Bernard Woolley: That's one of those irregular verbs, isn't it? I give confidential security briefings. You leak. He has been charged under section 2a of the Official Secrets Act.
(Yes, Minister)
Imagine yourself as Donald Trump's sysadmin. Trump's first month as President of the United States of America has been notable for the number of information leaks that have occurred. Trump has called these leaks criminal and seems intent on rooting out whistleblowers. Some poor sysadmin is going to be told to prevent these leaks …
Whilst this article was informative, I found this more entertaining:
Press secretary Sean Spicer is cracking down on leaks coming out of the West Wing, with increased security measures that include random phone checks of White House staffers, overseen by White House attorneys....
... Spicer also warned the group of more problems if news of the phone checks and the meeting about leaks was leaked to the media. It's not the first time that warnings about leaks have promptly leaked. The State Department's legal office issued a four-page memo warning of the dangers of leaks, and that memo was immediately posted by The Washington Post.
http://www.politico.com/story/2017/02/sean-spicer-targets-own-staff-in-leak-crackdown-235413
But honestly, I think the first point needs to be training and awareness - specifically for senior managers, who don't understand their corporation is effectively a sieve and you can't plug every hole, or the fact that any tool implemented is at most a hurdle to deter or stop people doing something stupid. But a determined person will eventually get through it...
As this training film from 1983 shows , it's the enemy within you have to be most aware of.
Better user education can help cut down the stupid stuff but active malice (for whatever motivation) is another problem.
And TBH I suspect the D's natural management style has made an exceptionally high number of people who are quite keen to share as much of his Presidency as possible as widely as possible.
That's where goodwill helps your security.
Reminds me of the time a CEO of a UK based chain-store wanted a webcam on his desk, but at the same time the webcam wouldn't be able to allow the person on the other end to read any documents the CEO might have within view of the webcam. "If I hold up a sensitive document in front of the webcam during a conference, I don't want him to be able to read it". It was a real head-banging moment, he genuinely thought that there was a technical way to stop the camera from focusing on anything other than his face. This was in 2001.
not entirely related, but about that same time I had a guy who thought the correct way to save a document was to print it out - hundreds of pages. And if they then wanted to alter it , the newfangled text recognition software would read all the pages back into the computer so that the could be edited.
A couple of random thoughts:
1) If you are planning on using a non-company phone to steal stuff, would you not put it in air-plane mode before brining it in? So cell phone scanning won't do much for anyone that dedicated.
2) If data security and privacy matters then the only type of cloud storage in use should be the zero-knowledge type like Sync, Boxcryptor, SpidreOak, etc, and certainly not MS/Google/DropBox and similar.
3) So many data loss incidents seem to be accidental emailing to world+dog, that ought to be a lock-down by default in anyone's system, with special hoops to jump through before you can email more than a few folk (or list) and more so if it has any attachments.
It might just stop corporate drones emailing a multi-MB word document, PDF or power-point slide to everyone in your organisation to say 3 bullet-points as well...
"1) If you are planning on using a non-company phone to steal stuff, would you not put it in air-plane mode before brining it in? So cell phone scanning won't do much for anyone that dedicated."
I did think this. Mobile phone, airplane mode, take a few shots, onto an micro SD card in your underwear, factory reset the phone, nobody's any the wiser. Only way to stop that would be to completely ban mobile phones and security scan everyone. I don't even know if standard metal detectors would pick up a micro SD card, as they don't pick up metal buttons on jeans.
"I did think this. Mobile phone, airplane mode, take a few shots, onto an micro SD card in your underwear, factory reset the phone, nobody's any the wiser."
Sounds like a lot more effort than needed. There are plenty of small cameras available that don't have any form of radio transmitter that needs to be turned off. No need to over think things when there are simple solutions, especially since they don't do a full body scan/search of staff. Yet.
"Sounds like a lot more effort than needed. There are plenty of small cameras available that don't have any form of radio transmitter that needs to be turned off. No need to over think things when there are simple solutions, especially since they don't do a full body scan/search of staff. Yet."
The small camera is an option, but difficult to explain if caught with. The small mobile phone offers plausible deniability.
Nothing can beat the old Mark 1 Eyeball. The leaks that Trump is worried about don't need actual copies (which can be faked anyway), but reliable sources who have seen the policies in question (perhaps by being there while they were discussed, even if they were never committed to any sort of physical or electronic form).
All the "checking people's phones and computers" and setting up data protection procedures are useless in such cases.
Wait... Samsung phones... That's why they burst into flame: They were trying to go for the 'disconnected battery' option but it must have been an early prototype and sparked instead...
Apple must be doing the same thing considering their battery woes...
Wow: Mobile Phone manufacturers are secretly helping the People...
Oh... my pills. Well, yes, I had forgotten them. Freshly dried frogs, too, how nice.
I think that is possible for Phones on Standby or similar BUT how do you switch a Phone on that is Physically switched off.
[No Radio/Bluetooth/WiFi/NFC etc]
Is there a hidden mode that by some sort of induction will switch the phone on ?
(Possibly, if a certain chip sees a (voltage/voltage change) it performs a soft-switch on. !!!??? )
Somewhat BS - If the phone is fully powered off then it has no way to receive a signal that could turn it on.
But if the phone is compromised beforehand (and for all we know it could be designed compromised) to keep the baseband processor powered up even when the phone looks off then it's possible.
Battery drain while off might give it away but the baseband CPU is very low power - think of the battery life of the old dumb phones.
Hmm, I could tell when my old dump phone talked to a cell tower by a beedddeebeep sound from the car radio from interferance - don't get tthat any more - suspicious! Where's my tinfoil hat!
Given the nature of the leaks, what makes the WH think they're happening in the WH? If someone is privy to some juicy info worth leaking, they'll stop on the way home and pick up a burner phone, use it, then toss it.
So much of this that's happening smacks of security theater or a snow-job to scare people into silence. Which might work, right up until they've decided they've had enough.
Government (and most corporate) orgs have their own trusted CA -- these are added to the OS cert chain. Outbound port 80 and 443 connections are routed through a proxy server which serves as a man-in-the-middle. Instead of your browser seeing the webserver SSL cert you get the dynamically generated cert from the proxy server and since it's using a trusted (by your OS/browser) CA, you don't get any errors.
This post has been deleted by its author
Then the Dear Leader can shout and rant for all he is worth but there will be no one there to hear him or to report on his Fake News releases and rants about massacres that didn't happen.
A few weeks of that and they might come to their senses.
Hmmm. on second thoughts pehaps they won't. He just loves to hear the sound of his own voice.
Steve Davies 3@
You have just described Trump's Nirvana !!! :)
BTW: You do realise that 'Mr. Trump' does not have any senses to 'come to'. !!!!!
P.S.
More and more I am thinking that the film 'Idiocracy (2006)' [www.imdb.com/title/tt0387808/] is coming true. !!! :(
I didn't know it was a documentary sent from the future to warn us before it is too late. !!!! :)
. . . prints a request for leaks and provides a how-to for the uninitiated user to download, install, and use a TOR browser, and an anonymous file-transfer utility. . .
If I were Donald Trump's sysadmin - I'd find a new job.
He employs people who tweet their passwords. His ego won't allow him to admit that he, and his employees, are incompetent. As the sysadmin, I will always get the blame for his and his employee's incompetence and inadequacies.
So you find a new job.
"anyone with a personal mobile phone can take pictures of documents and sync, stream or simply walk out of the building with them. Cellbusters can help identify rogue cellphones "
That deals with cellphones as cameras. What about cameras as cameras? Have they ceased to exist? Even if you have to go to eBay for it there's always http://www.ebay.co.uk/itm/Minox-B-Vintage-Subminiature-Spy-Camera-No-Reserve-/162409310216?hash=item25d0596808%3Ag%3AFZgAAOSwhlZYsbIW
When the yarn is spun, the question (for me, at least) is: does this story require large volumes of government employees not to leak any information? If the answer is 'yes', then the likelyhood of the story being fiction tends toward unity.