It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

So, Uh, Did The NSA Get Hacked?

page: 2
25
<< 1    3 >>

log in

join
share:

posted on Aug, 15 2016 @ 03:17 PM
link   

originally posted by: flatbush71
theshadowbrokers.tumblr.com...

The actual release by SB was two days ago.
It is good stuff, but still....... no cigar.

Reminds me of James Jesus trying to parlay Kim Philby.
Or for you young guys its kinda like the hunt for "Graysuit "
We shall see.

Buck

Nice find. Thanks!



posted on Aug, 15 2016 @ 03:45 PM
link   
a reply to: AdmireTheDistance

Oh I doubt it, since all classified material isn't connected to the Internet because common sense (unless you're Hillary Clinton).

See: JWICS & Siprnet.



posted on Aug, 15 2016 @ 07:25 PM
link   
a reply to: AdmireTheDistance

From WikilLeaks a few minutes ago.



posted on Aug, 15 2016 @ 07:43 PM
link   
a reply to: tweetie

Ooh! Thanks for the update!



posted on Aug, 15 2016 @ 08:51 PM
link   
a reply to: AdmireTheDistance

Ah ok. I'm like WTF.



posted on Aug, 15 2016 @ 08:53 PM
link   
a reply to: Asktheanimals

TRUE LOL. People are looking at me.



posted on Aug, 15 2016 @ 08:55 PM
link   
a reply to: eisegesis

Both links are broken.
I'm back to WTF Again.



posted on Aug, 15 2016 @ 08:57 PM
link   
If the NSA was hacked I doubt we'd ever hear about it.



posted on Aug, 16 2016 @ 01:02 AM
link   

originally posted by: flatbush71
theshadowbrokers.tumblr.com...

The actual release by SB was two days ago.
It is good stuff, but still....... no cigar.

Reminds me of James Jesus trying to parlay Kim Philby.
Or for you young guys its kinda like the hunt for "Graysuit "
We shall see.

Buck


originally posted by: AdmireTheDistance
Nice find. Thanks!
I'm sure you didn't write "nice find" for this:



I hope you saved whatever was there if you wanted it since it's gone now.



posted on Aug, 16 2016 @ 08:36 AM
link   
That's the way it works in the real world.
Due to the sensitivity, I'm surprised it stayed up as long as it did.
This is a very big deal and you will see less and less as time passes.
I have to agree with a old DIA source, there is a rat or rats in the house.
And Snowden remotely flipped the switch that let the rats into cheese warehouse.
I'll give ya what I can, up to a certain limit.

Buck

Commentary

“It’s at minimum very interesting; at maximum, hugely damaging,” said Dave Aitel, a former NSA research scientist and now the CEO of the security firm Immunity. “It’ll blow some operations if those haven’t already been blown.”

A penetration of an NSA tool of this kind, which Aitel said is similar to what an NSA agent would see when carrying out cyber operations, would probably require the tools of hackers working on behalf of nation-state because the agency is typically careful in hiding its tools and using computer defenses.

The goal of the operation remains something of a mystery. The files appear to be from late 2013 — after the Snowden revelations — in which case whoever burned this NSA operation has been sitting on explosive government files for some three years. Why post these documents now? And to what end?
------------------------------------------------------------------------------------------------------------------------------------------------------ ---------------------------------


The files were also present on github before the story broke on Twitter, using the GitHub API we can retrieve the email address of the original github user (who joined github on August 6, 2016, and pushed the files on August 13, 2016 — and the repositor taken down on August 15, 2016) as I mentioned on Twitter — Tutanota is a opensource end-to-end encryption software with cloud hosting which is also popular among ISIS — given what happened to Lavabit in the past it would be interesting to see what will be the response of the US Governement.

[email protected]


edit on 16-8-2016 by flatbush71 because: (no reason given)



posted on Aug, 16 2016 @ 11:10 AM
link   

originally posted by: Sillyolme
a reply to: eisegesis

Both links are broken.
I'm back to WTF Again.


For some reason I had to manually enter the links into my address bar. Right click on the links, copy and paste the second link directly after the first in your address bar and it will work. I'm not sure how many original links are accessible.

I followed my own instructions and it worked perfectly.

Both links remain broken unless combined into one. It wouldn't properly direct members to the page when I copied and pasted the original.

Follow the instructions



posted on Aug, 16 2016 @ 01:58 PM
link   
a reply to: odzeandennz


but if true, the us needs to rethink cyber security. while spending billions to spy on other nations we forgot to look out for no. 1... our country's national security.



Gee whiz, isn't that convenient... Maybe we should have some overarching cyber security laws that affect the end user more than anyone else, you know, for "protection".

Just like every other 'security' issue, it's either people directly related to them (former employees, double/triple agents) or a false flag.

Anyone watch Suicide Squad?

Spoilers

Just like the elite 'task force' they were setting up, also caused the creation of the enemy, (supreme power to protect creates supreme to destroy) it's amazing how much a similar theme is mirrored in real life. If they hadn't have created the squad to protect themselves from incredibly powerful destructive forces, they wouldn't have created the incredibly powerful destructive force they needed the squad to put down.

End Spoilers

The point is that even in real life it seems to be a common theme. Whether or not its on purpose. When they create these super powerful arms of government or special operatives, the only ones who are capable of challenging them or causing problems are the same people involved in with them. They end up chasing their own operatives that have gone 'rogue' or something similar happens purposely, as a false flag. In the end, all it accomplishes is stricter rules & security measures that directly affect the lowest people on the totem, as the highest are networked in such a way they can get around it anyway.



posted on Aug, 16 2016 @ 02:35 PM
link   
a reply to: AdmireTheDistance

Check Cryptome. Its where i picked up my copy of the Archive. Ive been going through it all last night and today. There are callbacks that return to "DOD servers" (seems sloppy, and technically you can google access to some DOD servers. 3/10 attribution).

Its a bunch of config scripts, step by step post exploitation guides for specific tools, and a ton of python code.

The earliest available file date was 2009, with the latest being October 2013. So if it was a hack, it wasnt recent. Ops servers would be decomissioned and scrubbed of all files after use, so it makes the hack questionable as well. Either someone got real lazy or team Snowden is behind the dump.

There are some neat exploits in here if you are running old fortinet, cisco ASA or PIX devices. Otherwise all the code would need to be updated/rewritten to exploit anything important today.. although you would probably still be able to exploit .gov and phone systems because of EOL cycles.



posted on Aug, 16 2016 @ 06:08 PM
link   
a reply to: AdmireTheDistance

I caught a link on my Twitter feed this morning which leads to IT World. I don't see it posted so will do that now. Snowden reports on the NSA hack.

Link



posted on Aug, 16 2016 @ 07:40 PM
link   
a reply to: AdmireTheDistance

The sad thing is, based on what I have learned the last 5 or so years, I would not believe the gov't if they told me ANYTHING. From all evidence I have uncovered, what the US gov't does better and more than any other psychopath I've ever known (and I've known one or two in my business career), is lie, cheat and steal.

So yes, I would definitely believe the NSA has been hacked. Given the supposed breadth and depth of NSA tech, I sincerely doubt that anyone would lie about something like this, because they would assume the nsa could find them easily.



posted on Aug, 16 2016 @ 09:36 PM
link   
NY Times Shadow Brokers Leak

A recent article on the NY Times site about the hack.

Interestingly I remember playing through the Mass Effect series (a triology of space-opera video games). In the first Mass Effect we are introduced to the Shadow Broker. He is someone that works in the shadows gathering information and secrets and selling them to the highest bidder.


The Shadow Broker is an individual at the head of an expansive organization which trades in information, always selling to the highest bidder. The Shadow Broker appears to be highly competent at its trade: all secrets that are bought and sold never allow one customer of the Broker to gain a significant advantage, forcing the customers to continue trading information to avoid becoming disadvantaged, allowing the Broker to remain in business.


Shadow Broker

There's a DLC in Mass Effect 2 where you actually attack the Shadow Broker's base with Liara and take him down.



posted on Aug, 17 2016 @ 12:30 PM
link   

originally posted by: Swills
a reply to: AdmireTheDistance

Oh I doubt it, since all classified material isn't connected to the Internet because common sense (unless you're Hillary Clinton).

See: JWICS & Siprnet.


You forget there are many ways to get to that information, an insider, or a compromised USB introduced anywhere on those networks are the most likely. Also, JWICS and SIPR are connected to GENSER via Radiant Mercury (automatically sanitizes higher classified information to be passed to a lower network or scrubs confidential personal data from GENSER to pass to higher networks (think AIS for civilian maritime monitoring)), if one was good enough, they can get in that way, especially if Lockheed Martin is deeply compromised.



posted on Aug, 17 2016 @ 12:55 PM
link   
NSA Honeypot...

If the NSA leaves a door open, it's because they are allowing you in.

If the NSA allows you to leave with something, its because they let you have it.

If the NSA lets you have something, it's not entirely yours.

If you have something that belongs to the NSA, they have you.



posted on Aug, 17 2016 @ 03:05 PM
link   

originally posted by: tweetie
I caught a link on my Twitter feed this morning which leads to IT World. I don't see it posted so will do that now. Snowden reports on the NSA hack.

Link
Interesting. Snowden seems to be saying that a hack of an NSA malware server by presumably another nation-state (such as Russia) isn't new.


In his tweets Snowden says it looks like someone has hacked an NSA staging server from which it launched attacks, and that’s not such a big deal. “NSA malware staging servers getting hacked by a rival is not new,” he says.

But what is new is that whoever stole it is publicizing it.



posted on Aug, 17 2016 @ 03:53 PM
link   
a reply to: Vizzle

This reminds me of when they found the NSAKEY in PGP encryption.
If you downloaded and traced through the source code you could learn a lot about public key encryption.
There was a lot of code bloat in that program.

These "shadow brokers" may use some kind of public key cueing or market timing.
Is the DOD really in control of market trading?
I'll go back and reread the posts when I have time, I'm sure I've missed something.

I never figured out why Mein Kampf was so popular either?.


edit on 17-8-2016 by Cauliflower because: (no reason given)




top topics



 
25
<< 1    3 >>

log in

join