Our buddy and homeboy, John Ready sends us this guest post;
OK, so now we’ve got another country hacking into the federal government’s so-called “secure” information systems. This time it’s apparently individuals allied with Russia, and the target was the National Security Agency itself. The juggernaut that is supposed to protect us, and which receives stupid amounts of our tax money to accomplish that, has had its secrets pilfered.
Nice job…
As if the theft of Personally Identifiable Information (PII) from the Office of Personnel Management-the government’s Human Resources department-wasn’t catastrophic enough. I mean, it’s not like 23 million past, present, and future government employees (like Yours Truly), had their sensitive information extracted by the Chinese military. Approximately 5 million of those individuals had their digitized fingerprints stolen; many of those are intelligence operatives and undercover officers. Now, they risk being unmasked by whomever buys their prints on the black market. Worse, they could be targeted with assassination, you know from the bad guys they are trying to fight.
With all of that still fresh in our memories, you’d think that those tasked with protecting our secrets would be more vigilant. Sadly, that’s what I get for trusting people to do the right thing.
Back in 2010, the first digital weapon was unleashed. It came to be known as Stuxnet. It was brilliant in its sophistication, and how it targeted its victim-the uranium enrichment facility at Natanz, Iran-with laser-like focus. It took a while for security experts to determine its origin, but it was finally traced to a joint NSA-Israeli partnership.
Stuxnet was the digital equivalent of a pre-emptive airstrike. It was developed solely for the purpose of causing physical damage to Iran’s centrifuges, while allowing the US and Israel the ability to deny their involvement. You see, Israel doesn’t take kindly to its neighbors building anything remotely nuclear, whether it’s weapons or reactors. I can’t say I blame them; you don’t know what a nuclear facility’s true purpose is until there’s a mushroom cloud over Tel Aviv.
In the past, the Israelis bombed reactors in Iraq and Syria. This time, President Obama convinced Benjamin Netanyahu that the strike should be more discreet, so as not to cause more unrest in the Middle East. So, the two nations collaborated on the weaponized worm we now know as Stuxnet.
However, the department within NSA, dubbed Tailored Access Operations (TAO: Oh, how very clever!) responsible for developing Stuxnet has now been hacked itself, and a good chunk of its digital weaponry pilfered, this time by some folks in Russia. The perpetrators call themselves “The Shadow Brokers.” The NSA is supposed to be the brain trust, staffed with brilliant technicians and programmers.
Here’s an example of just how “brilliant” these folks are. An NSA employee took a number of documents home with him. He copied them to his “personal home computer, so that he could refer to them while he tweaked his resume.” Besides being a violation of agency rules, it was also against the law. The employee’s PC was running Kaspersky Lab, antivirus software developed in Russia, and installed on computers across the globe. Investigators have long supposed that this software company was in collusion with Russian hackers, and that there was a back-door installed, through which they could directly access his data…sorry, OUR data.
You’d think that there would be increased vigilance, knowing that the rest of the world understands that we are capable of developing Stuxnet and its variants.
The Shadow Brokers are now selling these digital weapons-paid for with our tax dollars-on the Black Market. The prices on some of these weapons are very high. This means that only parties which have that large amounts of capital, such as a rogue nation like North Korea, could unleash them on the United States, all the while claiming innocence, since the origin of the attack could be masked.
Some of these digital weapons have now been turned on two of our country’s allies: Britain and the Ukraine. The implications of this theft are dire. Instead of the Ukraine having its power grid taken down for long periods, it could be us. Such an attack could mimic the Northeast Power Outage in August 2003, which lasted for three days. What’s more, if the attack took out certain sections of the grid, it could cause an even more widespread outage.
Bad, see also: Not good.
As for the NSA employee who took the family jewels off the reservation, he won’t need a resume for his next job. He just needs to practice his new spiel:
“Would you like fries with that?”