Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Government Networking IT

NSA Considers Its Networks Compromised 239

Orome1 writes "Debora Plunkett, head of the NSA's Information Assurance Directorate, has confirmed what many security experts suspected to be true: no computer network can be considered completely and utterly impenetrable — not even that of the NSA. 'There's no such thing as "secure" any more,' she said to the attendees of a cyber security forum sponsored by the Atlantic and Government Executive media organizations, and confirmed that the NSA works under the assumption that various parts of their systems have already been compromised, and is adjusting its actions accordingly."
This discussion has been archived. No new comments can be posted.

NSA Considers Its Networks Compromised

Comments Filter:
  • by alfredos ( 1694270 ) on Friday December 17, 2010 @12:32PM (#34588652)
    What I can't fathom is that there is still people out there believing that a firewall is all the protection they need. Or that it is a protection they need, even.
  • by T1girl ( 213375 ) on Friday December 17, 2010 @12:35PM (#34588696) Homepage

    The idea of sticking all my data out in cyberspace on somebody else's servers always seemed a little fluffy anyway.

  • Re:Well (Score:4, Insightful)

    by Abstrackt ( 609015 ) on Friday December 17, 2010 @12:38PM (#34588752)
    They probably figured it out a long time ago, what they're doing now is admitting it.
  • by B'Trey ( 111263 ) on Friday December 17, 2010 @12:42PM (#34588828)

    What I can't fathom is that there is still people out there believing that a firewall is all the protection they need. Or that it is a protection they need, even.

    A firewall is reasonable protection for most people, just as a dead bolt on the front door is reasonable protection for most homes. If you're the online equivalent of a jewelry store - that is, a high profile target - then obviously you need much more than that.

  • by ColoradoAuthor ( 682295 ) on Friday December 17, 2010 @12:42PM (#34588830) Homepage
    Complete security is a fleeting deception. What we need is RESILIENCY to cope with the attacks (physical or cyber) which will inevitably occur. Wise people have known that for approximately forever (that's how we got this thing called the Internet, after all).
  • Duh (Score:5, Insightful)

    by PPH ( 736903 ) on Friday December 17, 2010 @12:48PM (#34588904)

    Any good security policy assumes that, if the system has not already been penetrated, it will be soon. There must be procedures for detecting intrusions, repairing weaknesses and plugging holes, and compartmentalizing data so as to minimize damage once a part of the system has been breached. And there needs to be ongoing R&D into the various techniques the enemy could use to break into systems and applicable countermeasures.

    What scares me is that the NSA is "adjusting its actions accordingly". They should have been thinking this way from day zero.

  • by mangu ( 126918 ) on Friday December 17, 2010 @12:49PM (#34588926)

    So to me this raises a fundamental philosophical question: why keep secrets at all, as a government?

    Because we need the military to protect us. You wouldn't want an enemy country to know all about the military operations in your country. And before you propose to completely eliminate the military, remember 1939.
     

  • Levels of security (Score:5, Insightful)

    by formfeed ( 703859 ) on Friday December 17, 2010 @12:51PM (#34588952)
    Many large organizations still operate under the bad internet vs. good intranet principle.

    What considering "the assumption that various parts of their systems have already been compromised" means is that you go away from that model.

    There can be multiple levels, walls between various areas, zones according to task, etc. And the auditing system can be much more complex than a firewall.

    Think of something like the "unusual activity" trigger software for your credit card. Low ranking security person reading a low level cable? -fine. Reading 10000 cables in one hour? very unusual.

    The NSA know their stuff, I see this talk not as someone admitting that they are compromised, but as someone talking shop.

  • What? (Score:5, Insightful)

    by natehoy ( 1608657 ) on Friday December 17, 2010 @12:57PM (#34589026) Journal

    What? You mean there's another option?

    Any network administrator worth half their income should always consider their LAN to be compromised. That's why you use secure transfer protocols to transfer any data containing any sensitive information between company systems. That's why you have active network monitors that turn off network ports when they encounter an unknown MAC address. That's why you don't allow anonymous logins to your active directory, and you strictly control access to everything by at least department.

    Security is done in layers. Firewalls can and will be breached. If it is, your goal is to slow the attacker down until you can detect the breach and close it. Honeypot servers, data encryption, network segmentation, network resource security, all of these things are vital.

  • by DrgnDancer ( 137700 ) on Friday December 17, 2010 @01:08PM (#34589218) Homepage

    The problem is that the NSA has, or at least it believes it has and other believe it has, information whose value is essentially beyond price. Therefore they feel reasonable expecting that other parties will pay nearly any cost for access. The whole dynamic of "make it more expensive to get than it's worth to have" goes out the window when what it's worth to have is essentially infinite. Then it becomes "protect it as much as possibly can and hope it's enough".

    Don't get me wrong, I typically agree with you, and I've posted that very thing quite recently in response to something else recently. It's just that the theory kinda goes out the window when you have bad actors with the resources of an entire nation behind them as your most likely threat vector. Now of course everything that the NSA protects isn't that valuable, and much of it is probably protected with precisely the theory you promote. The rest is just protected with every possible resource they can think of.

  • Re:Well (Score:5, Insightful)

    by Captain Splendid ( 673276 ) * <capsplendid@@@gmail...com> on Friday December 17, 2010 @01:10PM (#34589246) Homepage Journal
    'Hope for the best, assume the worst' should be the mantra for everyone working in any kind of security. Glad to see the NSA living up to that.

    I wonder, though, if the prominence of Wikileaks had anything to do with this, and I don't mean specifically, as in they anticipate a lot of NSA-related document drops in the near future, but more generally, as in the landscape has changed and Wikileaks is a signifier.
  • by JackOfAllGeeks ( 1034454 ) on Friday December 17, 2010 @01:16PM (#34589318)

    Of course, that's not really all that a modern firewall does.

    And this is why the original poster is wrong.

    If you're just relying on a Firewall to block access to ports you shouldn't have open anyways, then yeah, you don't need the firewall: just close the ports. But in that scenario, it's really just a misapplication of an otherwise useful security device.

    A Firewall can be useful, as you said, to proxy various protocols or block certain outgoing (or unsolicited incoming) traffic. It can also be used if potentially-harmful traffic belongs on the network, but not going to or from certain hosts (ie, remote administration of servers might be desirable, but only from certain hosts).

    The point is, yes a Firewall isn't The Solution to all security problems, and it can be misapplied, but that doesn't mean it's not a useful device in the right situation.

  • by DrgnDancer ( 137700 ) on Friday December 17, 2010 @01:17PM (#34589352) Homepage

    Well you see it's like this... As a former soldier I'd have been a bit miffed to be say, escorting a convoy, only to discover that bad people with guns knew my route, numbers of troops, and level of armament. It really ruins your day when bad people show up in precisely the right place with way more troops and guns than you have. Especially if they set up explosives. That takes things to whole new level of "ruined day". And before you comment on my simplistic view of "bad people", please understand that my overall opinion of you shifts dramatically toward "bad" when you start shooting at me. As far as I am concerned anyone who shoots at me is by definition a "bad person", no matter what their initial motivation may have been.

  • by J4 ( 449 ) on Friday December 17, 2010 @01:23PM (#34589440) Homepage

    The fact that we outsource chip fabrication ought to be a clue as to why they can't pretend any more.
    OT: It's even money that every piece of military hardware with computers has an illicit kill switch embedded in it.

    Game over USA.

  • by 0123456 ( 636235 ) on Friday December 17, 2010 @01:28PM (#34589494)

    Take the list of critical US infrastructure that Wikileaks published. There is nothing to be gained by having 100% transparency on that and everything to lose since it's basically a blue print on how to attack the US.

    Do you really think the bad guys don't know these things?

    I remember when I was a kid there was a nuclear weapons store a few miles from where we lived. Everyone knew it was there, the USSR could see it on their satellite photos, but strangely it was completely missing from any official maps of the area. Who was that secrecy supposed to be protecting?

  • by wjousts ( 1529427 ) on Friday December 17, 2010 @01:35PM (#34589572)

    Do you really think the bad guys don't know these things?

    Suspecting it and actually confirming it for them with an official US government document are two separate things. And you still haven't given a reason why it should be released.

  • Security (Score:4, Insightful)

    by theamarand ( 794542 ) on Friday December 17, 2010 @01:49PM (#34589756) Homepage
    It always makes sense to operate based on the assumption that you may already be compromised. If you take a look at your data, and you think that impenetrable firewall is going to keep people from accessing it, you're delusional. Security, or lack thereof, is measured in time. If what you're securing is important, the question is not can this information be accessed but how long until it can be accessed. Compartmentalization is an important part of any security plan. Finding ways of keeping people out is something the security field has been working on for ages. Have different passwords for everything. Change passwords regularly. Audit data accesses. Watch for suspicious behavior. Keep off-site backup of data and forensics information. Create different subnets and VLANs to segregate traffic. Train all employees in basic security measures. Ensure that no employees are above security - no backdoors, everything audited. I'd say the most important thing to recognize, though, is exactly what they said: unless a resource is sitting in a heavily-guarded Faraday-cage, inside a vault, turned off, and not connected to anything else, it can not be considered 100% secure. Everything else is risk management.
  • Re:Well (Score:4, Insightful)

    by Stargoat ( 658863 ) * <stargoat@gmail.com> on Friday December 17, 2010 @02:49PM (#34590586) Journal

    Iran thought that, but sneakernets are capable of transmitting viruses behind airwalls.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...