Years of American efforts to portray the NSA as so far advanced above other hacking organizations as to be practically untouchable are taking a serious blow over yesterday’s announcement of a substantial collection of their cyber weapons being seized by a group calling itself the Shadow Brokers, and WikiLeaks’ confirmation they have the same files.
Experts in the field increasingly agree that the NSA code is absolutely authentic, with top cybersecurity company Kaspersky Lab confirming 347 instances of encryption within the leaked files using a technique heretofore only seen in NSA code.
Former NSA employees are also confirming the authenticity of the documents, terming them “the keys to the kingdom,” and warning that their release would dramatically undermine the security of major government and corporate networks the world over.
It might have the opposite effect in the long run, however. The NSA is known to be conducting wholesale surveillance across the planet, the leak of this trove of files could reveal the exploits they are using to do so, and set the stage for a dramatic leap forward in network security, closing decades of security flaws which the NSA was desperate to keep unfixed.
This stuff needs to be open sourced now. It even deserves its own URL: shithub instead of github!
This is the biggest problem with the new NSA Superstore in Utah. One stop shopping for all your hacking needs. Bust into one place and you have access to anything and everything. In days gone by people were warned this is a bad idea by using the phrase, “don’t put all your eggs in one basket”. Of course we’ll be told that “no one could have foreseen this”. Bull, only those blinded by their own arrogance and hubris failed to see it. These people are too smart by half.
I am sure this team and agency within the U.S. government had absolutely no role in this leak and breach. Sarv/off!
Aug 4, 2016 – DARPA’s Cyber Grand Challenge: Competition Framework Team
Astrophysicist and Cyber Grand Challenge Host Hakeem Oluseyi talks to the CGC’s Competition Framework Team about their role in designing the space in which the CGC is executed and scored. They also discuss the impact the CGC is expected to have, speeding the development of automated cybersecurity.
https://youtu.be/2KVDsiKzOIk