NSA Considers Its Networks Compromised 239
Orome1 writes "Debora Plunkett, head of the NSA's Information Assurance Directorate, has confirmed what many security experts suspected to be true: no computer network can be considered completely and utterly impenetrable — not even that of the NSA. 'There's no such thing as "secure" any more,' she said to the attendees of a cyber security forum sponsored by the Atlantic and Government Executive media organizations, and confirmed that the NSA works under the assumption that various parts of their systems have already been compromised, and is adjusting its actions accordingly."
Which is the sane thing to assume (Score:4, Insightful)
So much for the cloud (Score:5, Insightful)
The idea of sticking all my data out in cyberspace on somebody else's servers always seemed a little fluffy anyway.
Re:Well (Score:4, Insightful)
Re:Which is the sane thing to assume (Score:5, Insightful)
What I can't fathom is that there is still people out there believing that a firewall is all the protection they need. Or that it is a protection they need, even.
A firewall is reasonable protection for most people, just as a dead bolt on the front door is reasonable protection for most homes. If you're the online equivalent of a jewelry store - that is, a high profile target - then obviously you need much more than that.
Now for TSA to make the same realization (Score:5, Insightful)
Duh (Score:5, Insightful)
Any good security policy assumes that, if the system has not already been penetrated, it will be soon. There must be procedures for detecting intrusions, repairing weaknesses and plugging holes, and compartmentalizing data so as to minimize damage once a part of the system has been breached. And there needs to be ongoing R&D into the various techniques the enemy could use to break into systems and applicable countermeasures.
What scares me is that the NSA is "adjusting its actions accordingly". They should have been thinking this way from day zero.
Re:Open source government? (Score:5, Insightful)
So to me this raises a fundamental philosophical question: why keep secrets at all, as a government?
Because we need the military to protect us. You wouldn't want an enemy country to know all about the military operations in your country. And before you propose to completely eliminate the military, remember 1939.
Levels of security (Score:5, Insightful)
What considering "the assumption that various parts of their systems have already been compromised" means is that you go away from that model.
There can be multiple levels, walls between various areas, zones according to task, etc. And the auditing system can be much more complex than a firewall.
Think of something like the "unusual activity" trigger software for your credit card. Low ranking security person reading a low level cable? -fine. Reading 10000 cables in one hour? very unusual.
The NSA know their stuff, I see this talk not as someone admitting that they are compromised, but as someone talking shop.
What? (Score:5, Insightful)
What? You mean there's another option?
Any network administrator worth half their income should always consider their LAN to be compromised. That's why you use secure transfer protocols to transfer any data containing any sensitive information between company systems. That's why you have active network monitors that turn off network ports when they encounter an unknown MAC address. That's why you don't allow anonymous logins to your active directory, and you strictly control access to everything by at least department.
Security is done in layers. Firewalls can and will be breached. If it is, your goal is to slow the attacker down until you can detect the breach and close it. Honeypot servers, data encryption, network segmentation, network resource security, all of these things are vital.
Re:Definition of security (Score:5, Insightful)
The problem is that the NSA has, or at least it believes it has and other believe it has, information whose value is essentially beyond price. Therefore they feel reasonable expecting that other parties will pay nearly any cost for access. The whole dynamic of "make it more expensive to get than it's worth to have" goes out the window when what it's worth to have is essentially infinite. Then it becomes "protect it as much as possibly can and hope it's enough".
Don't get me wrong, I typically agree with you, and I've posted that very thing quite recently in response to something else recently. It's just that the theory kinda goes out the window when you have bad actors with the resources of an entire nation behind them as your most likely threat vector. Now of course everything that the NSA protects isn't that valuable, and much of it is probably protected with precisely the theory you promote. The rest is just protected with every possible resource they can think of.
Re:Well (Score:5, Insightful)
I wonder, though, if the prominence of Wikileaks had anything to do with this, and I don't mean specifically, as in they anticipate a lot of NSA-related document drops in the near future, but more generally, as in the landscape has changed and Wikileaks is a signifier.
Re:Which is the sane thing to assume (Score:5, Insightful)
Of course, that's not really all that a modern firewall does.
And this is why the original poster is wrong.
If you're just relying on a Firewall to block access to ports you shouldn't have open anyways, then yeah, you don't need the firewall: just close the ports. But in that scenario, it's really just a misapplication of an otherwise useful security device.
A Firewall can be useful, as you said, to proxy various protocols or block certain outgoing (or unsolicited incoming) traffic. It can also be used if potentially-harmful traffic belongs on the network, but not going to or from certain hosts (ie, remote administration of servers might be desirable, but only from certain hosts).
The point is, yes a Firewall isn't The Solution to all security problems, and it can be misapplied, but that doesn't mean it's not a useful device in the right situation.
Re:Open source government? (Score:5, Insightful)
Well you see it's like this... As a former soldier I'd have been a bit miffed to be say, escorting a convoy, only to discover that bad people with guns knew my route, numbers of troops, and level of armament. It really ruins your day when bad people show up in precisely the right place with way more troops and guns than you have. Especially if they set up explosives. That takes things to whole new level of "ruined day". And before you comment on my simplistic view of "bad people", please understand that my overall opinion of you shifts dramatically toward "bad" when you start shooting at me. As far as I am concerned anyone who shoots at me is by definition a "bad person", no matter what their initial motivation may have been.
Manufacturing is key (Score:5, Insightful)
The fact that we outsource chip fabrication ought to be a clue as to why they can't pretend any more.
OT: It's even money that every piece of military hardware with computers has an illicit kill switch embedded in it.
Game over USA.
Re:Open source government? (Score:3, Insightful)
Take the list of critical US infrastructure that Wikileaks published. There is nothing to be gained by having 100% transparency on that and everything to lose since it's basically a blue print on how to attack the US.
Do you really think the bad guys don't know these things?
I remember when I was a kid there was a nuclear weapons store a few miles from where we lived. Everyone knew it was there, the USSR could see it on their satellite photos, but strangely it was completely missing from any official maps of the area. Who was that secrecy supposed to be protecting?
Re:Open source government? (Score:4, Insightful)
Do you really think the bad guys don't know these things?
Suspecting it and actually confirming it for them with an official US government document are two separate things. And you still haven't given a reason why it should be released.
Security (Score:4, Insightful)
Re:Well (Score:4, Insightful)
Iran thought that, but sneakernets are capable of transmitting viruses behind airwalls.