10 recommendations |
Shamayim
Premium Member
2017-Nov-20 8:22 pm
AWS building a "secret" cloud for 17 USA Intelligence Agencies"Amazon Web Services unveiled a cloud computing region for the CIA and other intelligence community agencies developed specifically to host secret classified data. The AWS Secret Region will allow the 17 intelligence agencies to host, analyze and run applications on government data classified at the secret level . . ." » www.nextgov.com/cloud-co ··· /142662/Anyone willing to give odds in a year (or less) seeing another headline like » Terabytes of US Military Spy Data Left Open on AWS |
|
1 edit
8 recommendations |
StuartMW
Premium Member
2017-Nov-20 8:38 pm
. o O (What's the worst that could happen? Well, since you ask...) |
|
camperjust visiting this planet Premium Member join:2010-03-21 Bethel, CT
4 recommendations |
camper
Premium Member
2017-Nov-20 8:46 pm
  You're too quick for me. I was about to ask ... what could possibly go wrong? |
|
Kilroy MVM join:2002-11-21 Saint Paul, MN
8 recommendations |
to Shamayim
Three men can keep a secret...as long as two of them are dead.
It may start out as secret, but give it time. |
|
5 recommendations |
to Shamayim
It's in the cloud on someone else's computer we don't control... what could go wrong... said by Kilroy:Three men can keep a secret...as long as two of them are dead. “The likelihood of a secret’s being blown is proportional to the square of the number of people who are in on it”. - Adm. James Greer, Hunt For Red October. My Sarcastic 00000010bits Regards |
|
camperjust visiting this planet Premium Member join:2010-03-21 Bethel, CT
2 recommendations |
camper
Premium Member
2017-Nov-21 5:19 pm
  That's just a paraphrasing of Metcalfe's Law ( » www.techopedia.com/defin ··· lfes-law ) "a network's impact is the square of the number of nodes in the network" |
|
BlackbirdBuilt for Speed Premium Member join:2005-01-14 Fort Wayne, IN 1 edit
10 recommendations |
From the OP's article: The AWS Secret Region is essentially its own commercial data center air-gapped—or shut off—from the rest of the internet. (BB emphasis) This terminology (and similar wording in a variety of other articles on the AWS Secret Region) is an egregious and extremely inappropriate misuse of the term "air-gap", either because of the ignorance of the writers or because of a deliberate attempt to downplay the risks of compromise involved. A genuine air-gap means physical separation of computers and computer networks. The AWS Secret Region is a system of credentialing, certs, keys, and authentications that does not provide physical separation from the public Internet, but relies instead upon purely digital handshaking and encryption techniques to provide "isolation". Encryption is not an air gap, and historically has never been intended to provide the reduction in attack surface provided by true air-gap physical separation. The best security concepts employ both air-gapping and encryption: the air gapping to lower the attack surface, and the encryption to protect the information against the few possible penetrations that might occur across the air-gap (espionage, treason, etc). |
|
5 recommendations |
StuartMW
Premium Member
2017-Nov-21 5:45 pm
said by Blackbird:...extremely inappropriate misuse of the term "air-gap"... I guess one could also make (a bad) case that Wi-Fi is air-gapping since there's no physical connection. |
|
BlackbirdBuilt for Speed Premium Member join:2005-01-14 Fort Wayne, IN
3 recommendations |
said by StuartMW:said by Blackbird:...extremely inappropriate misuse of the term "air-gap"... I guess one could also make (a bad) case that Wi-Fi is air-gapping since there's no physical connection. Because it involves electromagnetic emissions, Emsec specs require that wifi associated with computing equipment be operated only within a demonstrated/documented highly-shielded environment. In that case, the metallic shielding provides a physical 'gap' against the emissions. Hooking the equipment physically to an Internet connection contradicts gapping. |
|
1 recommendation |
to HELLFIRE
Don't worry, typical government honeypot tactic. Leak info on US government supposed "secret" intelligence on easily accessed servers and log the attempts at getting it. |
|
KearnstdSpace Elf Premium Member join:2002-01-22 Mullica Hill, NJ
6 recommendations |
to Shamayim
Just wait someone will leave the password in a rental car and the next customer who gets it will login from a public computer in a hotel business center, See all the juicy data and quickly log off knowing its bad to be there. Of course its some unpatched old as fuck public computer most likely that is compromised and now some hacker has it and before long the server is dumped to Wikileaks. |
|
1 recommendation |
to Shamayim
look at how quickly the top secret plans for the atom bomb was leaked to the Russians!. but let's hope the data here will be encrypted, and will take at least a half hour to decrypt on a modern computer!. |
|
1 recommendation |
Shamayim
Premium Member
2017-Nov-24 7:37 pm
modern computer arrays = 42 seconds. |
|
Astyanax Premium Member join:2002-11-14 Melbourne, FL ·AT&T FTTP
2 recommendations |
to Shamayim
It's all been stolen already so might as well save the taxpayers a few bucks and put it on a commercial cloud server. |
|