TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

NSA finds Snowden hijacked officials’ logins

87 pointsby moonlighterover 11 years ago

15 comments

res0nat0rover 11 years ago
&gt; The National Security Agency (NSA) is the font of information security wisdom for the US defense and intelligence communities. But apparently, the NSA&#x27;s own network security is so weak that a single administrator was able to hijack the credentials of a number of NSA employees with high-level security clearances and use them to download data from the agency&#x27;s internal networks.<p>Thats a bit hyperbolic and out of touch with reality. Sure I as a sysadmin with root to most UNIX machines in my companies environment could have been able to copy the raw Oracle db files to steal company secrets, SAP databases for other juicy data that I could sell to a competitor, run a network sniffer on important login servers to steal passwords, that is how the real world works. If anyone believes that you can totally lock down access to every system on your network from your trusted sysadmins and have 100% audibility and accountability you are unfortunately living in a fantasy land. NSA or not, this really isn&#x27;t something that is 100% preventable.
评论 #6300230 未加载
评论 #6300210 未加载
评论 #6300687 未加载
ihswover 11 years ago
Snowden&#x27;s escape from the NSA exposed two things: 1) <i>illegal</i> kleptocratic behaviour on part of the government 2) gross security incompetence on part of the government. The NSA has spent all its time on #1 up until now, so they&#x27;re going to hype him up as much as possible so as to diminish the embarrassment from #2.<p>&gt; He <i>wasn&#x27;t</i> just a community college stooge, he was brilliant! The obscure flaw that he exploited has since been fixed, hooray too!<p>Meanwhile &#x27;sudo su&#x27; has been criminalized as a precaution.
评论 #6300369 未加载
GigabyteCoinover 11 years ago
It&#x27;s this kind of stuff that really scares me.<p>1) Some government agency builds massive computer system containing lots of information about the general public.<p>2) There are numerous obvious holes in the &quot;massive&quot; computer system for obvious reasons (government&#x27;s haste, lack of oversight, etc).<p>3) The government&#x27;s computers get hacked.<p>In my opinion, numbers two and three are inevitable when number one takes place.<p>Something similar just happened in Canada a few years ago with all of our driving information: <a href="http://www.huffingtonpost.ca/2012/11/06/service-ontario-kiosks-ontario-government_n_2081077.html" rel="nofollow">http:&#x2F;&#x2F;www.huffingtonpost.ca&#x2F;2012&#x2F;11&#x2F;06&#x2F;service-ontario-kios...</a>
评论 #6300614 未加载
评论 #6300408 未加载
评论 #6300460 未加载
评论 #6302344 未加载
zero_intpover 11 years ago
Personal observation: Internal security best practices in spy organizations are rarely &#x27;overlooked&#x27;. It is all about trade-offs. II think the more important question is &quot;why would the NSA have lax internal oversight on both user-privledges AND audit-logs?&quot;<p>The answer is that it is much easier for black bag operations to be scrubbed from potential oversight when an individual holds the power to run the hidden|illegal analysis and clean their own log trails.
femtoover 11 years ago
Spring clean time at the NSA? Apart from anything he might have done, Snowden has provided a convenient dumpster, which may be used to neatly wrap up and dispose of pesky unexplained incidents.
评论 #6300366 未加载
beedogsover 11 years ago
AKA he typed &quot;su&quot;. Or whatever the Windows equivalent is. I do this all the time to diagnose problems and no one has ever written an article about me. :&#x2F;
评论 #6300219 未加载
CaveTechover 11 years ago
Article is filled with speculation and extremely vague details on his purported &quot;attack&quot;. Seems largely like a filler article to me.
joshfraserover 11 years ago
If they couldn&#x27;t detect Snowden, it raises the question of what the Chinese government has access to. I imagine every government and hacking group in the world is doing everything they can to get access to that pile of data. Even if you trust the US government not to abuse these capabilities, what will happen when that data falls into even worse hands?
i386over 11 years ago
Unless this audit was independent, can we really trust their analysis? The NSAs credibility is shot at this point.
评论 #6300234 未加载
Nate75Sandersover 11 years ago
&quot;Snowden reportedly used high-ranking official&#x27;s profiles to troll NSA&#x27;s intranet.&quot;<p>trawl?
评论 #6300221 未加载
评论 #6300364 未加载
samstaveover 11 years ago
This appears to be a snowjob against Snowden, and BS -- Look at the language:<p>1. <i></i><i>Snowden impersonated NSA officials, sources say</i><i></i><p>2. <i></i><i>Edward Snowden accessed some secret national security documents by assuming the electronic identities of top NSA officials</i><i></i><p>3. <i></i><i>forensic investigation has included trying to figure out which higher level officials Snowden impersonated</i><i></i><p>4. <i></i><i>if an employee was on vacation while the on-line version of the employee was downloading a classified document, it might indicate that someone assumed the employee’s identity</i><i></i><p>5. <i></i><i>NSA has already identified several instances where Snowden borrowed someone else’s user profile to access documents</i><i></i><p>6. <i></i><i>“The damage, on a scale of 1 to 10, is a 12,” said a former intelligence official.</i><i></i><p>7. <i></i><i>The NSA declined to comment</i><i></i> &lt;--- WTF, then who are the above sources?<p>[Edit: I wanted to add a little bit of clarity here: the language used is very vague and references things that could never possible be confirmed: sources say, &quot;might indicate&quot;, &quot;has identified&quot; --- This story is like a bunch of paragraphs typed out, randomly put into a hat then shaken onto the floor into the pattern of the story. It is not a decisive, cohesive piece of information -- then it is ended saying that the NSA has no comment.<p>THe TITLE is &quot;NSA finds Snowden hijacked officials’ logins&quot; NSA FINDS....<p>So, if the NSA doesn&#x27;t comment - and the &quot;analysis by NBC&quot; and the NSA declines to comment are all used -- then NOTHING in this piece can be believed.<p>Even if the entire premise is true - this is hands down the worst framing of the information, supposedly factual, one could imagine!<p>---<p>In my informed IT professional opinion, they are using this to brand him a hacker - and they make a bunch of &quot;what if&quot; type claims. Then they slide into a confirmed report. Then they claim the damage is off the scale (12 on a scale of 1-10)<p>This is a completely MISO built PR piece for the NSA.<p>As administrator on any system (administrator in Windows, and Root in *nix) one will have access to whatever you want.<p>Whilst at lockheed, I had admin rights to every machine and document in my realm - I would have had no need to &quot;impersonate&quot; any other lockheed employee...<p>The mistake here is if NSA was using the same root passwords&#x2F;keys across entire tiers of machines. In that case - call it criminal negligence on the part of whomever architected that disaster.
评论 #6300415 未加载
kyzylover 11 years ago
To me this simply looks like the folks in charge are locking in their cyber crimes case against Snowden. If he&#x27;s ever brought in--for whatever reason--and even if he magically avoids every charge of espionage, treason, leaking, spying, misuse of company keyboards, or whatever, they&#x27;ll have the hacking angle sunk so deep that it won&#x27;t matter.<p>If Bradley Manning got what he did for scary wget wizardry (making no statement about the validity of that charge or verdict) then I think Snowden can safely expect more consecutive life sentences than he has fingers and toes.
joelrunyonover 11 years ago
Has anyone figured out exactly how high Snowden&#x27;s clearance went?<p>They&#x27;re really non-specific about what he did (and play it off like he couldn&#x27;t do anything), but it&#x27;s coming across more &amp; more like he really had his crap together.
ajw0100over 11 years ago
Am I the only one who finds it funny that the article quoted Oracle&#x27;s Enterprise Manager docs?
评论 #6301163 未加载
bingeboyover 11 years ago
Quis custodiet ipsos custodes?