Computer Science Professor Mocks The NSA's Buggy Code (softpedia.com) 179
After performing hours of analysis, a computer science professor says he's "not impressed" by the quality of the recently-leaked code that's supposedly from an NSA hacking tool. An anonymous Slashdot reader writes: The professor, who teaches Software Vulnerability Analysis and Advanced Computer Security at the University of Illinois, Chicago, gripes about the cryptography operations employed in the code of an exploit called BANANAGLEE, used against Fortinet firewalls. Some of his criticism include the words "ridiculous", "very bad", "crazy" and "boring memory leaks".
"I would expect relatively bug-free code. And I would expect minimal cryptographic competence. None of those were true of the code I examined which was quite surprising," the professor told Softpedia in an email.
If these were cyberweapons, "I'm pretty underwhelmed by their quality," professor Checkoway writes on his blog, adding that he found "sloppy and buggy code," no authentication of the encrypted communication channel, 128-bit keys generated using 64 bits of entropy, and cypher initialization vectors that leaked bits of the hash of the plain text...
"I would expect relatively bug-free code. And I would expect minimal cryptographic competence. None of those were true of the code I examined which was quite surprising," the professor told Softpedia in an email.
If these were cyberweapons, "I'm pretty underwhelmed by their quality," professor Checkoway writes on his blog, adding that he found "sloppy and buggy code," no authentication of the encrypted communication channel, 128-bit keys generated using 64 bits of entropy, and cypher initialization vectors that leaked bits of the hash of the plain text...
It is a tool to hack, you idiot (Score:5, Insightful)
Re:It is a tool to hack, you idiot (Score:5, Insightful)
Re: (Score:1)
Yup. Just ask the Gorn.
Re:It is a tool to hack, you idiot (Score:5, Insightful)
"Oh man your shell scripts suck!"
Yeah, that was my thought as well. Red team code is supposed to be quick and dirty. It's the attacker, not the defender. It doesn't have to be pretty or work well, it just has to breach the target system.
Re:It is a tool to hack, you idiot (Score:5, Insightful)
Yeah, that was my thought as well. Red team code is supposed to be quick and dirty.
I think that's a somewhat strong statement. You want your code to work when you deploy it. It's supposed to work. If it works, then it's a working weapon. If it has bugs that impede its function, then it isn't. If the tool can be used against the initiator, because the back channel isn't protected, then it's not just a weapon — it's a hazard.
Re: (Score:2)
It doesn't have to be pretty or work well, it just has to breach the target system.
Sure, if you're using the "blast down the front door and storm through shooting" approach. On the other hand if you want to be a bit more subtle then your code needs to be tight and unobtrusive. The best attack is one that the defender never even knows about until it's far too late.
Re: (Score:2)
I'm pretty sure the NSA never intended to sell the code to anybody.
Re:It is a tool to hack, you idiot (Score:5, Interesting)
Re: (Score:3)
"Oh man your shell scripts suck!"
I'm thinking that this could pave the way to a new geeky genre of the "Yo Mama" jokes.
"Yo NSA code is so bad, __________".
Re: The real issue (Score:3, Insightful)
Cute that you think its a partisan issue
Re: (Score:2)
It's not cute anymore.
Re: (Score:2)
And it is the time for a US President who brings to light just how worthless most of the US foreign allies are. The foreign allies are scared to death that they might actually have to become responsible for their own security instead of expecting the US to do it for them. If some country wants US military protection they should expect an invoice with at least 50% due up front.
So you think it's really in the best interests of the US to let Putin reconstruct the USSR/Warsaw Pact as he seems intent on doing? And have you noticed all the Russian activity in the Middle East of late...? Guess not.
As soon as Trump started the spewing the utter horseshit which you parrot above, it became obvious he was either working for Putin, or might as well be.
Trump/Putin in 2016! It even rhymes, hey...
Re: (Score:2)
Except for Obama who expanded Bush's domestic spying.
Re: It is a tool to hack, you idiot (Score:2)
clowning himself...
May I suggest ceasing your [unsuccessful] attempts to use words "creatively?" It makes you sound like a clown.
Re: (Score:2)
clowning himself...
May I suggest ceasing your [unsuccessful] attempts to use words "creatively?" It makes you sound like a clown.
You'd almost think it was a standard phrase in my day. Oh, it was! Oh, it still is!
Trust me, there is no "creativity" required to use a common phrase in the common way. Upgrade your vocabulary, derpus.
Re: (Score:2)
Right, your ignorance of words do not do anything to change the words.
You actually think that dick-waving over how many places you visited has some sort of protective power that causes you to be less ignorant while not knowing about shit?
You don't know about a common term, and yet you claim to have had every opportunity to learn conversational English, well guess what? Maybe you're just not very good at vocabulary. Did you think of that, Sherlock? Fuck an A, talk about clowning yourself.
http://www.urbandict [urbandictionary.com]
In other news (Score:2)
Photos of the professor with under age children have been appearing all over the internet.
People have been puzzled why the material was on otherwise innocuous sites.
Scary (Score:2, Interesting)
You don't like someone? All you have to do is place child porn pictures on their computer, alert the authorities, and even if they've never seen the pics, they are going to the hole for a long time. And it's quite easy to get the pics there too. USB, web link, email attachments, all so easy, and once the evidence is there, you're screwed, even if you deleted it, short of reinstalling windows, (and even that might not work) or replacing new harddrive.
The police and society at whole have no sympathy for "chil
Re: (Score:2, Insightful)
Actually the FBI has already been caught putting pictures ONTO peoples' computers in order to gain warrants. They don't do it directly, they do it by proxy through hacker groups they hire "for investigations", but it's been revealed that the hackers will put the material onto the computer, alert the FBI that this has been successful, go back and retrieve the pictures while the FBI watches, and thus giving the FBI what they need to breach the location. It's all pretty damn shady if you ask me. Does our FBI e
Re: (Score:2)
The police and society at whole have no sympathy for "child molestors", despite the fact that VIEWING A PICTURE IS AN INNONCENT CRIME...for an activity that didn't harmed anyone.
I've seen you seed this unsubtle agenda into other comments before (or, God help us there are more than one of you out there trying to rationalize child porn to yourselves). It is clearly something in which you have a personal stake. Get help.
Re: (Score:2)
We keep on letting the child rapists like Roman Polanski go free while using pictures as an excuse for paramilitary raids on suspects.
Re: (Score:2)
I'm not defending the people looking a pictures of real kids just pointing out that maybe we should be going after the ones actually taking the pictures or raping the kids a bit more than the current lazy policing.
Re: (Score:2)
Does someone really need to make the rational argument that demand creates supply?
Re: (Score:2)
If he'd stopped at "viewing a picture is innocent", you (and he) might have a point. But when he went on with, "for an activity that didn't harmed [sic] anyone" he revealed an agenda that most folks who aren't paedos would take issue with.
Re: (Score:2)
You are responding to "Anonymous". So how exactly do you assign multiple conversations to one person?
Because writing styles and personal agendas are distinctive. But who cares about that, because now here you are with an actual user account repeating the same disgusting agenda.
And probably more who don't say anything at all because there is a bit of a witch hunt when it comes to everything related to this. If you are ever accused of anything like this, I expect you will find that logic and fact will go right out the door, and you will suffer regardless of the outcome.
Bull. Fucking. Shit. Read this again:
despite the fact that VIEWING A PICTURE IS AN INNONCENT CRIME...for an activity that didn't harmed anyone.
This is not a statement about false accusation, having pictures planted or innocently stumbling on something. This is a rationalization for why such an action should be acceptable. It isn't. 'Viewing' and 'activity' are not passive words. And stop calling it 'this'. It's 'actively viewing chil
Re: In other news (Score:5, Insightful)
TTL (Score:3, Insightful)
I'm guessing that time to live is more important than having everything looking pretty with your i's dotted and t's crossed. These tools are for exploits that may not be around for ever. Getting the code live and useful is more important than anything else.
Re: (Score:2)
It doesn't matter how pretty you make a bomb, in the end all it has to do is go "boom".
Then again, it does help if it doesn't fall apart before it hits the target.
Re: (Score:1)
I'm guessing that time to live is more important than having everything looking pretty with your i's dotted and t's crossed.
Absolutely. If TTL is set too low, data packets won't make it back to NSA's servers. But for NSA peeps reading this: do make sure to avoid TTL in the electronics! It's lethal for your spying device battery life.
Front Door Access (Score:5, Funny)
Remember, these are the people who want "Front Door" access to your computer. Without a warrant, without oversight.
You can trust them, they are the most skilled cyber-warriors on the planet!
Give them the keys to your front door, both physical and virtual! They are super competent and trustworthy.
Re: (Score:2)
We have no idea what they want, don't be such an ignoramus. Republicans in Congress want government to have "front door" access to your computer. Nobody knows what the NSA wants, because they don't even talk to the public about what they want, and they don't ask for anything but money, ever. And don't bother asking what they spent it on, they're not going to engage in a conversation with you where they tell you "no."
Re: (Score:2)
They talk to the press and some of us "ignoramus" types read it.
A bit of an amusing backfiring insult there Aighearach. The NSA don't get their government cash without saying in very broad terms what their aims are. We get to hear that stuff too if we pay attention instead of ignoring it.
Re: (Score:2)
They talk to the press and some of us "ignoramus" types read it.
Right and you have no way to tell if they're lying to you, or to the other guy, or if all of 12 different public theories were presented by them.
The Air Force hiding experimental craft by saying "it was a weather balloon" is beginner stuff, but these are professionals. There is no way you can receive information purported to be from them and have any idea if it is true or which parts are lies and why. There is a long history of the government hiding secrets by encouraging and even inventing conspiracy theor
Re: (Score:2)
Frequently they are but they still have to beg for money in public.
The star trek set thing, what Snowden could get hold of and an increasingly long list of other things (outsourcing - WTF?) indicate otherwise. They are toy soldiers IMHO best replaced by the real thing.
You are the one calling us ignorant yet saying they never say stuff in public. Quite funny really and a bit of an o
Re: (Score:2)
Frequently they are but they still have to beg for money in public.
I can hear hamsterdance playing when you say that.
No, actually, they don't have to beg in public. You obviously don't follow politics well enough to already know the details, so you should have looked it up instead of just guessing that it might be the same as with non-secret agencies. But it was an awful guess, not even all members of Congress to get to the see how much money they're giving the NSA! They certainly don't come begging. We're not talking about NASA here.
Blathering about Star Trek doesn't caus
Re: (Score:2)
Meanwhile back in reality the NSA is leaking like a sieve and we know far more about them than we would ever want to.
I must say your denial of what you wrote in your first post and the insults calling me stupid for taking your first post at face value are very amusing. Do you do balloon animals too Pogo?
Re: (Score:2)
That's a pretty lame approach, but very ignorant.
I'm not supporting a "conspiracy theory," don't be a blatant tool. I'm saying YOU can't KNOW which conspiracy theory to BELIEVE because you can't CHOOSE between then because the government IS KNOWN (in a non-conspiratorial, "this is their job" way) that spy agencies intentionally mislead you, AND other country's spy agencies mislead too while making it look like somebody else, and PRIVATE PARTIES also offer their own additional lies and propaganda for whateve
Re: (Score:2)
That is the approach you are using by insisting that they are an unknowable force dealing with the unknown.
Meanwhile in reality they appear to be toy soldiers best replaced by real military intelligence. Your vote could do something about that some day, they are not the Stasi and this is not East Germany.
Please wake up to what is going on instead of railing against people who dare to challenge your comfort zone.
Re: (Score:2)
No, I didn't say they're an "unknowable force dealing with the unknown." I said it is known that they deal in misinformation, have formal permission for lots of secret activities, have a large budget the details of which are secret, and it is their job to hide or obscure all the details of all that. It isn't unknown what their job is; it is known exactly where they are working when and in what way, etc, etc.
If you can't tell the difference between known unknowns and known knowns, you might as well not even
Re: (Score:2)
That is exactly what you suggested and you then went as far as calling those of us that have been paying attention "ignorant".
Pathetic really. Especially your conspiracy theories A, B and C - you really are damaged.
If you had more contact with government and military you would be laughing at those ideas instead of trying to spread them.
Some of the five eyes stuff like spying on an Indonesian tobacco company shows how hopelessly mundane
A better way to phrase it (Score:2)
Reality is a series of fuckups some of which have got public attention. The theory that the fuckups are just there to lull us into a false sense of security instead of them being a bunch of toy soldiers that should be replaced with t
Re: (Score:2)
Right, things I didn't say, that you somehow thought were "suggested," that you have been told were neither said nor meant, OK, at that point you've established completely and without question that you misread it. And you're still defending your misreading of what I said.
Pathetic. Really.
Re: (Score:2)
If you didn't mean what you wrote then I suggest writing what you do mean instead. That will avoid a bit of confusion.
It looks very much like you are slamming anyone that pays attention to publicly available information on the NSA as "ignorant". Did you really mean something other than that?
Re: (Score:2)
They want the same thing Hoover wanted... And even if somehow they don't want it right now, it's terrible idea to allow them the capability.
Re: Front Door Access (Score:2)
Re: (Score:2)
They may be experts, but they probably still have interns who write code and then accidentally let someone steal it.
By Design (Score:2, Funny)
Clearly the NSA leaked these tools with built-in weaknesses so they could get others to install them, then they get to use them.
Re: (Score:2)
Yep, that's what it says on the tin; "This conspiracy can never be proven or disproven, and you'll never have any way to know what is really going on or which lie is from which of a dozen "sides" are competing to lie to you.
This is why mindless flailing doesn't help the situation. There isn't an obvious direction to flail in.
Re: (Score:2)
Clearly the NSA leaked these tools with built-in weaknesses so they could get others to install them, then they get to use them.
Or, perhaps they were copied directly from some guys computer from a folder titled "dev".
If you look on my computer, you'll see a folder named "scripts" with many megabytes of scripts in there. It's all historical stuff as I worked on various things or attempted to try something different. Dead ends and so on. Almost none of these were actually used. The things I actually used are elsewhere. I don't know why we would assume that these were examples of programs actually in use.
Sure, pal (Score:1)
Re: (Score:3)
Re: (Score:2)
It's horse judges doing a "heck of a job" all the way down.
If it's utter crap that fits bullet points but is not fit for the actual task then it's the real thing.
Not Surprised (Score:5, Insightful)
Re: (Score:1)
A big part of writing quality code is separating the parts that change from the parts that don't. The same is true with hacking code and exploit code. There should be a high quality framework or harness which can accept custom build modules for the individual exploits and any custom one-off exploitation code that's required. In fact, this is precisely how many of the high quality botnet and hacking tools maintained by the Russian criminal gangs work. Maybe our government could learn a thing or two from the
Re: (Score:2)
Are you really so naive as to believe that the sloppy crypto code is not reused elsewhere?
He isn't talking about the exploit code but some parts of the payload - crypto and some packet handling stuff.
What did you expect? (Score:5, Funny)
Our best guy is on vacation in Moscow.
Re: (Score:2)
TL:DR; NSA SUCKS. (Score:1)
ok so like the NSA got pwnt because they asshat-miscrypto-cleartexted the shit out of trillions of dollars worth of strategic vital interest defensive and offensive cyberweapons while exposing us to digital armageddon by revealing a global infrastructure of intentionally, illegally, and poorly back-doored hardware while being recorded for 3 years by our enemies engaging in top secret god knows what the fuck in an information age geopolitical information warfare climate of 2013-2016? did i get this correct g
It does the job, move onto the next thing (Score:2)
.....is what they're thinking I'm sure. They probably destroy the VM after using the tool anyway.
1 or 0 (Score:1)
Consider the possibility that the leaked code may be disinformation.
Everything is easy. (Score:2)
In retrospect.
Suddenly those spent costs no longer seem like they should have cost as much.
And those lessons learned? We should have just known those!
It's why industry refuses to spend anything on basic research anymore. SOO inefficient, and with priorities that make no sense to some random consultant or investor.
[sarcasm]
Pff - NASA, I could do better than that! Here - I'll just make up an ideal, say, random number generation that I just happen to have a library of code on, and WOW - I do SO MUCH BETTER
Re: (Score:2)
D'oh - NSA, not NASA. Nevermind - Feel like an old SNL sketch there.
Ryan Fenton
Meh (Score:5, Interesting)
Anywhoo, back in the '90's I worked for a company that was getting a B2 Certification for its operating system. My job basically consisted of reading the entire AT&T C standard library code, finding potential security flaws, writing tests for those flaws and then writing a report with the tests which would be delivered to the NSA. I found the remote buffer overflow in the AT&T telnet daemon a couple years before the same overflow was discovered in the Linux telnet daemon. So the NSA basically outsourced the hard work of finding all those exploits to the companies that were trying to get security certifications. It took three or four guys just a few months to go through all the stuff we had to look at. I'm sure we missed a bit, but I was much more confident in the security of their OS at the end of all that. Too bad they eventually went out of business, were acquired by IBM and their products were killed. You know, progress!
Re: (Score:2)
I've yet to see a computer science professor with particularly excellent code, either. I run across assignments and example code from courses on a regular basis that fall into the "Never, ever do that" category of programming. Case in point, a relative of mine recently had some questions about a CS programming assignment. Part of the assignment description talked about design patterns and predictably went straight for the Singleton as an example. I'm pretty sure that's the only pattern that about 90% of programmers ever actually learn when reading about design patterns and it's so abused in the industry right now that you can basically never get one past a design review board.
Anywhoo, back in the '90's I worked for a company that was getting a B2 Certification for its operating system. My job basically consisted of reading the entire AT&T C standard library code, finding potential security flaws, writing tests for those flaws and then writing a report with the tests which would be delivered to the NSA. I found the remote buffer overflow in the AT&T telnet daemon a couple years before the same overflow was discovered in the Linux telnet daemon. So the NSA basically outsourced the hard work of finding all those exploits to the companies that were trying to get security certifications. It took three or four guys just a few months to go through all the stuff we had to look at. I'm sure we missed a bit, but I was much more confident in the security of their OS at the end of all that. Too bad they eventually went out of business, were acquired by IBM and their products were killed. You know, progress!
I use singletons at work ALL the time. But only for hardware resources that I don't want someone to try and create more than one instance to. I can only have input and output stream on my device and, sure, I could make that static, but if I make the whole object obviously a singleton to the person using it, they get the idea that there is a limit on the hardware. Now, granted, if I was in the business of providing access to multiple instances of the same type of hardware, that would not be acceptable.
Re: (Score:2)
Re: (Score:2)
Is there every any particular need to limit them, though? A couple decades ago it was uncommon to have more than one sound device on a machine. Now it's unusual not to have two or three. Designs and requirements change over time, and having to factor out singleton behavior that was never really necessary in the first place is kind of a pain in the ass. You could easily just create those things with thing factories when the program starts up, and pass them around to objects that need them. No artificial limits, and you don't have to factor out singleton behavior when you decide you want two things where you used to only have one.
I've found that design review boards are becoming increasingly hostile toward singletons, too. There was a narrow window where they'd at least consider one, back when people started talking about design patterns. These days it's next to impossible to get one approved, even if there's pretty good justification for it. You can always design around the need for a singleton, and usually the system design will be better without them.
In this case, most of the time, yes. There are exceptions, I am about to start a new project where the limit on the number of devices would be an issue. But I write drivers for credit card terminals on mobile devices. So unless the project specifically requires multiple credit card terminals (not common and the project I am referring to that will require it is due to the fact that one terminal may be hard configured for one currency and the other the USD), we intentionally limit the mobile device to one
Re: (Score:2)
Re: (Score:2)
Singletons are a good default design pattern to use if you need something that should typically be shared across lots of pieces of code (e.g. a cache). With that said, my general policy is that you generally shouldn't design classes that are limited to use as a singleton. You should always provide the ability to allocate additional instances unless it is impossible to safely have more than one instance for some reason (and you must justify why this is the case).
Whos naked? (Score:3, Funny)
Random Numbers (Score:4, Interesting)
Re:Random Numbers (Score:4, Insightful)
That's possible, true.
But it is hard to see that someone would "fix" that problem using the approach given in the code sample. Basically their "fix" only produced 64 bits of entropy for a 128 bit key, which is a 101-level cryptography mistake. It also took more time and was much more complex than a straightforward implementation, which kind of kills the argument about the authors having to work quickly. This is one of those screwups that required thought and effort. I'm left with two possibilities:
(1) The NSA is hiring complete amateurs to write their exploit tools, and they aren't giving any adult supervision (or code reviews) to the products of those amateurs.
(2) The NSA/Equation Group didn't write this code at all.
Re: (Score:3, Informative)
Re: (Score:2)
In the old days we presumed that everything was compromised, and everything done online recorded multiple times.
what if we're being lied to? (Score:2)
What if the shadow brokers didn't hack and steal NSA code, but simply had some part in writing the code to begin with and perhaps what they're selling is unrefined prototypes?
Frankly I have no reason to believe that the shadow brokers and the equation group are even separate entities. If equation group are as good as they are supposed to be, then it makes more sense that for some reason equation group are playing a game with the public. (I highly doubt they'd try and play a game with the NSA.)
I have also se
Bomb researcher not impressed with IED (Score:5, Insightful)
Expert: I mean, look at it - it's a bunch of nails and duct tape around a low explosive core which doesn't have nearly the proper confinement for even 50% of the maximum shock wave capable, much less the ability to transition to detonation. And this wiring - that's just disgraceful - the solder didn't even flow properly here, and this is entirely unsheilded - anything could set this off accidentally, even a cell phone. If you were in my training program, you're fail miserably.
Terrorist: We used one of these yesterday to kill 25 people and injure another 70 in a market in Aleppo.
Expert:...
Re: (Score:2, Insightful)
Re: (Score:2)
Expert: I mean, look at it - it's a bunch of nails and duct tape around a low explosive core which doesn't have nearly the proper confinement for even 50% of the maximum shock wave capable, much less the ability to transition to detonation. And this wiring - that's just disgraceful - the solder didn't even flow properly here, and this is entirely unsheilded - anything could set this off accidentally, even a cell phone. If you were in my training program, you're fail miserably.
You'd be right they'd fail the course and be booted out! And for good reason. I can assure you that you have special operations soldiers in the US who can and do use IEDs (for black flag, or deniable operations if nothing else) and you can be likewise sure that they will look like cobbled together crap (in case they're detected before they go off) but will not actually be crap. They'll go boom every time, because there's nothing worse than having a meticulously, planned and executed operation, months in the
64 bits (Score:2)
128-bit keys generated using 64 bits of entropy
I'd like to see the professor brute forcing 64 bits to show exactly how weak that is.
Have to ask ... (Score:2)
Whats worse?
The buggy code that can hack a server
or
the buggy code running on the server that can be hacked?
Not surprising, people who are usually excellent.. (Score:2)
...at reverse engineering and cracking tend to be extremely 'pragmatic' in their approach to creating software.
People are constantly confusing programming with software engineering. Look at Google for example, look at the design decisions behind golang. Google has lots of very smart people no doubt, but golang was designed around their pervasive weakness - they do not tend to be good software engineers (experience will usually lead them there though.)
Ummmm.... (Score:2)
"The purpose of the keygen tool is to generate a 16-byte random number for use by the other tools. This simple task can be accomplished by reading 16 bytes from /dev/urandom."
No, not really - not if you want to maximize entropy. The procedure he describes afterwards seems awfully convoluted, but might be a good way of generating strong pseudorandom numbers in systems with a poor /dev/urandom implementation.
The NSA may not leave it's real tools laying out (Score:2)
Just saying, there is such a thing as disinformation
Extracting RSA key from Cisco Pix (Score:2)
Wrong target in the summary (Score:2)
an exploit called BANANAGLEE, used against Fortinet firewalls
If the submitter actually bothered to read the article, he would realize that BANANAGLEE targets Juniper, not Fortinet. Hoes does one make the mistake of mis-attributing to someone who was only mentioned once in the entire article?
Re:NSA is part of "big government" after all (Score:5, Funny)
We should privatize our security, and make the NSA as well as the military a publicly traded corporation.
I know! Let's outsource it all to Microsoft!!
Re: NSA is part of "big government" after all (Score:1)
Microsoft sued the government to protect its users. Google had a revolving door to the whitehouse installed. You are barking up the wrong tree.
Re: (Score:2)
Riiiight.
"Hot line to the NSA
It's gotten to the point where no vendor hip to the NSA's power will even start building products without checking in with Fort Meade first. This includes even that supposed ruler of the software universe, Microsoft Corp. "It's inevitable that you design products with specific [encryption] algorithms and key lengths in mind," said Ira Rubenstein, Microsoft attorney and a top lieutenant to Bill Gates. By his own account, Rubenstein acts as a "filter" between the NSA and Microsoft
Re: (Score:2, Offtopic)
Trump will run the USA like a business, that's why he has my vote, although he hasn't announced privatisation of vast parts of the government yet, which I would really like.
And that is good because on average, every second business goes bankrupt after two years, right? Donald Trump has extensive experience in running businesses going bankrupt.
Re: (Score:2)
If your first sentence is accurate, than Trump is a very successful businessman since I have only heard about 2 or 3 of his companies going bankrupt, and he has had 100s.
Re: NSA is part of "big government" after all (Score:1)
Re: (Score:2)
Just like we should privatize our prisons, eh? And how has that worked out?
One thing decades as a developer has taught me is to avoid hubris about bugs. Even good programmers make bad mistakes. Software development on a large scale is a social process, and the less transparent that process is the greater opportunity bad decisions have to escape scrutiny.
It doesn't surprise me at all that secretly developed software has obvious mistakes in it -- obvious to outsiders that is.
Re: (Score:2, Offtopic)
Trump will run the USA like a business, that's why he has my vote, although he hasn't announced privatisation of vast parts of the government yet, which I would really like.
Ah yes, Trump the living Rorschach test. Apparently while we are meant to be ignoring all the insane things he says as sarcasm or nonsensical jokes, we are also supposed to be inserting all of our greatest policy desires between the lines. I guess I've been holding my Trump wrong this whole time. Let me just flip this around and...oh! Now it's a pretty butterfly! Go Trump!
Re: (Score:2)
Re: (Score:2)
Privatize security? You mean like dismantle the TSA and have airport security run by the airlines? As in having the government issue letters of marque and reprisal? Where privateers/mercenaries/whatever fight our wars for profit?
Tell me something, how are these people supposed to arm themselves? Would this not require people to be able to buy the same weapons as those available to the standing army? If not then what are people supposed to fight with, VP Biden approved double barrel shotguns?
The ability
Re:NSA is part of "big government" after all (Score:4, Informative)
At this point that would be an incredibly good idea.
The airlines have different priorities so would run it as security and not a massive welfare program for a massive number of poorly trained staff and money funnel to political connections.
Walmart "greeters" take the security part of their job far more seriously than the TSA up to the highest level.
As for everything else, you've got some good points.
Blackwater etc partially happening and a horror story in general. Mercenaries employed to do what professional soldiers consider unprofessional or outright war crimes.
He has shown utter contempt on several occasions.
A very interesting idea but it doesn't seem to be playing out that way anywhere.
By the way, what do you second amendment types do at 45? Do you get rid of all your guns since the second amendment doesn't apply to you after that? Perhaps you should consider that your right to be armed comes from it not being taken away from you in the first place and has nothing at all to do with the second amendment.
Re: (Score:3)
He has shown utter contempt on several occasions.
As someone that once wore the uniform of an American warrior I am quite aware of Trump saying some disparaging remarks about our military. Even so I've seen him say many good things. Hilary Clinton on the other hand allowed people under her care to die at the hands of our enemies only because by sending in our warriors might make things look worse for her. Trump isn't perfect and I'll admit that. Clinton on the other hand is far worse.
A very interesting idea but it doesn't seem to be playing out that way anywhere.
I can see both sides here, for and against.
First, in agreement with y
Re: (Score:2)
As seen in Syria vs Israel some years ago the German tanks that were very effective in WW2 did not stand a chance against a later American tank - there is a looong way down from those old tanks to what you describe. Those home built platforms are one roadside bomb or RPG away from scrap metal.
Re: (Score:3, Insightful)
Govt *isn't* a business in the traditional sense of the word and we shouldn't expect it to be
Re: (Score:3)
...in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defense, promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity...
Not exactly the best charter statement for a profitable business.
Re: (Score:2)
With all the drunk drivers on the road, every buggy should have a dash cam and automatic emergency services notification.
And it is probably worth considering a backup camera while you're doing the install.
These people at least have GPS:
http://thefw.com/horse-and-car... [thefw.com]
This buggy has lots of electronics:
http://gajitz.com/literal-hors... [gajitz.com]
If I was the NSA, I wouldn't want all those data streams slipping through the cracks.