So NSA hacker left toolkit laying around. NSA scanned Internet, didn't see anyone using tools, so didn't tell cos.http://www.reuters.com/article/us-cyber-nsa-tools-idUSKCN11S2MF …
-
-
.
@emptywheel Or I was thinking he did go back, but toolset wasn't there any longer. Oops! -
In which case you'd think NSA would be like ALERT ALERT.
-
.
@emptywheel Which brings up question of how did NSA learn toolkit had been snatched. If no Internet usage detected, remote computer traced? -
.
@emptywheel@csoghoian Also brings up how did hackers learn of remote computer among billions in world? Implications: A Really Big Reveal! -
.
@emptywheel@csoghoian 1) Learned of NSA's "sensor tuning" via AT&T's Mark Klein reveal of Narus STA 6400 "Semantic Traffic Analyzer" use. -
.
@emptywheel@csoghoian 2) More then revealed from Snowden NSA docs about "selectors" described as email addresses, phone numbers. -
.
@emptywheel@csoghoian 3) Reuters piece now implies NSA "selectors' can also be code vectors used to target remote computers. -
That is presumably how they use(d) upstream for cyber.
@csoghoian
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.