I don't actually know what conclusions to draw, but it's notable that the major insider threat common denominator is contractors.https://twitter.com/glubold/status/915982828583522304 …
-
-
Replying to @Susan_Hennessey
Is that bc of 1) security at contractor locations 2) different clearance process 3) reliance on contractors for hacking?
3 replies 1 retweet 9 likes -
Replying to @emptywheel
I honestly don't know. Some combination of those, plus cultural factors, time/billing expectations, technical security standards?
4 replies 0 retweets 6 likes -
Replying to @Susan_Hennessey @emptywheel
but lots of those contractors are on-site. One thing that does differ is lag time for contractor polys.
2 replies 0 retweets 3 likes -
Replying to @charlie_simpson @emptywheel
True, though they use laptops and move between sites/networks more often than USG.
2 replies 0 retweets 1 like -
Replying to @Susan_Hennessey @emptywheel
I don't ever remember seeing a laptop in a SCIF, but sure.
3 replies 0 retweets 0 likes
Right: the CIA ones were unclassified, but used for hacking. https://www.emptywheel.net/2017/03/11/password-0sbpss/ …
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.