Archive for June 2010
Gregory? Gregory D #LIGATT Evans? Is That YOU?
Interesting saga here.
But has anyone here tried their products? I looked at their website and I must admit, I was interested in the prank call one and the PC locater for laptops.
The author claims Ligatt’s products are “snake oil” but he says nothing about the actual products. Do they work?
Their website looks nice enough.
Dear Gregory.. Oh, I mean “Joshua” *wink wink nudge nudge* No, the tools do not work. Nor does your ham fisted attempt at making good press for yourself by posting this comment on my blog. Your tools do not work and they have been tested by Exotic Liability as well as myself and others.
I would also like to remind you about the NUMEROUS vulnerabilities on your sites that really, any security professional would not allow to exist on their personal, never mind their corporate sites. So why even bother me with your short bit of drivel that passes as the WEAKEST attempt at DAMAGE CONTROL here?
Face it man, you are NOT a hacker nor have you EVER been anything like one. What you have been is a CON MAN and a FARCE.
Why won’t you just go away? I mean, we all have pretty much proven everything here..
- You’re a plagiarist
- You’re a liar
- You’re a con man who works mostly long cons
- You’re a lackluster social engineer (see above aforementioned ham fisted attempt ala blog reply)
- Your stock has not gone anywhere and your aspirations of big bucks on a short penny stock pump and dump are over
- You can’t even hide your own tracks when trying to post allegedly under assumed names?
EVER HEARD OF A PROXY YOU MORON?
Obviously…Not…
Just go away will ya? It’s over man… Go find another con to run because you are messing with the wrong folks here..
I will leave you with this parting bit of wisdom…
“Do not meddle in the affairs of hackers… For they are subtle and quick to temper”
CoB
Служба Внешней Разведки: Russian Espionage “The Illegals 1990-2010”

Служба Внешней Разведки
“Christ, I miss the Cold War”
M from Casino Royale
The dramatic events unfolding within the last day or so over the “illegals” program caught by the FBI is really the stuff of Le Carre and other writers of espionage fiction. Yet, this is all real….
The reports started coming out yesterday afternoon and having seen a blurb on CNN I went out and got a hold of the complaint by the Federal government against the 10 conspirators and had a sit down. In the end I found myself alternately laughing at the story that unfolded as well as waxing historical about yesteryear during the cold war days. It seems though that one thing has changed a bit since the old days.
Millennial Spies?
It seems the SVR had to remind their operatives that they were in fact here for a reason and being taken care of for that reason, i.e. being spies.
This communique pretty much alludes to the fact that perhaps the “illegals” had been here too long and had begun feeling entitled as opposed to being servants of the state. This is a bit of a difference from the old cold war days. Yes, of course some deep cover operatives might have become “comfortable” in the west, but, they pretty much lived under the fear of reprisals to themselves and family in the old country if they misbehaved. This message and some of the handling that can be seen from the surveillance bespeaks a more millennial attitude by these illegals than old school Sov operatives. in one case an officer remarks that he is glad not to be one of the illegals handler as he is bitching about money… Kinda comical…
It also seems to me that some of these operatives were in fact quite young when they started and even as things progressed, were not as well trained as they could have been. In one case there is a remark of only about 2 weeks of training at the SVR center, and this is not quite like the old days when the spooks got some serious training before going out in the field. Of course today, post the 1990’s break up of the Soviet Union, I suspect that in some of the minds at “C” we (FBI) have become lax at detection and operations just because we were very Sov oriented back in the cold war period.
However, this group of illegals seems to have been in play since the late 90’s and over time, have become more American than true blood Russian idealogs. With the amounts of money being passed to them over the years, these folks were rather well taken care of. This is something a bit different from the old days and bespeaks a paradigm shift in the SVR’s handling of them and approaches to getting good INTEL out of them. These folks were monetarily motivated which is usually how spies get brought in from other nation states, not the ones being sent to foreign posts by the motherland.
Times are a changing though… Guess you have to roll with it or lose assets.
Technology and OPSEC
The times have changed and with them the technologies of spy-craft do too. In the case of the illegals not only did they engage “AD HOC” wireless networks between laptops in open spaces (ballsy really given the nature of WIFI 802.11 standards and vulnerabilities) but also with the addition of things like the use of “Steganography
For some time now I have been randomly hoovering sites looking for stegged images and so far, I have come up with potential hits (Jihadist sites) but as yet, I haven’t been able to decrypt anything that is alleged to be hidden. In the case of the illegals, they had special software installed on laptops given to them by Moscow Centre. It turns out that these laptops and the schemes that they were using didn’t always work for the agents but, in many cases, had it not been for the surveillance by the FBI, this particular method of data passing might not have been seen.
Overall, the technology today is neat but as in the case of the AD HOC networking over WIFI, I have to wonder about their choice here. I mean it wasn’t all that long ago that the CIA had a fiasco wth a “WIFI” enabled faux rock in a park in Moscow. The rock was supposed to be able to transfer data onto a CF type card from a PDA or phone that the asset would pass by. As the technology failed, the KGB noticed that there were people wandering around looking to connect to this rock. When they did a search they got the rock and later the asset trying to connect to the faulty device. So much for the technological approach.
When it works it works great.. When it fails, you end up in Lubyanka…
Tradecraft: Tried and True
Meanwhile, some of the illegals seem to have perfected the tradecraft side of the work by performing brush passes with operatives from the Russian consulate as well as infiltrate and exfiltrate out of other countries using bogus passports etc. It seems that perhaps though, that the FBI caught on to the group however and exploited poor tradecraft practices to catch onto the whole of the operation. In one case the handler from the consulate took 3 hours of evasion practices to elude any possible surveillance only to be compromised by the fact that the “illegal” already was under surveillance… OOPS.
The meetings that are mentioned in the complaint though show how much tradecraft the group was using to perform their meetings. These included marking, dead drops, and of course the brush passes with pass phrases like “Didn’t I meet you in Bangkok in 1990?” So those of you who think that its just cliche, its not really… Even in todays technological world these practices are kept up BECAUSE the technology is so easily watched from remote ala the NSA. Of course it was that technological FAIL along with the poor practices of basic information security that caught them in the end.
Kinda funny really.. I mean how often do I moan and wail about all of this huh and here it is that very thing that pops a group of spies for Russia.
Funny…
Meanwhile some of the “old school” techniques still pervade…
Numbers Stations and Rapid Burst Transmissions Making a Comeback
When some of the houses/apartments were black bagged, the operatives found that the illegals were not only using “rapid burst” radio technology, but also the old old school technique of “Numbers Stations” to get their orders as well as report their data to Moscow Centre. I imagine that in the case of the rapid burst technology, they were in close proximity of either other operatives that they did not know about, or they were in fact close enough to the consulates that they could burst their data to their arrays on the roof.
This stuff is really old school and I have mentioned before that the number of “numbers” stations has increased over time since the internet age took over because this technology, properly implemented, is sure fire and hard to detect. After all, how many of us have short wave radios in their homes huh? The burst technology though is a little more circumspect and can be detected, but since it has not been in vogue for some time, I doubt many agencies are looking for it. Perhaps a HAM radio operator in the area might have picked up on it but it was the surveillance team that mentions “noise” that seems to be radio transmissions.
It just goes to show that sometimes the new tech just doesn’t cut it. You need to go old school.
Espionage 2010, Pooty Poot, The Bear Never Left
In the end, I expect to be hearing more about this story in the news. There will likely be the expuslions of diplomats from the Russian consulates in the US as well as the ongoing coverage of the trials. What I am wondering about though is that the FBI charged these guys with smaller charges rather than official “espionage”
This makes me think that there is much more to this tale behind the scenes that we will eventually get in dribs and drabs. I personally think that the illegals that we caught really made a dent in the security of the nation. The complaint does not mention any high level connections that would be bad enough to consider this operation as a whole to be damaging. However, if the group is in fact bigger or as we know, there are others out there, just who have they compromised? Remember that in the complaint you can see Moscow Center asking about compromisable assets. What they really wanted was to go old school and get the dirt on someone juicy and turn them… and given Washington’s habit of nasty behavior with pages or toe tapping in airport mens rooms, I can see they had a rich target environment.
All of this also makes it so ironic that the operation had been ongoing since at least the Clinton administration. When “W” looked into the soul of Pooty Poot, he wasn’t in fact seeing anything there. George, he was PWN-ing you as you gave him the reach around.. and liked it. The Bear never left my friends and anyone who thought we were all friends with rainbows and puppies where Russia was concerned is seriously deluded.
The only thing that has changed is that the American conciousness became… Unconcious to conspicuous wealth and reality TV.
I too pine for the cold war…Looks like its back on.
So in conclusion here are some questions that I have:
- Why was this operation rolled up now?
- How did the FBI catch on to these illegals?
- Who is “FARMER”
- Who is “PARROT”
- Why the charges of not telling the AG that the illegals were.. well illegal and not actually charged with “espionage”
- Why did “C” want the operatives to buy ASUS EEE PC’s?
- What steg program did they have?
- When will we be expelling the 3 consulate “secretaries” in NYC?
You can read the “almost full” complaint here
CoB
Napolitano: Internet Monitoring Needed to Fight Homegrown Terrorism
Napolitano: Internet Monitoring Needed to Fight Homegrown Terrorism
Published June 18, 2010
|Associated Press
WASHINGTON — Fighting homegrown terrorism by monitoring Internet communications is a civil liberties trade-off the U.S. government must make to beef up national security, the nation’s homeland security chief said Friday.
As terrorists increasingly recruit U.S. citizens, the government needs to constantly balance Americans’ civil rights and privacy with the need to keep people safe, said Homeland Security Secretary Janet Napolitano.
But finding that balance has become more complex as homegrown terrorists have used the Internet to reach out to extremists abroad for inspiration and training. Those contacts have spurred a recent rash of U.S.-based terror plots and incidents.
“The First Amendment protects radical opinions, but we need the legal tools to do things like monitor the recruitment of terrorists via the Internet,” Napolitano told a gathering of the American Constitution Society for Law and Policy.
Napolitano’s comments suggest an effort by the Obama administration to reach out to its more liberal, Democratic constituencies to assuage fears that terrorist worries will lead to the erosion of civil rights.
The administration has faced a number of civil liberties and privacy challenges in recent months as it has tried to increase airport security by adding full-body scanners, or track suspected terrorists traveling into the United States from other countries.
“Her speech is sign of the maturing of the administration on this issue,” said Stewart Baker, former undersecretary for policy with the Department of Homeland Security. “They now appreciate the risks and the trade-offs much more clearly than when they first arrived, and to their credit, they’ve adjusted their preconceptions.”
Underscoring her comments are a number of recent terror attacks over the past year where legal U.S. residents such as Times Square bombing suspect Faisal Shahzad and accused Fort Hood, Texas, shooter Maj. Nidal Hasan, are believed to have been inspired by the Internet postings of violent Islamic extremists.
And the fact that these are U.S. citizens or legal residents raises many legal and constitutional questions.
Napolitano said it is wrong to believe that if security is embraced, liberty is sacrificed.
She added, “We can significantly advance security without having a deleterious impact on individual rights in most instances. At the same time, there are situations where trade-offs are inevitable.”
As an example, she noted the struggle to use full-body scanners at airports caused worries that they would invade people’s privacy.
The scanners are useful in identifying explosives or other nonmetal weapons that ordinary metal-detectors might miss — such as the explosives that authorities said were successfully brought on board the Detroit-bound airliner on Christmas Day by Nigerian Umar Farouk Abdulmutallab. He is accused of trying to detonate a bomb hidden in his underwear, but the explosives failed, and only burned Abdulmutallab.
U.S. officials, said Napolitano, have worked to institute a number of restrictions on the scanners’ use in order to minimize that. The scans cannot be saved or stored on the machines by the operator, and Transportation Security Agency workers can’t have phones or cameras that could capture the scan when near the machine
Umm Janet? Yeah, uh, do you have a clue? I didn’t think so.. Would you like to buy one? Look, we all know in the infosec field that you are basically trying to dress up a massive surveillance vacuum program to look all friendly like and harmless. Just how do you propose to “monitor” all these comm’s without just setting up a huge digital driftnet like the NARUS systems in the MAE’s?
We already monitor many of the jihadist websites and chat rooms etc now, so what else would you suggest we do to catch these guys? The only thing I can think of would be to have a searchable (on the fly) database of emails, chats, and all other communications online captured by something like the NARUS STA6400 or its progeny. Something that would just be doing a DPI type of inspection process of ALL traffic to flag for an analyst to look at and pass on.. Gee.. Where have I heard that before.. Hmm ECHELON perhaps? C’mon! This has been being done by the NSA for YEARS!
I have an idea.. Why don’t you call Fort Meade huh?
Here.. I have the phone number for you: 410-674-7170 Ask for DIRNSA.. Phonetically DUR-N-SA
Maybe they can lead you to understanding of the problem and the solution.. A solution they already have and I am sure are NOT willing to share with you.. But, you can at least try.
Frankly, I fear that you Janet, and the DHS, are clearly incompetent in the field of INFOSEC/HACKING/CYBERSEC as well as do not have a mandate, funding, nor staff to really deal with this issue properly. So, uhh yeah, why not just forget about it? Perhaps you should just leave it up to the NSA hmm?
Oh, and yeah, I am not “for” all of this hoovering of the internet’s traffic as a means to an end on “home grown” jihad. I am instead a realist and know that this is how it is. Of course there is an immense amount of data that is passing through the internet every second of every day, so not all of the bad guys can be caught. I also know that much of that data is in the clear and is in fact our every day email that could be spied upon and we have a real privacy issue here… But, what can I do about it huh?
Well, I can at least say that lets leave it to the professionals at the NSA and not in your completely incompetent hands at DHS.
Yours,
CoB
Jihadi Hacking Tutorials: Irhabi 007’s Text and More….
I recently posted some preliminary findings on files found on Jihadist websites for hacking. Actual full tutorials on how to hack that ended up with actually useful data and tools for the jihadi’s to hack in the name of Allah. In looking at those files I also ran across a section of .pdf files that included a text, that if I read correctly, is from Younis Tsouli aka “Irhabi 007” (Terrorist 007) Like the autorun/distro like tutorials from earlier, these pdf’s run the gauntlet of current hacking attacks that are the hack-du-jour. PHP hacking, SQL, Linux/*NIX hacking, Database hacking of various kinds etc. Much of this data has been taken from other sites like MILW0RM and others, translated into Arabic with notations and put into the pdf format for dissemination on jihadi sites and or, certain Arabic hacking group sites like XP10.
With each tutorial though, the hackers had to add their own personal emails on there, so I have about 10 or so addresses to put into Maltego and Google. So far, “metoovet”, who created the tutorial on hacking that I posted about last, seems to be rather open in using his hotmail address on other sites including a business site for programming. The site is ostensibly his and via a whois I was able to get another address of his. The sum of the data points toward his being not only a hacker programmer, but he also claims to be a medical student.
Heh.
I will continue the poking about on this, but I thought these files would be interesting for you all to see. They were uploaded to the megashare a while back and I am sure have proliferated all over.
On the 007 text though, I need a good way to translate the pdf file. His stuff was pretty comprehensive too…
More soon.
CoB
Adrian Lamo: From Homeless Hacker to Lamer?
From the Sacramento Bee
On Thursday afternoon, Adrian Lamo sat quietly in the corner of a Starbucks inside the Carmichael Safeway, tapping on a laptop that requires his thumbprint to turn on and answering his cell phone.
The first call, he said, came from an FBI agent asking about a death threat Lamo had received.
The second was from a Domino’s pizza outlet. One of his many new enemies had left his name and number on a phony order.
The third was from Army counterintelligence, he said.
In other circumstances, it might be easy to dismiss his claims.
He is an unassuming 29-year-old who lives with his parents on a dead-end street in Carmichael and was recently released from a mental ward, where he was held briefly until doctors discovered his odd behavior stemmed from Asperger’s syndrome.
On Thursday, he was dressed in black. A rumpled sport coat covered his bone-thin frame, and a Phillips-head screw pierced his left earlobe – a real screw, not an ear stud made to look like one.
He spoke slowly and methodically, sounding almost drunk, a side effect of medication he takes to treat Asperger’s, anxiety and his rapid heartbeat.
But Lamo is the most famous computer hacker in the world at the moment, the subject of national security debates and international controversy – and a target of scorn in the hacker community that once celebrated him.
He first gained notoriety in 2003, when he was charged with hacking into the New York Times computer system, essentially just to prove he could.
“I just wanted to see what their network was like,” he said. “It was going to be the Washington Post, but I got distracted by a banner ad.”
He has re-emerged in the spotlight following his decision last month to tell federal agents he had reason to believe an Army private in Iraq was leaking classified information. He said the information was going to WikiLeaks.org, a website based in Sweden that publishes information about governments and corporations submitted by anonymous individuals.
The soldier, Pfc. Bradley Manning, a 22-year-old intelligence analyst who was stationed near Baghdad, is reportedly being held by the Army in Kuwait while the case is investigated.
Lamo said Manning contacted him online after reading a profile of him on wired.com, which first reported Manning’s arrest and Lamo’s involvement last Sunday. Manning, he said, bragged about leaking classified military information to WikiLeaks, including the so-called “Collateral Murder” video of a U.S. helicopter attack in Baghdad that killed several civilians in 2007. That video appeared on WikiLeaks in April.
Lamo said Manning also claimed to have leaked other materials to the website, including 260,000 U.S. classified diplomatic cables.
“I couldn’t just not do anything, knowing lives were in danger,” Lamo said. “It’s classified information, and when you play Russian roulette, how do you know there’s not a bullet in the next chamber?”
Full article HERE
Adrian Lamo, a name that in the hacker community for a while, was a zeitgeist for the altruism of hacking in the original sense. He popped into systems and networks with only a web browser and told the companies he had compromised in an effort to secure them. Frankly, the recent diagnosis of Aspergers makes a lot of sense to me and likely to others who have met him or know of him by watching him. He has an interesting personality that borders on the strange and Aspergers may well explain his focus on such minutiae as he has shown up with in his hacks.
With the events of late regarding his turning in the alleged source for Wikileaks, there has been a fair bit of loathing on the part of the hacker community against Lamo and I for one think that he did the right thing. Look, this guy Manning has yet to be shown to be a Daniel Ellsberg here. Daniel released data that unequivocally showed that our government was lying to us about Viet Nam. Perhaps some of what Manning was seeing was on par with that, but, he went to Wikileaks instead of say the New York Times with his allegations. In fact, I have not heard anything substantive out of Manning that would lead me to believe that he is anything more than a hacker wannabe or.. Just someone craving attention. The mere fact he went to Lamo on this show’s more about his motives than anything else.
If you look at the chat transcripts there is no real sense that this guy was looking to put an end to conspiracy as much as get Lamo to like him… Simple as that I think. So, what Lamo did was in my mind right. He reported the potential for large leaks of cables that could blow NOC agents all over the world potentially as well as place our diplomatic aspirations globally at risk. Who knows what else might have been given to Wikileaks and or may be out of pocket elsewhere thanks to Manning. The damage could be long in coming and severe really and Lamo could see that. Not to mention that he knew enough that now he was a party to treasonous acts and could by just knowing of it, be a co-conspirator had he not reported. If he thought he knew the dark side of the judicial system before with the Grey Lady incident, he certainly could fathom what would happen to him on treason charges.
So, all the hacker kiddiez out there.. Leave him alone. He actually did the right thing here. Cut out the death threats and all the BS that certainly is going to go on… Especially at DC18 I am sure he will get some negative attention because many of the hacker types are childish narcissists to start. Its time to grow up.
Now, with all that said, should there have been some epic malfeasance on the part of the government along the lines of the Pentagon Papers, then I would understand in passing such data to the Times or perhaps even to Wikileaks. However, without there being confirmed actions on the part of our government, I cannot agree with what has happened. Yes, the footage that came out and the subsequent recognition that civilians in a war zone were killed by US forces fire is bad and perhaps there was some attempt at covering up, it does not merit the continued and further exploitation of all data at the hands of this guy.
For an analyst he sure wasn’t analyzing the data. I guess that some of this all will come out eventually if there is a trial that can be reported on by the press. Though, likely it will not as everything is classified.
What may be more telling is that what Manning did was so easily done with SIPRNET systems and alleged compartmented data. Once again, the measures that the military had taken, even with the assumption of “trust but verify” were clearly not being carried out here. I have heard the stories before and seen the fall out from processes not being followed where security is involved not only in the military area, but in every day corporate life. If you fail to carry out your basics of OPSEC and INFOSEC, then you FAIL epically to retain your data security.
Bad on the military here.
In any case, Lamo did the right thing either for his own skin’s safety or a real sense of just how far reaching the damage could be to this country. As well, this incident may actually get him closer to being a truly functional member of the security community.
Well done.
CoB
Jihadi Penetration Tutorials: Metoovet
Recently I have been writing some about the tools and methods that the “hackers” on the jihadi boards have been using and promoting. Until now these tools and techniques have been mainly “Windows” centric and a bit behind the times. This however changed today when I found a new section that I had not looked into before.
Evidently, Sword Azzam, is now offering a new tutorial series “metoovet” put together by an islamist hacking group “xp10” whose site resolves to:
Registrant:abdulaah alzhraniksajeddah, 123456Saudi ArabiaRegistered through: GoDaddy.com, Inc. (http://www.godaddy.com)Domain Name: XP10.COMCreated on: 20-Apr-03Expires on: 20-Apr-11Last Updated on: 03-Jun-10Administrative Contact:alzhrani, abdulaah x25x@x25x.netksajeddah, 123456Saudi Arabia+966.555555555 Fax —Technical Contact:alzhrani, abdulaah x25x@x25x.netksajeddah, 123456Saudi Arabia+966.555555555 Fax —Domain servers in listed order:NS57.1AND1.COMNS58.1AND1.COMRegistrant: abdulaah alzhrani ksa jeddah, 123456 Saudi Arabia
Registered through: GoDaddy.com, Inc. (http://www.godaddy.com) Domain Name: XP10.COM Created on: 20-Apr-03 Expires on: 20-Apr-11 Last Updated on: 03-Jun-10
Administrative Contact: alzhrani, abdulaah x25x@x25x.net ksa jeddah, 123456 Saudi Arabia +966.555555555 Fax —
Technical Contact: alzhrani, abdulaah x25x@x25x.net ksa jeddah, 123456 Saudi Arabia +966.555555555 Fax —
Domain servers in listed order: NS57.1AND1.COM NS58.1AND1.COM
The tutorial set not only has teaching materials and how to’s but also full tar files of more exotic hacking programs that you would find in the hands of a more technical hacker. This is the firs time I am seeing this and after having gone through the files, I am somewhat impressed with the package. These guys are the real deal.
The package is fully integrated with a nice little front end and even a music track. The range of hacking goes through *NIX, PHP, IIS, and on with the how to’s and even a test case to try for yourselves.
All in all, this and other packages suddenly have appeared and I am seeing a real change in the tenor of the site’s technical area. It would seem that the XP10 folks and some new entries from Palestine have brought some new blood. If these guys are indeed learning and able, they may be a bit more of a threat to the internet.
Also included within the discussion group and files I found a whole series that was written by Younis Tsouli aka Irhabi 007. I have mentioned him before and it seems by the looks of the comments that the jihadi’s have not forgotten him either. My fear is that these guys R3P, and Azzam with the help of the guys at xp10 might just fill the shoes of the former irhabi. If that is the case, and they get a real base of ‘hackers” behind them, then we could be seeing more problematic hacks and data ex-filtration.
We shall see…
I will be pulling all of this apart and performing some forensics on the files, which there were many more of than this particular tutorial series. Additionally, there are a plethora of sites within these documents that I will be spidering out to and rooting around in. I think I will be pretty busy in the near future.
CoB
A Primer on Situational Awareness
STRATFOR/Scott Stewart, 20 June 2010: The world is a wonderful place, but it can also be a dangerous one. In almost every corner of the globe militants of some political persuasion are plotting terror attacks — and these attacks can happen in London or New York, not just in Peshawar or Baghdad. Meanwhile, criminals operate wherever there are people, seeking to steal, rape, kidnap or kill.
Regardless of the threat, it is very important to recognize that criminal and terrorist attacks do not materialize out of thin air. In fact, quite the opposite is true. Criminals and terrorists follow a process when planning their actions, and this process has several distinct steps. This process has traditionally been referred to as the “terrorist attack cycle,” but if one looks at the issue thoughtfully, it becomes apparent that the same steps apply to nearly all crimes. Of course, there will be more time between steps in a complex crime like a kidnapping or car bombing than there will be between steps in a simple crime such as purse-snatching or shoplifting, where the steps can be completed quite rapidly. Nevertheless, the same steps are usually followed.
People who practice situational awareness can often spot this planning process as it unfolds and then take appropriate steps to avoid the dangerous situation or prevent it from happening altogether. Because of this, situational awareness is one of the key building blocks of effective personal security — and when exercised by large numbers of people, it can also be an important facet of national security. Since situational awareness is so important, and because we discuss situational awareness so frequently in our analyses, we thought it would be helpful to discuss the subject in detail and provide a primer that can be used by people in all sorts of situations. . . . .
OPSEC: It’s analogous to the topic above from Sratfor. I have lamented many times over the issues concerning OPSEC and general IT security issues within companies such as that which shall not be named *but you know who you are.. and your logo should not be an eagle, instead perhaps an ostritch might be more apropriate*… but I digress… Where was I, oh yes, OPSEC and YOU.
Situational Awareness is a part of OPSEC, in fact, I would dare to say that it is the basic core of OPSEC. If you don’t know the variables of danger in your environment and you are not paying attention, then, well you get hacked in IT and in real life situations, you get dead potentially. Its all about seeing the dangers, even the ones that are not so obvious such as a tiger sitting next to you looking real hungry like and growling. It is my basic contention though, that since we left the ancient savanna and urbanized everything we have lost the ability to see danger very well. Especially long term danger.
On the face of it you have several levels of awareness to understand and cogitate.
1) Immediate dangers like the tiger
2) Middle term dangers that are likely given the situation
3) Exotic dangers that seem too inconceivable for many to act on
In our daily lives we have all of these in our environment. The situational awareness that Stratfor is talking about is the immediate danger. It is unfortunately becoming more common now that there is a possibility that any one of us could be bombed by a jihadist. Just going to work if you live in a city gives you more potential statistically to be a target, but, we still go on about our business and sometimes do not pay attention to what is going on around us. Something that we need to do even if we aren’t a target of a terrorist. Often though, we are in our own little digital iPhone/iPod worlds and oblivious.
Now, I am not saying to be a quivering mass of senses and nerves always looking for terrorists or dangers at each corner, but, I am saying “Pay Attention” if you really look, you might see something that could help you or others.
It was such awareness that stopped Shazhads little exploit from actually catching on to real fire as opposed to exploding. The vendor near the car saw the smoke and called the cops. He did not however, really take note of the driver, nor the fact he had parked the car illegally etc… Or if he did, it was nothing “unusual”
Long term dangers and those exotic ones, well, these are something different. However, in the IT world, they are rooted in very BASIC tenets of security that if paid attention to, could be DENIED to the would be attackers. Things such as:
- Don’t give out too much information on social networking sites
- Don’t write your passwords on post its and leave them laying about
- Same goes for passwords and other data on a PC/Mac/PDA/Phone Encrypt them!
- Don’t twitter or facebook you are going on vacation or leaving the house for X amount of time.. Hello burglars! I am GONE! COME ON IN!
I could go on, but I think you get the point. Unfortunately, in the corporate world, these things still just don’t get thought through or acted on.
- It’s too hard to encrypt our data!
- It’s too hard to teach users to be secure!
- It’s too costly to implement security!
- Passwords with too many characters are HARD to remember! (9 chars? Really? How do you remember your fucking names?)
All of these things are basic tenets of OPSEC and you have to be SITUATIONALLY AWARE to understand and to be PROACTIVE about fixing issues.
WHY OH WHY DID WE GET HACKED?
“Your government failed you.. They did not connect the dots”
We are awash in a sea of data… One need only be aware of it to act accordingly.
CoB