dslreports logo
 
    All Forums Hot Topics Gallery
spc
Search similar:


uniqs
1031

Shamayim
Premium Member
join:2002-09-23

10 recommendations

Shamayim

Premium Member

AWS building a "secret" cloud for 17 USA Intelligence Agencies

"Amazon Web Services unveiled a cloud computing region for the CIA and other intelligence community agencies developed specifically to host secret classified data. The AWS Secret Region will allow the 17 intelligence agencies to host, analyze and run applications on government data classified at the secret level . . ."

»www.nextgov.com/cloud-co ··· /142662/

Anyone willing to give odds in a year (or less) seeing another headline like »Terabytes of US Military Spy Data Left Open on AWS

StuartMW
Premium Member
join:2000-08-06

1 edit

8 recommendations

StuartMW

Premium Member

. o O (What's the worst that could happen? Well, since you ask...)

camper
just visiting this planet
Premium Member
join:2010-03-21
Bethel, CT

4 recommendations

camper

Premium Member

 

You're too quick for me.

I was about to ask ... what could possibly go wrong?


Kilroy
MVM
join:2002-11-21
Saint Paul, MN

8 recommendations

Kilroy to Shamayim

MVM

to Shamayim
Three men can keep a secret...as long as two of them are dead.

It may start out as secret, but give it time.
HELLFIRE
MVM
join:2009-11-25

5 recommendations

HELLFIRE to Shamayim

MVM

to Shamayim
It's in the cloud on someone else's computer we don't control... what could go wrong...
said by Kilroy:

Three men can keep a secret...as long as two of them are dead.

“The likelihood of a secret’s being blown is proportional to the square of the number of people who are in on it”. - Adm. James Greer, Hunt For Red October.

My Sarcastic 00000010bits

Regards

camper
just visiting this planet
Premium Member
join:2010-03-21
Bethel, CT

2 recommendations

camper

Premium Member

said by HELLFIRE:

...

 

That's just a paraphrasing of Metcalfe's Law ( »www.techopedia.com/defin ··· lfes-law )

"a network's impact is the square of the number of nodes in the network"


Blackbird
Built for Speed
Premium Member
join:2005-01-14
Fort Wayne, IN

1 edit

10 recommendations

Blackbird

Premium Member

From the OP's article:

The AWS Secret Region is essentially its own commercial data center air-gapped—or shut off—from the rest of the internet.

(BB emphasis)

This terminology (and similar wording in a variety of other articles on the AWS Secret Region) is an egregious and extremely inappropriate misuse of the term "air-gap", either because of the ignorance of the writers or because of a deliberate attempt to downplay the risks of compromise involved. A genuine air-gap means physical separation of computers and computer networks. The AWS Secret Region is a system of credentialing, certs, keys, and authentications that does not provide physical separation from the public Internet, but relies instead upon purely digital handshaking and encryption techniques to provide "isolation". Encryption is not an air gap, and historically has never been intended to provide the reduction in attack surface provided by true air-gap physical separation. The best security concepts employ both air-gapping and encryption: the air gapping to lower the attack surface, and the encryption to protect the information against the few possible penetrations that might occur across the air-gap (espionage, treason, etc).

StuartMW
Premium Member
join:2000-08-06

5 recommendations

StuartMW

Premium Member

said by Blackbird:

...extremely inappropriate misuse of the term "air-gap"...

I guess one could also make (a bad) case that Wi-Fi is air-gapping since there's no physical connection.

Blackbird
Built for Speed
Premium Member
join:2005-01-14
Fort Wayne, IN

3 recommendations

Blackbird

Premium Member

said by StuartMW:

said by Blackbird:

...extremely inappropriate misuse of the term "air-gap"...

I guess one could also make (a bad) case that Wi-Fi is air-gapping since there's no physical connection.

Because it involves electromagnetic emissions, Emsec specs require that wifi associated with computing equipment be operated only within a demonstrated/documented highly-shielded environment. In that case, the metallic shielding provides a physical 'gap' against the emissions. Hooking the equipment physically to an Internet connection contradicts gapping.
lilricky
join:2007-07-21
Kissimmee, FL

1 recommendation

lilricky to HELLFIRE

Member

to HELLFIRE
Don't worry, typical government honeypot tactic. Leak info on US government supposed "secret" intelligence on easily accessed servers and log the attempts at getting it.
Kearnstd
Space Elf
Premium Member
join:2002-01-22
Mullica Hill, NJ

6 recommendations

Kearnstd to Shamayim

Premium Member

to Shamayim
Just wait someone will leave the password in a rental car and the next customer who gets it will login from a public computer in a hotel business center, See all the juicy data and quickly log off knowing its bad to be there. Of course its some unpatched old as fuck public computer most likely that is compromised and now some hacker has it and before long the server is dumped to Wikileaks.
radios1
join:2017-11-10

1 recommendation

radios1 to Shamayim

Member

to Shamayim
look at how quickly the top secret plans for the atom bomb was leaked to the Russians!. but let's hope the data here will be encrypted, and will take at least a half hour to decrypt on a modern computer!.

Shamayim
Premium Member
join:2002-09-23

1 recommendation

Shamayim

Premium Member

modern computer arrays = 42 seconds.

Astyanax
Premium Member
join:2002-11-14
Melbourne, FL
·AT&T FTTP

2 recommendations

Astyanax to Shamayim

Premium Member

to Shamayim
said by Shamayim:

Anyone willing to give odds in a year (or less) seeing another headline like »Terabytes of US Military Spy Data Left Open on AWS

It's all been stolen already so might as well save the taxpayers a few bucks and put it on a commercial cloud server.