation of those procedures lacked teeth, according to a report by the Department of Defense (DoD). The 61-page report from the DoD's inspector general on the NSA's putting into practice of the Secure-the-Net (STN) initiative, faults the agency and, as security intelligence expert Christopher Burgess, writing for Sophos's Naked Security blog puts it, \"the only image one can conjure up is that of the Katzenjammer Kids running amok.\" Once the insider risk was presented by Snowden's leaks, the STN initiative was put into place offering 40 recommendations focused on insider threats to NSA systems, data and infrastructure <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/dod-faults-nsa-for-lax-security-implementations-sophos-report-sc-magazine\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-200405","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200405"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=200405"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200405\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=200405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=200405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=200405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}