State Department Developing Cyber Toolkit 269
An anonymous reader writes "The U.S. State Department, known for its recent RFID passport embarassment, seems to have developed a key tool in the Department of Homeland Security's cyber toolkit for federal agencies. There's not much out there on it other than mention of a tool called SandStorm in a recent press release from State's Bureau of Diplomatic Security. According to the site, "SandStorm simultaneously collects, correlates, and analyzes data on multiple computer systems and departs, leaving no trace of its activities. The White House is championing this cyber tool and the Department of Homeland Security has selected it as a cornerstone application for a cyber toolkit being made available to all Federal agencies." Sounds scary to me, but may be a step in the right direction."
what? (Score:5, Funny)
Great... (Score:2)
Deus Ex, anyone? (Score:2, Interesting)
Re: (Score:2)
Re:Deus Ex, anyone? (Score:2)
Re: (Score:2)
Definitely Beneficial (Score:2, Insightful)
Re:Definitely Beneficial (Score:5, Insightful)
Re:Serious? (Score:5, Insightful)
Remember how the existence of Eschelon was denied until some British guy confirmed that it did in fact, exist? Remember the cheesy "agreement" that the US would not be collecting data on its own citizens, but would have every opportunity to access such data from that collected by any of the four other Eschelon participants? There is absolutely no reason to believe that it WON'T be used on U.S.-owned sites. Even worse, there's absolutely nothing that will stop them, if they so choose.
Re:Serious? (Score:4, Insightful)
Actually, we could stop them, easily. As Winston observes in Orwell's 1984, "if the Proles united, they would get rid of Big Brother like a bull shaking flies off of its back". But we won't. We're all afraid of something. When Ian Clarke created Freenet, did we unite in support of him? Mention Freenet on here and see how long it takes somebody to say "nobody's on Freenet except pedophiles. If you have nothing to hide, you have nothing to fear." If we truly didn't want to be spied on, we wouldn't be, but the truth is that the vast majority of us (even on tin-foil-hat-dot here) do.
Re:Definitely Beneficial (Score:3, Insightful)
Re: (Score:2)
Re:Definitely Beneficial (Score:3, Interesting)
I'll tell you why. Because a disproportionate number of Slashdot readers believe that any technology that is largely used for benign purposes, but can potentially be abused by the government (e.g., SandStorm to gather private information), must be suppressed at all costs. But the same group also believes that any technology that is largely abused for illegal purposes, but can potentially be used for benign purposes (e.g., BitTorrent for
Re:Definitely Beneficial (Score:2)
Re:Definitely Beneficial (Score:2)
I guess it depends on how much you trust your government.
BTW, I wonder if its based on any GPL'd code.
Re:Definitely Beneficial (Score:5, Insightful)
Re:Definitely Beneficial (Score:2)
This "terror
Re:Definitely Beneficial (Score:2)
Nothing like general fear and confusion to make everybody rally around whomever happens to be in office.
And for an added twist, float some insinuations [newshounds.us] that the enemy endorses your opponents.
Re:Definitely Beneficial (Score:4, Interesting)
Do you really think - really - that the only thing we're worried about here is direct death or injury of individuals, personally, by some weapon that is flown, blown up, or shot at them? The impact of 9/11 was pretty horrible for the thousands of dead and their families - but pretty much everyone in the country was impacted, as well. The economics of another serious attack - even a conventional one as before - will be mammoth. The impact of something like a Japan-style Sarin gas attack or two, or of something radiological, will be (just as the bad guys would hope) incredibly costly and disruptive. I can't even imagine something smallpox-ish, in terms of the social freak-out mess.
I live in the DC area and interact with people on the working end of these problems. They're frustrated at how hard it is to fight this crap, but they're even more frustrated at how willingly people paint them as some sort of bad X-Files villains as they do their jobs. Of all the people I've met and talked to, the only common thread that should alarm most of us is their tales of un-fireable incompetent co-workers. There are paper pushers, academics/analysts, operatives, and other people working in all of the three-letter-agencies that are just as dumb, bull-headed, whiny, annoying, distracted by the problems with their drug-using teenagers, etc. as there are in the rest of the world.
Part of the problem is the near impossibility of retaining quality (real quality) people on a government paycheck - especially in areas where the cost of living is off the charts. Living essentially hand-to-mouth in a town where a cheesy two-bedroom townhouse in a bad neighborhood costs half a million dollars, and your 15-mile round trip communute takes over two hours
Developing the tools to know what we need to know is a technical problem. Deciding when and how to use them is a policy problem. I don't sense the police state that you do, perhaps mostly because I'm life-long friends with people who are now in law enforcement and intel, and know that most of the black-helicopter hand wringing is so wildly misplaced as to be just plain funny.
BTW, to put the word "threat" in quotes implies that there simply isn't one. There is, and I'll be curious to hear your take on whether or not, in the wake of the next hit, enough intel was being gathered before hand in an attempt to stop it. Did you catch the news in Australia the other day? 17 guys, stockpiled with chemicals, bomb-making gear and plans, and in what appears to be a two-party race to see who could execute the first serious in-the-name-of-Allah mass casualties in that country first. Major intel gathering, including cyber surveilance of several flavors, was the only reason that Sydney or Melbourne didn't get exactly what just happened in Amman yesterday. And if you think that the only impact on the Jordanian economy is the death and injuries to a couple hundred people, you're way, way wrong. Your initial point (about the odds of any one person being killed by a terrorist) is an often-repeated rhetorical canard that (not out of ignorance, because you have to know better) deliberately pretends that both the intent and impact of terror is person-to-person damage. Wake up, man. Or spend next week in Amman and ask the merchants, the cabbies, the food service people, and everyone else what the odds are that the terrorists only hurt the 57 people that died.
Good Points (Score:3, Interesting)
It is also irrelevent.
As shown by the current US administration, people in power will abuse the system, as they did with the push to war in Iraq (with lies and manipulative PR), Valerie Plame, and the systematic abuse of prisoners. It doesn't matter how good-intentioned most people are; given the tools of abuse, abuse will happen. The question then becomes, on what scale?
Terrorism is the excuse-de-jour for oppression and abuse. Whether it's secret US prisons in central Europe, or CIA e
Re:Definitely Beneficial (Score:2, Funny)
Beneficial does not mean prudent. (Score:5, Insightful)
*sigh* (Score:2)
Doh! (Score:2)
Re:*sigh* (Score:3, Funny)
No no no, something like that definitely will not evolve. It is intelligently and maliciously designed to eventually support and promote STASI-like activities.
Re:Beneficial does not mean prudent. (Score:2)
Contestable evidence (Score:2)
Re:Definitely Beneficial (Score:5, Funny)
In other news, air just became the defacto standard for terrorist respiration.
Re:Definitely Beneficial (Score:2)
Re:Definitely Beneficial NOT (Score:2, Insightful)
Lets face it anyone that reads this site daily could think of 100 ways to
Re:Definitely Beneficial NOT (Score:2)
But there's always more to it than that. Most intel that matters is gathered in the context of alrady having a tip or other information that suggests a need to focus on a particular line of communication. The information that's gathered as two bad guys post notes to each other on some obscure message board is usually complementary to other intel and helps clarify things. The needle-in-the-haystack a
Re:Definitely Beneficial (Score:2)
The internet may be a hotbed of terrorist activity or not, but the US government has no right to spy on my computer or my communications. Hell, it doesn't even have the right to spy on its own citizens, thanks to that pesky "Constitution" thing.
No, so it get real close to its partners. (Score:2)
Since the cold war's end there is no more use for the internet except as a scalable, robust information vehicle for terrorist messages. Oh and a little thing called
You're NOT paranoid, they ARE out to get you but since they don't even trust themselves, they're going to let the machines rat you out.
Don't think you can hide from them in any city or town or with any access to any technology hooked up to any grid.
And
Re:Definitely Beneficial (Score:2)
The problem is drawing the fine line between creating a police state and failing completely to be vigilant. As usual the people find it difficult to decide what they want. On the one hand they want to be safe and not get blown to bits on the other hand they don't want to be stopped, questioned, searched and spied on. It's a perfectly understandable, if somewhat contradictory, position to hold.
Personally I think there is an argument for intercepting / reading unencrypted email. Unencrypted email is the equ
Re:Definitely Beneficial (Score:2)
I have also heard that TERRORISTS use phone lines to call each other and TALK TERRORIST TALK to each others, therefore it's really important to let US goverment to listen to all phone conversations and disc
Re:Definitely Beneficial (Score:2)
Re:Definitely Beneficial (Score:2)
Re:Definitely Beneficial (Score:3, Informative)
I think that's the aim of Bush's plan to require psychiatric examination of anybody and everybody who might be the least bit "other" than him (excluding Karl Rove, of course, who IS him.)
Ah, here it is: http://www.worldnetdaily.com/news/article.asp?ARTI CLE_ID=39078/ [worldnetdaily.com]
A quote for those too lazy to click on the link:
The president's commission found that "despite their prevalence, mental disorders often go undiagnosed" and recommended comp
Latest Virus (Score:3, Insightful)
Motives for telling? (Score:5, Interesting)
Looks interesting...I give it 20 minutes before a copy is up on the torrent...*grins*. Then the script-kiddies can all go use it to spy on each other and prove their "1337-ness"...
Althought, truth be told - why exactly is the government telling us this? I mean, for all we know, they could have been developing these sorts of computer surveillance programs for years...in fact, they probably have. So why tell us about it now, in a highly-publicised press release? Or are they just trying to be seen to doing something, and seeming like they're on the cutting edge of technology? So maybe in truth they're actually quite clueless, and this program is nothing more than a hashed-up, worthless keylogger that looks like sample code from "Windows Internals"?
One wonders about their motives for this news release, though...
cya, Victor
Re:Motives for telling? (Score:2)
Re:Motives for telling? (Score:2)
Re:Motives for telling? (Score:2)
Re: (Score:2, Interesting)
Re:Motives for telling? (Score:2, Insightful)
Re:Motives for telling? (Score:2, Insightful)
Personally, I am far more frightened of my government having the ability to secretly spy on me than I am of being killed by a terrorist. Hell, I'm more afraid an airplane is going to fall out of the sky on its own than I am that it will be exploded by a terrorist plot.
Real American patriots will always be skeptical of the government. So, telling us something like this only prompts us to ask why they are telling us. We can hope it is in the int
Does it use the sony root kit (Score:2, Funny)
Re:Does it use the sony root kit (Score:2)
Re:Does it use the sony root kit (Score:2)
Check the list of stuff:
http://www.defenselink.mil/sites/ [defenselink.mil]
Homeland Security is a part of DoD
Not scary (Score:5, Funny)
Told you so.
What's a cyer-tubgirl? (Score:4, Funny)
"cyber" toolkit ? (Score:2, Funny)
Re:"cyber" toolkit ? (Score:2)
Why?
The state has been marketing the same shit for thousands of years and it's worked every time.
The name doesn't matter. After all, we're "liberating Iraqis" (from their lives.) We're all for "democracy" (while stealing the election using voting machine fraud.) "We don't torture" (we just hook people up to electrical devices and fry their nuts or let dogs chew on them or just do the ol' beat the shit out of them technigue.)
I mean, "Sandstorm"? Where did they get that one from? Obviously trying to play into
False positives or no matches at all (Score:2, Informative)
They that can give up essential (Score:5, Insightful)
Ben Franklin wrote those words over 200 years ago.
They apply today just as much as they did then.
Somebody needs to remind the current incumbent of the White House about his nation's history.
Re:They that can give up essential (Score:3, Insightful)
Nobody is ever going to argue Franklin's statement, the real debate is about what's "essential", what's "little" and what's "temporary". This observation has nothing to do with the keylogger thing you're commenting on, it's an unrelated thought.
Re:They that can give up essential (Score:5, Insightful)
He obviously meant that there IS no such thing as "permanent safety" (and there isn't short of being Transhuman and even then you probably have to worry about interstellar gamma ray bursts). Anybody who thinks the US government can make anybody "safe" from anything is a total idiot. They can't even keep the Prez safe as several Prez's have proven by taking bullets.
And there are no such things as "inessential liberties" since by definition if you are not free to do what you want, you are simply not free. Political freedom is like being pregnant - you either are or you aren't. You either submit to the state in one or more respects, or you don't.
What you are NEVER free from, however, is the consequences of your free actions - which isn't relevant to the discussion because we are discussing political freedom, not physical or social cause and effect.
Re:They that can give up essential (Score:3, Insightful)
George W. Bush may have a Texas drawl and a deceptively "rube" persona, but he is a savey and cynical Connecticut (blue-blood) Yankee just like his Daddy and his Daddy's Daddy. Check out "http://www.hereinreality.com/familyvalues.html" for the
Re:They that can give up essential (Score:2)
I do hope so, please tell us how the rest of the world can help. I think the bombing of the house where Saddam was mistakenly supposed to be was cold blooded murder by the pilot of the 'plane, the USAF planners, and ultimately the President. Exactly how we can bring those responsible for the crime to Justice, I know
Re:They that can give up essential (Score:2)
Nah, you'd get better results by buying him another bottle of whisky, and taking it up with the vice president.
Re:It's grey, Jack. (Score:2)
I have not traded anything for any safety.
First of all, I never agreed to any of this except under duress, so I can hardly be referred to as a "trader" in this regard.
Second, I have NOT been made safe by any stretch of the imagination from anything that might possibly be harmful by any government action.
Your comment is simply wrong. I assume what you meant to say is that the state has taken numerous civil liberties away from the citizenry in SUPPOSED exchange for imposing various regulations that are SUPPOS
We have heard of such backdoors before... (Score:5, Informative)
Date: September 28, 1999.
Source: Tech Law Journal recorded the event, transcribed the audio recording, and then converted it into HTML [techlawjournal.com].
Weldon statement [techlawjournal.com]:
Re:We have heard of such backdoors before... (Score:3, Interesting)
Ah yes, SandStorm... (Score:2)
Sandstorm in a sandbox (Score:2)
Eventually (Score:4, Insightful)
Hence, they will likely create a new one, the Department of Computing (not part of the FCC) in order to grow themselves, tax society, and control private citizens. Just like they do for everything else.
Of course it will be sold as "building bridges" or "advancing technology", etc... Something for our childrens' future, no doubt.
Re:Eventually (Score:3, Insightful)
Or catching terrorists as the U.S.A. P.A.T.R.I.O.Terrorism (forgot the rest) was supposed to be used for, and isn't.. Or child molestors.. nobody likes them.
unlawful search and seizure (Score:3, Insightful)
The White House and Department of Homeland Security are such champions of constitutional rights.
By the way the root kit is hidden in powerpoint files.....
I've got to go answer a knock at the door; my ride to a black prison is here.
Ah, but? (Score:3, Funny)
Re:Ah, but? (Score:4, Funny)
something ive always wondered. (Score:2, Interesting)
I was working for a well known company doing QA/Testing on console games, and monitoring server side/client side bugs.. We would get new DVD's sometimes twice a day with the latest revision of the game and we would have to check both our "open" bugs, and our "closed" bugs - that is, bugs that were previously fixed to make sure that they had not
Yeah, right! (Score:2, Insightful)
I doubt that this is more than a bullshit rumer. When I was in the service it was paying 40-70 percent more for even specialized tools. Ha
Is this good or bad? (Score:2)
but may be a step in the right direction.
And which direction would that be?
Ah... who to approach (Score:3, Insightful)
From the article: CTAD, under the Office of Computer Security, is the U.S. Department of State's focal point for collecting and reporting time-sensitive, cyber threat intelligence, and technical data.
So if terrorist hackers are trying to figure out who to approach/bribe/attack... it's these guys? Nice of them to include a photo too! That helps with identification.
And "leaving no trace of its activities"... this I gotta see. Windows? Mac? Linux? Solaris? Mainframes? Or maybe they've already scanned my computer! Uh-oh... is that a silent helicopter outside my apartment?!
Re:Ah... who to approach (Score:2)
They've already sold a DRM system to Sony.
And "leaving no trace of its activities"... this I gotta see.
No, you wouldn't.
"Sandstorm" is a commercial product (Score:5, Interesting)
Re:"Sandstorm" is a commercial product (Score:3, Interesting)
It didn't sound to me like they were talking about the Sandstorm Enterprises NetIntercept product, it sounded to me like they were talking about a system devised by the people working for the division. Just a coincidence that it sounds like the Sandstorm product. Why would they give an award to some guys who just went out and bought a commercially available product?
Re:"Sandstorm" is a commercial product (Score:2)
Why would they give an award to some guys who just went out and bought a commercially available product?
Obviously you have never worked for the govenment.
You can get an award for *NOT* screwing things up, rather than doing something productive.
Re:"Sandstorm" is a commercial product (Score:4, Informative)
Free to DHS & federal government
From Dept. of State [and DHS US-CERT]
Like EnCase Enterprise edition
Network forensics "grep"
Examine system state
Remotely search multiple systems - files, ports, processes, file headers, hashes, MACs, ADS
Search all files changed in this time frame
Search all files with this hash regardless of name
155KB agent runs, then deletes itself
Windows only
Fairly forensically safe - does not change file MACs
Root kit detection to come later
The key points are "155KB agent runs, then deletes itself" and "Windows only". SandStorm Enterprises did not create this product.
Helevius
Hey, State Department! (Score:3, Funny)
Nothing new (Score:2, Funny)
"No trace", eh? (Score:3, Informative)
So that includes taking whatever data it has supposedly collected/correlated/analyzed, and somehow uploading it somewhere, without my firewall noticing? And it somehow collects this data without my noticing CPU usage, disk IO, and so on?
Everything leaves traces. It has to. If it is clever about how it goes about its work, that is one thing...but to say it "leaves no trace" isn't even "spin"- it's bullshit.
Why Would They Bother When They Have PROMIS? (Score:2)
They ripped off the INSLAW company two decades ago for the PROMIS software which was supposedly then modified by the NSA or other triple-letter agencies to do exactly what this thing is supposed to do - penetrate ANY database and extract or manipulate its data without being detected.
The Federal judge who sentenced me to nine years in the joint was in fact an Assistant Attorney General in the DOJ at the time and was involved in the scandal. He got a Federal judgeship for his part in it.
Google for the story -
Easy to circumvent (Score:2, Funny)
Obligatory MST3k Quote (Score:3, Funny)
Dr. F: Well Joel, we're introducing a new feature here today. Here's a hint: Remember "Lost Continent"? Remember "Rock Climbing"?
Frank: Oh who can ever forget "Rock Climbing", eh Clay? Well now, along the same lines we've come up with something new -- something we like to call: Sand Storm! SAND STORM!
Dr. F: It's all part of a new program we like to call:
Both: Deep Hurting! DEEP HURTING!
State Department Developing Cyber Rootkit (Score:2)
it's about what get's done with the information (Score:2)
replace SandStorm with Google. or Yahoo. Or MSN.
datamining activities are not evil per se. the outcomes are far from flawless, though (depending on how the mining software was trained). i'm hoping that there's plenty of competent people in the Dept. of Homeland Security who understand that datamining might give them leads, but hardly provides conclusive evidence.
in
Does the DMCA apply to the government? (Score:2, Funny)
Leaving no trace (Score:2, Insightful)
Secrecy in government destroys trust. (Score:3, Insightful)
Lawyers, pay attention (Score:3, Insightful)
Why? Simple:
It is easy to establish that there have been vectors of attack which would have allowed unrestricted access to System A, either remotely or by anyone with physical access to the machine. Simply look up what alerts have been issued for the operating system in question after the time the accuser claims System A had the "evidence" in question. It should also be possible to establish that there are "unknown" zero-day exploits, but if System A has Windows XP, (ie. in the greatest percentage of cases), this shouldn't be necessary -- exploit after exploit should exist in the alert records, giving multiple vectors of attack at the time the "evidence" was supposed to be created on System A.
So now there is a clear way to show the material could have been planted on the system, indistinguishable from whether your client caused it to be created.
Now to establish that the planter of said data could have easily covered there tracks, again -- looking at this article, it is trivial to show this. Root access to the system will allow any data to be written anywhere to the drives on System A. Therefore, any fingerprints left by the attacker who planted the "evidence" could be cleaned up. Just like the system described in this article, although it purports to simply look for data, not plant it.
Stop letting clients be sent away on "email" evidence or "cookie" evidence or whatever. It's crap! Systems are too easy to penetrate, evidence is too easily planted, and tracks are too easily erased.
Re:Sandstorm isnt racist...yeah right... (Score:2)
Seems to me The Oklahoma city bomber wasn't arabic...
Seems to me that 40% of the world's land area is covered by desert [cnn.com]
Re:Sandstorm isnt racist...yeah right... (Score:3, Funny)
That, and he used arabic numbers to write his telephone number...
Re:here we go again (Score:2, Funny)
they spout ish like this for wanna be terroists... (Score:5, Insightful)
Re:Maybe not a big deal? (Score:2)
So you are suggesting that it won't be used to rip off aircraft technology from allied nations to give to US companies (like the Airbus IP theft), possibly for a kickback to the agents involved?
Elements of US intelligence are uncontrolled and certainly commit illegal acts - up to and including treason against the USA (Iran-Contra) and torture. If the secret police get on my network it's time to pull t
Re:Quality! (Score:2)
Dude, your car's on fire...
Re:heres a link to the software (Score:3, Informative)
No, the Sandstorm Enterprises NetIntercept product has been around for the last four years. It's hardly new and hardly something somebody would get an award for just buying (at $20,000, by the way.) The company started with PhoneSweep, a wardialing detector.
Re:heres a link to the software (Score:2, Interesting)
Re:The end... (Score:2)
Of course it's different, because you would have to do something yourself and you'd also notice it (of course).
More of an equivalent would be having a hidden cam in your bathroom. (And no, I wouldn't want that either!)