Mapping The CIA Nonclassified Network 248
jeffy124 writes "A security firm Matta Security in London has mapped the CIA non-classified network. Using only legal and open sources, the company mapped topology of machines and even found networks otherwise closed to the public. The company never port scanned or probed the network directly. Among items they found were emails and phone numbers of sys admins and other employees. Amazingly, they did all this in two days."
Portscanning? (Score:5, Insightful)
Not that impressive (Score:5, Insightful)
If someone can get classified information from CIA via social engineering, I'd say someone needs to be retrained. These guys should be on the lookout for that at all times.
Big deal! (Score:5, Insightful)
As for the email addresses and sysadmin names, I really don't think that's a big deal.
Guess we better stop posting our email addresses and names! And, god forbid, get rid of your business cards! And don't forget your whois information!!!!
If that's really an avenue to social engineering, then we're all in trouble.
Re:So what? (Score:5, Insightful)
Besides, addressing this kind of issue "when someone breaks in" is too late. And it's important that the civilian be aware of and take an interest in problems in its government, police force, legal system, etc.
Re:sendmail 8.8.8? (Score:2, Insightful)
They have upgraded since that original version, however.
The latest Sendmail version for Solaris 2.5.1 was 8.8.8 plus a Sun patch, so hopefully they got rid of any and all potential problems [insecure.org].
MONOLINUX
Re:It's DMZ data I'm sure... (Score:2, Insightful)
Among items they found were emails and phone numbers of sys admins and other employees
This sounds really stupid of the CIA at the first glance, but if you think about it, the sys-admins were probably "email the webmaster!" links and the 'other employees' were probably officials that displayed their office numbers so the public could contact them. What a joke.
Re:So what? (Score:5, Insightful)
Second, do you really think the CIA uses username/password authentication for *anything*? Think smartcards, one time key generators, palm scanners, etc. I guarantee there isn't a single secure system you can get into without at least a token and a passphrase. The most secure systems require multiple authentications. Hello, we're are talking about the largest *inteligence* agency in world.
Re:Hah. (Score:3, Insightful)
The point is, that anyone in the USA should be allowed to discuss the merits of any social/political system. For a long time, that discussion was cut off, and people who held a particular viewpoint (however absurd it might seem to us rational people) were fired from their jobs, spied on, and even imprisoned.
Re:Portscanning? (Score:4, Insightful)
Hackers tools (Score:3, Insightful)
Ever heard of stripping headers? (Score:3, Insightful)
Jesus I don't run a covert espionage agency and I at least do that at our company. Hell I even proxy requests to private servers from an apache server in the DMZ.
Isn't this just basic network security?
Re:Not that impressive (Score:2, Insightful)
New ? (Score:1, Insightful)
Re:Not that impressive (Score:5, Insightful)
A few years ago, Archer-Daniels Midland actually did try to hire a few hookers to get some market information from a competitor. The plan got scrapped when nobody could keep a straight face at the thought of some lady of the evening moaning "f--- me! F--- me! Harder! What's your method for removing impurities from lysine? Oh, god, harder!"
But I agree with paiute. It's people who have information, and getting information means getting it from people. Sending them hookers who then blackmail them is one option-a US Marine assigned to our embassy in Moscow fell for that back in the 80's.
And a lot of people will talk just because. Rajid at the 7-11 (not flamebait-that's really his name), a half-dozen homeless guys, and a handful of "undocumented workers" who are just as happy that the gringo cop speaks Spanish and doesn't know INS' phone number like to talk about what goes on in one particular neighborhood, and that includes talking to cops who want to buy coffee at 3AM (mainly me) and as a result I know pretty much everything that happens within two blocks of that 7-11.
It's all about people, and knowing how to listen to them. If the CIA had the good sense to hire street cops, semi-experienced newspaper reporters, multilingual cabdrivers, and a very few really good clinical psychologists to send overseas, they'd be able to tell us what kind of lube Osama bin Laden uses when he has relations with his goats, whether Jiang Zemin really is a pedophile or if that's just office gossip, if there's another reason why Vladimir Putin is cranky this week, and where the communist guerillas in Colombia buy their cigarettes. The really REALLY good information-gatherers know that they need to talk to people instead of wasting money on techno-toys.
Port scanning (Score:3, Insightful)
What I want is a kernel module to defeat port scanning. Whenever a remote tries to connect to a port that isn't bound, the module kicks in, accepts the connections, and doesn't do anything, or echos the incoming data, or sends random data, or behaves like a web/ftp/etc server, or a combination of the above.
If most computers used this, wouldn't port scanning become impractical?
Would there by any harm in it?
Re:Anyone else notice the Lotus Domino Server (Score:2, Insightful)
Version 5.0 of the client still can't handle Daylight Savings Time! If it crashes (and it does) you've got to manually kill the process nlhdeamon.exe to restart. You do not want your helpdesk handing out instructions like that...