Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
The Military Security

US Military Will Soon Begin Testing NSA's New, Post-Snowden Security Measures (dailydot.com) 72

Patrick O'Neill writes: The U.S. military will closely review the NSA's security measures as concerns mount that foreign adversaries and independent hackers are targeting the American government in cyberspace. "We will determine whether National Security Agency processes and technical controls are effective to limit privileged access to National Security Agency systems and data and to monitor privileged user actions for unauthorized or inappropriate activity," Carol Gorman, the Pentagon's assistant inspector general, wrote in the letter.
This discussion has been archived. No new comments can be posted.

US Military Will Soon Begin Testing NSA's New, Post-Snowden Security Measures

Comments Filter:
  • Post-Snowden NSA (Score:5, Insightful)

    by DrYak ( 748999 ) on Tuesday January 12, 2016 @08:25AM (#51286003) Homepage

    Indeed, if a lone consultant like E. Snowden could pull such a leak, one can imagine what entities with far more resources and know-how (like the Russian FSB / former KGB) have been doing for years.

  • "...We will determine whether National Security Agency processes and technical controls are effective to limit privileged access to National Security Agency systems and data and to monitor privileged user actions for unauthorized or inappropriate activity," Carol Gorman, the Pentagon's assistant inspector general...

    Well, nothing like starting this investigation in a timely manner. After all, by government definition the information that was leaked over two years ago only caused "exceptionally grave damage" to national security.

    I suppose it's about time they got around to checking out the security controls...

    • by gtall ( 79522 )

      Yep, coming up with new security controls, testing them internally for coverage, re-engineering them for holes should take...what...about an afternoon for you?

      • Re:Errr...thanks? (Score:4, Insightful)

        by internerdj ( 1319281 ) on Tuesday January 12, 2016 @10:26AM (#51286959)
        Welcome to the US. When something needs to be done politically then today is too late. Doing it correctly is never as important as doing something now. If we go through the proper process, the voters won't remember why it was a political success.
  • by olsmeister ( 1488789 ) on Tuesday January 12, 2016 @08:31AM (#51286045)
    Three people can keep a secret... if two of them are dead.
  • by Anonymous Coward

    The military needs to worry about getting its own house in order. Private Manning was given access to a wide range of documents for no apparent purpose and the military only discovered he had abused that access when the the documents showed up on Wikileaks. Likewise they "caught" Snowden only because he made the documents public. We have no way of knowing who else leaked information or who they leaked it to. There is no reason to believe the US government is capable of keeping data secure, that includes t

  • "and to monitor privileged user actions for unauthorized or inappropriate activity" Wouldn't that require "backdooring" privileged user accounts? I doubt normal administrative monitoring would warrant mention as something new, unless, the statement is just political puff 'n' stuff..
  • https://bossip.files.wordpress... [wordpress.com]

    It's their new system that is hacker proof. Every person using a military computer will have one of these with them

  • 1) Theft 2) False credentials 3) Tampering with national security 4) Placing all Americans at risk 5) International flight 6) Traveling on a voided passport 7) Bartering with items/information he doesn't legally own nor has personally created 8) Terroristic threats 9) Unethical treatment toward his employer 10) Misrepresentation 11) Perjury/breach of oath 12) Dereliction of duty 13) Failure to follow orders. 14) Impersonation of known government officials/identity theft. He's also flirting with, in fact, tr

Some people manage by the book, even though they don't know who wrote the book or even what book.

Working...