Metalworking (rec.crafts.metalworking) Discuss various aspects of working with metal, such as machining, welding, metal joining, screwing, casting, hardening/tempering, blacksmithing/forging, spinning and hammer work, sheet metal work.

Reply
 
LinkBack Thread Tools Search this Thread Display Modes
  #1   Report Post  
Posted to rec.crafts.metalworking
external usenet poster
 
Posts: 992
Default NSA Planned to Hijack Google App Store to Hack Smartphones

On Thursday, May 21, 2015 at 8:33:54 AM UTC-4, raykeller wrote:
http://www.freerepublic.com/focus/f-news/3292046/posts

NSA Planned to Hijack Google App Store to Hack
Smartphones



" [Army General] Keith Alexander's Unethical Get-Rich-Quick Plan " by
Conor Friedersdorf | Jul 31, 2014 | The Atlantic Magazine

Lots of government officials have found ways to monetize public service in the private sector, but none more audaciously than the former head of the NSA

Keith Alexander is trying to explain himself. The former director of the NSA stoked astonishment when reports surfaced that he would ask from $600,000 to as much as $1 million per month as a cybersecurity consultant. What could make him so valuable, save the highly classified secrets in his head? A congressman went so far as to speculate that he'd be selling state secrets. But it isn't so, Alexander says. In an interview with Foreign Policy, he offers a new accounting:


The answer, Alexander said in an interview Monday, is a new technology, based on a patented and "unique" approach to detecting malicious hackers and cyber-intruders that the retired Army general said he has invented, along with his business partners at IronNet Cybersecurity Inc., the company he co-founded after leaving the government and retiring from military service in March. But the technology is also directly informed by the years of experience Alexander has had tracking hackers, and the insights he gained from classified operations as the director of the NSA, which give him a rare competitive advantage over the many firms competing for a share of the cybersecurity market.

Details on the "unique approach" are thin, but it wouldn't surprise me if Freedom of Information Act requests are already being prepared to send to the U.S. Patent Office:


Alexander said he'll file at least nine patents, and possibly more, for a system to detect so-called advanced persistent threats, or hackers who clandestinely burrow into a computer network in order to steal secrets or damage the network itself.

As FP notes, these are the sorts of "cyberattacks" that Alexander harped on while in government, claiming they already represented "the greatest transfer of wealth in American history."

Let's mull that over. While responsible for countering cybersecurity threats to America, Alexander presides over what he characterizes as staggering cyber-thefts and hugely worrisome security vulnerabilities. After many years, he retires. And immediately, he has a dramatically better solution to this pressing national-security problem, one he never implemented in government but plans to patent and sell!

FP's Shane Harris talked to some lawyers and reports:


Alexander is believed to be the first ex-director of the NSA to file patents on technology that's directly related to the job he had in government. He said that he had spoken to lawyers at the NSA, and privately, to ensure that his new patents were "ironclad" and didn't rely on any work that he'd done for the agency--which still holds the intellectual property rights to other technology Alexander invented while he ran the agency.

Alexander is on firm legal ground so long as he can demonstrate that his invention is original and sufficiently distinct from any other patented technologies. Government employees are allowed to retain the patents for technology they invent while working in public service, but only under certain conditions, patent lawyers said. If an NSA employee's job, for instance, is to research and develop new cybersecurity technologies or techniques, then the government would likely retain any patent, because the invention was directly related to the employee's job. However, if the employee invented the technology on his own time and separate from his core duties, he might have a stronger argument to retain the exclusive rights to the patent.

This is an emperor-has-no-clothes moment. We're supposed to believe that Alexander went home and developed much of a million-dollar-per-month cybersecurity technology in his spare time, while doing two different demanding national-security jobs, without using NSA resources or classified information, in a way that was somehow separate from his core duties, which included a cyber-security portfolio?

It beggars belief:


He was the longest-serving director in the history of the NSA and the first commander of the U.S. Cyber Command, responsible for all cybersecurity personnel--defensive and offensive--in the military and the Defense Department.. From those two perches, Alexander had access to the government's most highly classified intelligence about hackers trying to steal U.S. secrets and disable critical infrastructure, such as the electrical power grid. Indeed, he helped to invent new techniques for finding those hackers and filed seven patents on cybersecurity technologies while working for the NSA.

He'd now have us belief that in his spare time he was developing even better techniques than the ones he developed in government. Even if true that would be a scandal! Harris posed the obvious question: "Asked why he didn't share this new approach with the federal government when he was in charge of protecting its most important computer systems, Alexander said the key insight about using behavior models came from one of his business partners, whom he also declined to name, and that it takes an approach that the government hadn't considered. It's these methods that Alexander said he will seek to patent."

So there you go.

Alexander toils in his spare time. The million-dollar idea is almost there .... but not quite. Then, just as he retires, a mystery man comes through with a veritable flux capacitor. How fortuitous!

The business partner, whose name we're not allowed to know, and with whom Alexander was able to collaborate immediately upon leaving his job, but not before, contributed the crucial insight--ostensibly without any assistance from his future business partner, who had access to all the most useful possible classified information--but despite coming up with this ostensibly invaluable intellectual property independently, the mystery man is willing to cut Alexander in for a seven- or eight-figure payday.

As if that weren't enough:
Alexander said they were particularly worried about threats like the Wiper virus, a malicious computer program that targeted the Iranian Oil Ministry in April 2012, erasing files and data. That will come as a supreme irony to many computer security experts, who say that Wiper is a cousin of the notorious Stuxnet virus, which was built by the NSA--while Alexander was in charge--in cooperation with Israeli intelligence.

The man who both presided over the creation of the most sophisticated cyber-weapon in history and hyped the threat of cyberattacks more than anyone else in America will now patent and privately sell for millions a product to stop cyberattacks. When did the business partnership with the mystery man form, one wonders? The whole story, which could only happen in America, would seem to lend some urgency to Jason Leopold's lawsuit trying to secure Alexander's financial disclosure forms from the NSA, which is refusing to give them up.

If the limited facts on offer don't stink enough to prompt a congressional inquiry--ideally one that gets Alexander testifying under oath--what possible fact pattern would rouse the branch of government charged with oversight? At the very best, he is stoking a perception of impropriety so extreme that it speaks poorly of his character that he's chosen to retire in this fashion. If anything more nefarious is going on, hopefully either Congress or the press will be able to expose it. The stakes are certainly high enough to justify digging.

-- http://www.theatlantic.com/politics/...k-plan/375367/

Reply
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
NSA Planned to Hijack Google App Store to Hack Smartphones [email protected] Metalworking 0 May 21st 15 11:58 PM
Hair dryers, smartphones and kettles on EU Hit List Jabba UK diy 113 September 3rd 14 11:26 AM
OT - Windows Live Mail hijack? David WE Roberts[_4_] UK diy 0 January 30th 12 12:40 PM
Mind if I hijack this thread for a moment? William Wixon Metalworking 0 November 27th 09 06:04 AM


All times are GMT +1. The time now is 04:29 AM.

Powered by vBulletin® Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 DIYbanter.
The comments are property of their posters.
 

About Us

"It's about DIY & home improvement"