Saturday, September 24, 2016

Security on Snowden-the movie: Unrealistic scenes and no new answers – IDG.see

the Film’s central parts is about the time that Edward Snowden, also called Ed, spent on a hotel room in Hong kong. It was there where he met a select few journalists would get access to the information he had stolen from one of the world’s most secure network in the NSA, the us intelligence services.

We get to follow Snowden from his training at the CIA until he during his escape from the united states ports in Russia, where he is now, probably still are.
One of the first it-related sample that Russia may do is on the CIA’s school where each student is given a fictitious network that should be protected. In my opinion, looks to be a blue team/red team exercise, which is something that is good to test their abilities in a protected lab environment.

Russia then begins to serve in the CIA and is placed in Geneva, where he for the first time come in contact with NSA inside in what looks to be a SHIVERING-protected rooms (protection against disclosure signals). Just the scene begins with the fact that he stands and destroy the cds which is a monotonous manual work. It was he commanded to do that he had identified the security flaws in an internal CIA site that "was somebody else’s problem".

also Read: russia’s call to action: Delete immediately Google Allo

Then we will see how Russia, for the first time come in contact with the Xkeyscore, which is a kind of Google for signalspanad information. Different questions are asked in Xkeyscore in order to identify individuals and find interesting information, and that then can be used against them in order to pressure these individuals, or get them to work for the CIA’s interests.

After an incident on the field decide Edward Snowden in order to jump by the CIA and then becomes a consultant who is working against underrättelsemyndigheter. He ends up eventually in Hawaii where he works for Booz Allen Hamilton. We’ll see in the movie how information between different disciplines so that drönarattacker and cryptography mixed healthy, something that is unlikely to occur in reality.
Other references to the leaked material from Snowden that recurs in the film is the Optic nerve that is used by operators at the NSA in order to peeking from a computer’s webcam. But neither, it seems quite credible in the film are carried out without any implants are planted in the target computer in advance (e.g. via malware or physical access).

this is an article from the Expert Network


Also the filmatiserade physical separation of the documents in the NSA is something that can be questioned – that the consultants in the a area can move between different workspaces, without registration. Buzzwords such as "zero-days" and "sql injections" is something that passes by, but is not directly do to I raise of the eyebrows.

the central issue is, of course, how did Snowden out all of these sensitive top-secret documents from the NSA? Probably he had not permissions to these but used the majority of different individuals ‘ logins over a longer period of time. In the film, he puts easily and simply insert a memory card in which he copies out the information in just a few minutes and then smuggle out the memory card in a rubik’s cube, which is not a fully credible history. Snowden himself has not revealed how he got the information but just the actual physical utsmugglandet of information was carried out, probably on some form of removable media.

also Read: Carelessness was the jackpot for Russian hackers – so it is believed they have stolen the NSA’s secret cyber weapon

Features technically, in order to ensure dubbelhandsfattning costs money to produce and somehow managed to Snowden to circumvent these and the majority of the automatic monitoring system. But since he probably used the majority of the individual permissions for a longer time, so triggered no direct alarm.
administrators have high-level permissions in it systems and thus can get access to a large amount of information is so clearly not desirable and, therefore, the necessary separation even by the administrator. But this requires of course more resources, which leads to increased cost for the organization.

the Film contains some kärleksscener which makes it suitable for a wider audience and not just it interested. This allows the film to somewhat revamp the documentary with the Hollywood elements, but it provides no new answers to questions if it really was a coincidence that Snowden ended up in the just Russia.

Facts

Position: Senior IT Security Specialist
Company: Triop
Linkedin: Jonas Lion
Twitter: @jonasl
Email: jonas.expertnetwork@triop.se
Website: www.triop.se, www.kryptera.se
skill sets: , cyber security, crypto, audits, malware, cyberwar, cyber-attacks, exfiltrationsattacker, robust IT infrastructure.
Background: Has worked more than 10 years on the FRA and the armed Forces. Operates Sweden’s largest blog in the it security and encryption on encrypt.see.

LikeTweet

No comments:

Post a Comment