Quantcast
Channel: NATO – Lawrence van Rijn – Law Lord to be
Viewing all articles
Browse latest Browse all 51

S.P.I.D.

$
0
0

Yes, we do love our acronyms. There was SPQR (Senātus Populusque Rōmānus), there is RADAR (Radio Detection and Ranging), there is FUBAR (Fucked Up Beyond All Recognition) and my favourite SPID (Stupid people in defence). The last one gets a new level of non-intelligence when we see the BBC article ‘Nato investigates hacker sale of missile firm data’ (at https://www.bbc.co.uk/news/technology-62672184). The article alerts us to “Nato is assessing the impact of a data breach of classified military documents being sold by a hacker group online. The data includes blueprints of weapons being used by Nato allies in the Ukraine conflict.” And to show you just how stupid this is, lets take a look at ‘What did they not see?’, which I wrote on May 1st 2021. There I wrote “Ransomware gangs are now routinely targeting schools and hospitals. Hackers use malicious software to scramble and steal an organisation’s computer data”, in addition to this we have ‘Exposing lies?’ Which I wrote on July 23rd 2019. There I gave the readers “The FBI send their cyber experts and behold, they too agreed that it was North Korea. Even as we were extremely aware that they had no way of doing it, the FBI stood firm on their findings.” These elements matter. They matter because on July 30th 2021 I wrote ‘In retrospect’ where I gave the readers “It goes back when I designed an intrusion system that stayed one hop away from a router table between two points and to infect one of the routers to duplicate packages from that router on that path, one infection tended to not be enough, 2-3 infections needed to be made so that the traffic on that route between two points could be intercepted, I called it the Hop+1 solution, I came up with it whilst considering the non-Korean Sony hack. That  thought drove me to think of an approach to find the links.

So when we see ‘now’ (8 hours ago) that “The pan-European company, which is headquartered in France, said its information was hacked from a compromised external hard drive, adding that it was cooperating with authorities in Italy, where the data breach took place. It is understood investigations are centred around one of MBDA’s suppliers.” This is important because I learned basic issues like data at rest and data in movement A DECADE AGO, as such, how stupid were these people? And that is before we start digging into the ‘compromised external hard drive’ part, who got it compromised, where was IT, how did SE-Unix fail, or are these people even more stupid and they relied on Microsoft? So whilst we understand “a Nato spokesperson said: “We are assessing claims relating to data allegedly stolen from MBDA. We have no indication that any Nato network has been compromised.”” Yes, because admitting to a faulty network is a bad gig for all around. I reckon that this gets shovelled under any carpet as soon as possible, and the criminals? They get to fill their pockets. A stage that has a few issues from the get go and that is before we start digging into “Cyber criminals, operating on Russian and English forums, are selling 80GB of the stolen data for 15 Bitcoins (approximately £273,000) and claimed to have sold the stash to at least one unknown buyer so far.” There is still the issue whether the claim is true, who was the culprit and where did it all go? There are all kind of questions and that is not on the BBC or their fault. What one person claims is another person’s believe and yet another man’s doubt. But there is a rather large problem, the fact that there was an external hard drive, the fact that it allegedly was compromised implies that there are failing policies in place, there are failing IT divisions in play and there is a large amount of military IP in the open. There is a lack of questions and the fact that it is not front page news in EVERY paper is yet another matter. So when we take notice of “A former Nato official said: “There’s a lot of over-classification in Nato but these labels matter. They are applied by the originator of the information and NATO SECRET is not applied lightly.

“This really is the kind of information Nato doesn’t want out there in the public.”” We seem to see the change of a dance, what direction and which tempo is unknown to me. It gives a speculated view that there might be additional damage, but that is speculated and in light of one compromised device the question becomes how was this one undetected for so long and whatever more could be compromised? So when you take a dab at my hop+1 solution, consider that a compromised device indicates that some people of rank in that place were especially stupid. But that could just be me and I merely wonder how the relationship of mundane workers at place X versus the amount of SPID’s in that place becomes an interesting investigation. Merely because there are a whole range of players who would want that data and they are all willing to pay, so these hackers could end up with 10-50 times what they have now. 

Enjoy the day!


Viewing all articles
Browse latest Browse all 51

Latest Images

Trending Articles





Latest Images