Stack of Money
Chris Vickery from Upguard found an Army Amazon Web Services instance with no password or encryption, containing 100GB of data on a defunct NSA program called Red Disk.
Red Disk was to have been a cloud system for the NSA to use to coordinate battlefield intelligence. The Agency spent more than $93 million on the program before the Pentagon pulled the plug. Nothing of any value was salvaged from that $93 million investment.
While Red Disk never came to be and the existence of its files online mostly serve as a reminder of the program’s failure, it remains troubling that the program was exposed in a server that had no protection and allowed anyone who found the domain where it was hosted to view it.
Documents contained within the Red Disk cache also contained sensitive information, including private keys used for the system to access other servers maintained by the intelligence community. The keys belonged a Invertix, a third-party firm that worked with INSCOM to develop Red Disk.
The NSA, INSCOM and Invertix—now Altamira Technologies—have yet to acknowledge or comment on the public-facing server.
Army Spent $100 Million On Intelligence System It Never Used, NSA Leak Says
[AJ Dellinger/IB Times]
(via Naked Capitalism)
(Image: Damian Gadal, CC-BY)
View this post on Instagram sorry for posting my face twice in a row but here’s an old one that seems relevant rn 💅 A post shared by Aiden :) (@aidenarata) on Mar 24, 2020 at 4:49pm PDT Image via EFF / Flickr (CC 2.0)
In the 1970s, the Soviets managed to intercept top secret communications in the US embassy in Moscow and nobody could figure out how. While an antenna was eventually found hidden in the embassy’s chimney, it took years to determine how what data was being collected for transmission and how. As a last resort, all equipment […]
The Cyber Independent Testing Lab is a security measurement company founded by Mudge Zadko (previously), late of the Cult of the Dead Cow and l0pht Heavy Industries and the NSA's Tailored Access Operations Group; it has a unique method for assessing the security of devices derived from methods developed by Mudge at the NSA.
For all their amazing growth over the past 25 years, the most impressive thing about the monumental rise of Amazon might be the speed and sophistication of their lightning-fast delivery network. Sometimes it doesn’t even take 24 hours for the idea you ordered to be perched right on your front porch, ready for use. The […]
You could actually watch a Tyrannosaurus Rex walk down your street right now. And no, this isn’t the latest Jurassic Park sequel. Of course, it isn’t real either, just a Google recreation of some pretty realistic looking dinosaurs transplanted right into any environment around you courtesy of augmented reality. Yet it’s just another example of […]
A guy on the Apple discussion forum started a thread titled, “Why do your Charger Cables have the lifespan of a housefly?” That question is probably enough to elicit a whole bunch of head nods from virtually everyone reading this, whether you’re an iPhone user, an Android owner or have virtually any device that needs […]