This week the Internet’s all aflutter with the latest NSA disclosures over their uber-hacking group – the Office of Tailored Access Operations, or “TAO” for short. Der Spiegel’s NSA articles of yesterday reveal some of the inner workings of the TAO team and their tools. It’s pretty interesting stuff, and I’m sure the legacy conspiracy nuts are trading in their tinfoil hats for “I told you so” t-shirts today.
As more details leak about the 50-page catalog of hacking goodies that the NSA, CIA, FBI, DHS, etc. government entities could purchase for “lawful intercept” work, I get the feeling that a lot of product managers at the vendors for which these tools exploit vulnerabilities or frailties in their products will be a little wobbly in the knees department right about now. I suspect that there will be plenty of additional discussion in the coming months about the “lawful” part of the lawful intercept concept too.
In many ways TAO reminds me of a digital “Q” branch from the Ian Fleming’s James Bond series. I can just imagine a grey-mustached Q handing out USB dongles with embedded wireless transmitters to go with the Omega watch with the laser, or the exploding pen.
In light of the recent revelations, it would seem that the NSA TAO team has been very successful in completing their objectives. I suppose it’s quite refreshing to know that at least one part of the US Government is capable and functioning as it’s supposed to?
While this glimpse in to the shadowy world of modern spying and espionage is as exciting as cut-scenes from an upcoming James Bond movie, I don’t believe that it changes the paradigm that much. These are simply the tools of the trade for the cyber domain. In fact the tools that have been disclosed thus far are already close to a decade old – and clearly been in service for some time. Anyone who’s attended a Blackhat conference in the last ten years would be familiar with all the concepts and attack vectors. What makes it different is how the NSA has successfully made the leap from theory to reality; clearly having a sufficiently sized budget makes that leap much easier.
Of the documents produced thus far, the most surprising revelations to me have been about how small the TAO team is, and the proportion of which are civilian contractors. Given the size and budget of the DoD (and NSA in particular), how advanced their adversaries are, and how successful they appear to have been in their missions, I’d have expected the team to be five to ten times the size. Perhaps the absolute numbers get a bit fuzzy when it comes to the civilian contractors… and the contracting firms they belong to.
It is inevitable that many people are going to be upset with the NSA’s newly disclosed capabilities. Those previously mentioned vulnerable vendor product managers are probably working with their marketing and PR teams right now crafting indignant responses to the US government, whilst seeking to calm customer fears that their companies hadn’t been negligent in dealing with the vulnerabilities they knew about, and have never knowingly placed backdoors into their products (all of which could get a bit hand-wavy in the case of RSA and the $10m they supposedly received for weakening random number generators).
While many likely also fear that the NSA is out of control and needs to be reeled in through new legislative restrictions or the honing of existing laws – and I’m sure that much of the software industry is allocating additional funds to lobby against the hacking of their products – I think it is critical that folks take a step back and look around. The last six months of NSA leaks have certainly dumped a lot of the agencies dirty linen on the pavement, but let’s be clear – the NSA (and by default, the US Government) aren’t the only the only countries to have invested in these kinds of cyber spying and espionage tools. I think you’d be hard pressed to find a country that isn’t already doing it. If you’re thinking that Pakistan’s ISI isn’t spying on India and exploiting their computer vulnerable systems, or that France’s DGSE isn’t doing the same to Chinese systems in Central Africa, then let me tell you about a bridge I’d like to sell you.
My fear is that the reaction to all these NSA disclosures will have legislators and committee’s curtailing many vital parts of the NSA’s capabilities – leaving the US high and mighty on the ethical front, but shackled and third-rate in areas of statecraft and cyber security.
In the meantime, if Q has a few of those Omega laser watches spare, I wouldn’t mind one as a late Christmas present. Ta very muchly. He can keep the Huawei backdoor – I’ve got one of those already.
— Gunter Ollmann, CTO IOActive Inc.
Article source: http://www.darkreading.com/attacks-breaches/nsas-tao/240165059