Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Data Storage Windows IT

NSA Develops USB Storage Device Detector 233

Hugh Pickens writes "Bob Brewin writes on NextGov that the National Security Agency has developed a software tool that detects thumb drives or other flash media connected to a network. The NSA says the tool, called the USBDetect 3.0 Computer Network Defense Tool, provides 'network administrators and system security officials with an automated capability to detect the introduction of USB storage devices into their networks. This tool closes potential security vulnerabilities; a definite success story in the pursuit of the [Defense Department] and NSA protect information technology system strategic goals.' The tool gathers data from the registry on Microsoft Windows machines (PDF) and reports whether storage devices, such as portable music or video players, external hard drives, flash drives, jump drives, or thumb drives have been connected to the USB port. 'I have a hunch that a bunch of other agencies use the detection software,' writes Brewin."
This discussion has been archived. No new comments can be posted.

NSA Develops USB Storage Device Detector

Comments Filter:
  • Wow. (Score:5, Funny)

    by jgreco ( 1542031 ) on Tuesday April 13, 2010 @03:23PM (#31838332)

    Wow. Clever. Nobody ever thought of that before.

    • Re:Wow. (Score:5, Insightful)

      by Itninja ( 937614 ) on Tuesday April 13, 2010 @03:29PM (#31838424) Homepage
      No kidding. I seem to remember using some open-source utility that did exactly this like 5 years ago.
    • Seriously, I just dropped Puppy Linux on an old laptop of mine and one of the first packages I installed, that was freely available in the repositories, did exactly this. Hell, I could pipe the output from that utility into a perl script that popped up a big red box on the network admins display if the state changes.

      For that matter, you could probably homebrew a shell script that monitors the /dev files on your systems and reports usb usage. I like how some of our tax dollars fund bloated agencies to com
      • Re:Wow. (Score:5, Insightful)

        by Anonymous Coward on Tuesday April 13, 2010 @03:57PM (#31838874)
        I like how some of our tax dollars fund bloated agencies to come up with solutions that unshaven hackers in their mom's basements figured out years ago.

        Because clearly the NSA started numbering this program at 3.0 just for the hell of it.
        • Re: (Score:3, Interesting)

          $ ls -l /etc/udev/rules.d/99-mail-on-usb.rules
          -rwxr-xr-x 1 root root 159 2010-04-13 21:23 /etc/udev/rules.d/99-mail-on-usb.rules
          $ cat /etc/udev/rules.d/99-mail-on-usb.rules
          ACTION=="add",SUBSYSTEMS=="usb",RUN+="/bin/sh -c 'who | mail root -s Insert'"
          ACTION=="remove",SUBSYSTEMS=="usb",RUN+="/bin/sh -c 'who | mail root -s Remove'"

          That's my version 1.0 and took almost 30 seconds to create. I don't live in my moms basement though. :(

      • Difference is that the NSA program probably copies everything on the attached drive, decrypts anything encrypted, plants a keylogger and backdoor and calls home when hooked to another drive with all the new stuff. I ain't got over the fact they are still sifting through the data they stole from the telecoms with their black rooms and diverting 99.99% of traffic through their boxes.
  • Arms race anyone? (Score:4, Insightful)

    by TheCarp ( 96830 ) <sjc AT carpanet DOT net> on Tuesday April 13, 2010 @03:25PM (#31838346) Homepage

    "USB Detect detects the use of removable drives"
    "Shadow Drive evades detection by the following products"
    "Latest USB Detect detects Shadow Drive use!"
    "New ShadowDrive 2.0!"

    Shit, the parent company of both products could make a killing! Hey wait a minute, is this another lame
    attempt to bring money in off the books for illegal ops?

    -Steve

    • by swanzilla ( 1458281 ) on Tuesday April 13, 2010 @03:34PM (#31838522) Homepage

      "USB Detect detects the use of removable drives" "Shadow Drive evades detection by the following products" "Latest USB Detect detects Shadow Drive use!" "New ShadowDrive 2.0!"

      A strange game. The only winning move is not to boot Windows.

      • Re: (Score:3, Informative)

        by tomhudson ( 43916 )

        A strange game. The only winning move is not to boot Windows.

        Or plug it in before booting ... since it detects drives as they are plugged in and unplugged.

        Or boot linux off it, and load Windows in a vm if you really really need windows.

        • by History's Coming To ( 1059484 ) on Tuesday April 13, 2010 @04:27PM (#31839234) Journal
          Or tinker with a soldering iron and $20 of components so a big flashing light goes off as soon as a USB device is detected? Or monitor the power supply on the motherboard (software independent)? Or do what my workplace does....if you're that worried, don't have USB ports or fill them with epoxy and/or physically cut the connections.
          • by tomhudson ( 43916 ) <barbara...hudson@@@barbara-hudson...com> on Tuesday April 13, 2010 @06:38PM (#31840320) Journal

            .if you're that worried, don't have USB ports or fill them with epoxy and/or physically cut the connections.

            It must suck to be stuck using that old dot-matix printer hanging off the Centronix parallel port. And that serial mouse - a null-modem cable will let me suck the data out of your box just fine. That old-style keyboard plug? Hate to have to buy a new keyboard ... and not be able to plug it in.

            • Re: (Score:3, Informative)

              by networkBoy ( 774728 )

              or you can actually get data off the PS2 keyboard port if you really need to. you can send two bits with parity per transaction just by usage of the caps/num/scroll lock LEDs.

              Might be a bit slow, but certainly is an interesting sideband attack...

            • Re: (Score:3, Informative)

              by Minwee ( 522556 )

              It must suck to be stuck using that old dot-matix printer hanging off the Centronix parallel port.

              Actually the printers are plugged in to _ethernet_ ports. On network switches, where their MAC addresses have been registered to prevent gangs of street kids from sneaking in their own bulky laser printers and connecting them to the office network because that's the kind of thing that they do now.

              a null-modem cable will let me suck the data out of your box just fine

              Not when the serial port has been disabled i

              • Re:Arms race anyone? (Score:4, Interesting)

                by tomhudson ( 43916 ) <barbara...hudson@@@barbara-hudson...com> on Tuesday April 13, 2010 @10:46PM (#31841706) Journal

                It's trivial to re-enable a serial port that has been disabled in the bios. You can use debug to write to the bios data area under windows, or you can write a small program to do it for you. I used to reassign serial ports on the fly that way - 4 ports and 2 interrupts is not a good situation, but 4 ports and 1 shared interrupt IS good.

                Your "bios blocked with an unremovable admin password" is also bs - while you sometimes have to open the cover and short out a couple of pins for a few seconds, sometimes it's possible to do it entirely in software as well - but you miss the point - the bios is read at startup, but I can monkey with it as much as I want afterwards.

                also, serial cards are cheap. So are ethernet cards. So plug all the ports you want with epoxy, and people will still get the data out. Or they can just take a picture with their cell phone.

                The keyboard and mouse are connected to the USB ports on the back of the case, inside the wire cage where users can't get at them. If it's a notebook computer then they're built in and don't need to plug in anywhere. People have thought of this kind of thing before, you know. It's not a new concept that just popped up today on Slashdot.

                ... and a pair of wire cutters fixes that. snip, splice, done. Or just take the keyboard apart and the wires are nicely exposed (if you've ever tried to wash a keyboard, you've taken it apart to see how munged up you ended up making it, so you know the wiring is dead simple where it connects).

                A notebook - even if you plug all the usb AND the card reader, my mini philips screwdriver will have the hd out in seconds - it's a LOT easier to remove and replace than a desktop. I'll also reconnect the wireless (it's just one wire, after all, and nowadays even if you rip it out it's field-serviceable and replacements are cheap). Pop the hd into the second drive bay on my laptop, make an image of it with dd, and I'm good :-)

                If someone has physical access, you cannot stop them from getting the data if they really want it.

        • Or plug it in before booting ... since it detects drives as they are plugged in and unplugged.

          Wrong. I've used the tool and its nothing special. It just queries a range of computers and queries the registry keys for usb devices that the OS knows about, and whether they are currently plugged in. So as soon as windows says "detected new device" then its been found. It happens to detect SATA drives plugged as well if they show up under "unplugged devices".

          One trick for evading this tool is changing the registry permission on that key, but the tool will flag it as access denied. Still it was nice

      • We did that. Now where's my Linux version of USB Detect please?

        • Re: (Score:3, Interesting)

          by Rantastic ( 583764 )

          Why not just do what we did? Create some udev rules so that anytime someone inserts a USB, instead of mounting it, the system silently logs the event and sends an alert. As far as the user can tell, the USB key just won't mount. And no, the users do not have root access to change this.

          With some clever udev rules and a shell script, you can even record the make, model, and serial number of the USB key that was inserted.

    • Re:Arms race anyone? (Score:5, Interesting)

      by fuzzyfuzzyfungus ( 1223518 ) on Tuesday April 13, 2010 @03:47PM (#31838730) Journal
      It'll be a pretty short race, for all but a fairly dedicated hard-core.

      In order for the USB device to do anything, the host OS has to load the appropriate driver. Until it does so, you aren't getting anything other than 100ma at 5V(higher amperages quite possible, depending on the situation).

      Getting the OS to load a driver without noticing that it has loaded a driver(and without the benefit of exploit code, since you don't get to access that until the drive is mounted) would be quite a trick. Assuming this monitoring software isn't completely braindead, the fact that a USB mass storage device has been inserted, along with any interesting ID strings, will have already be sent to a monitoring server before your filesystem is even mounted. Any tampering you do at that point will just introduce suspicious discrepancies.

      Now, there is(for instance, I'm sure the suitably creative can think of others) nothing stopping a truly dedicated exfiltrator from obtaining the USB device and vendor IDs and so forth for the brand of keyboard used at that particular establishment, then building a USB device(using one of the common and inexpensive USB-capable microcontrollers) that presents exactly those IDs, and is thus detected as a USB-HID keyboard, rather than a USB-MSC device. They could then use the fact that the keyboard LEDs are under software control as a method of getting data off the system. At least on a unixlike, anybody with some basic script-fu could probably be piping arbitrary files off the system with xset led [computerhope.com] in about 10 minutes. Your custom USB device would have a slab of flash, which it would fill according to the LED commands it received. I don't know if there is anything equivalent on Windows.

      Using tricks like that, you could probably get something of an arms race going(though, still, anything that involves doing suspicious program/script execution is going to get your ass busted in any reasonably paranoid environment); but for USB MSC stuff, it is only the pure apathy of the administration, or the fact that they recognize that mass storage devices are extremely convenient and beloved by users, that lets you get away with it.
      • Re: (Score:3, Interesting)

        by ArsonSmith ( 13997 )

        boot from USB drive with hypervisor that then boots the standard OS. Hypervisor presents the USB as a real hard drive or some other read/write non-removable device.

        • If the BIOS is letting you boot arbitrary removable media, admin has already fucked up, badly.

          Unless the HDD is encrypted, allowing removable media boot means that anyone with physical access can tamper with the OS more or less freely. Overwrite hashes to gain local admin access, disable unwanted monitoring software, change permissions on files and registry objects, the works.

          The hypervisor approach would be technologically impressive, if pulled off. Most off-the-shelf offerings either emulate a limit
      • by mikael ( 484 )

        Try typing 'dmesg' if you are using Linux - that will give you the kernel message logs.

        There is also 'lsusb', which lists all USB devices, along with 'usb-devices' There are other utilities which allow you to snoop on all USB traffic.

        Whenever a device is inserted or removed from a USB socket, it generates a notification event which is logged by the kernel. It isn't going to be too difficult to have those events sent across the network to a central server, or to have a central server to poll each system for

      • In order for the USB device to do anything, the host OS has to load the appropriate driver. Until it does so, you aren't getting anything other than 100ma at 5V(higher amperages quite possible, depending on the situation).

        You've never dealt with some motherboard that don't regulate the current at all, eh? I've had a few, including some Dells that just fed 5-volts with a 1-amp limit to all the usb ports regardless.

        Getting the OS to load a driver without noticing that it has loaded a driver(and without the benefit of exploit code, since you don't get to access that until the drive is mounted) would be quite a trick. Assuming this monitoring software isn't completely braindead, the fact that a USB mass storage device has been inserted, along with any interesting ID strings, will have already be sent to a monitoring server before your filesystem is even mounted. Any tampering you do at that point will just introduce suspicious discrepancies.

        This tool isn't a monitor. You run it and it queries computers, enumerating the drivers/devices that it know about. It produces a list of computers, the vendor-ids/make/model of the usb devices that computer has seen, and if they are currently mounted.

  • 3.0? (Score:3, Insightful)

    by Itninja ( 937614 ) on Tuesday April 13, 2010 @03:25PM (#31838356) Homepage
    "The NSA says the tool, called the USBDetect 3.0 Computer Network Defense Tool"
    So if this is 3.0 can I assume they have had the tool for some time. Why are bothering to tell anyone at this point?
    • by batquux ( 323697 )

      They aren't. Someone leaked it.

      • Re: (Score:3, Funny)

        by Hognoxious ( 631665 )

        They're actully running version 4.0, but don't tell anyo!7*0 ,.;
        lno carrier

      • They aren't. Someone leaked it.

        It's been available on several NSA and DISA websites for at least a few years. It's being freely given away to Federal agencies as a tool to help secure their networks (something NSA and DISA are suppoed to be doing). Not exactly much of a leak, eh?

        It's not hard to gin up your own version of this with a little wmi scripting.

    • Re: (Score:3, Insightful)

      So if this is 3.0 can I assume they have had the tool for some time. Why are bothering to tell anyone at this point?

      Check out the comments on this article. They just need a quick dredger to go through and find out what additional security measures need to be programmed into 4.0. No need to do their own research, since they have a million know-it-alls at slashdot happy to tell them how they'd hack the NSA if they were to do it via thumbdrive.

  • by dave562 ( 969951 ) on Tuesday April 13, 2010 @03:26PM (#31838374) Journal

    It relies on information from the OS. The OS is too easy to circumuvent. For example, it doesn't report on whether or not the system has been booted from a USB device. Given that they are the NSA, maybe they have the luxury of making the assumption that USB boot is disabled and the BIOS is password protected?

    • Re: (Score:2, Interesting)

      by fatalwall ( 873645 )

      I looked into making a viable product like this a while back. You run into too many issues.

      First you have to set up the bios on all machines to prevent booting off any device other then the hard disk.

      Then you have to password the bios

      Then you need to put a physical lock on the computer to prevent some one from opening the case and resetting the bios.

      If you manage to do this you then need a dope slap because you can always use ssh or even plain email to get files out. Then what about the occasion where you n

      • by armanox ( 826486 )
        Or just bend the pins on the USB ports...
      • by Bakkster ( 1529253 ) <Bakkster,man&gmail,com> on Tuesday April 13, 2010 @04:41PM (#31839360)

        If you manage to do this you then need a dope slap because you can always use ssh or even plain email to get files out. Then what about the occasion where you need usb drives.

        This is almost certainly aimed at preventing classified information leaks. Machines with classified information are not connected to any network containing unclassified machines, and definitely not the internet. Even if it were connected, sending that e-mail leaves a record of the transmission, meaning the spy can be easily identified.

        USB drives are the most likely way to get info off a classified machine, which is precisely why they're forbidden. There is no legitimate occasion where a USB drive is needed in this case.

        • by mirix ( 1649853 )

          kind of pointless though, because there are still printers and pencils, and human memory if that fails.

          • by spazdor ( 902907 )

            easy fix:

            http://xkcd.com/294/ [xkcd.com]

          • kind of pointless though, because there are still printers and pencils, and human memory if that fails.

            If your employees are trying to violate your security, you'll never stop them reliably.

            Instead you assume your employees are stupid and/or lazy. You make policies that when followed will prevent them from becoming a victim of social engineering or accidently leaking info. Plus if thumbdrives are prohibited then the act of having a thumbdrive on you is a security incident that's pretty hard to explain.

    • by ProppaT ( 557551 )

      You hit it in your last sentence. The NSA isn't concerned about booting from a USB device. For the system to be certified and contain sensitive information, the BIOS would have to be protected and USB boot would be disabled.

      You have to take into consideration, the NSA isn't looking to keep out hackers. Well they are...of course they are...but they also know hackers are hackers and will find their way into a machine. They're looking to lock out and detect/prevent lay people from being able to put in a US

  • Impervious (Score:3, Insightful)

    by blair1q ( 305137 ) on Tuesday April 13, 2010 @03:26PM (#31838376) Journal

    ...because the Windows Registry is a secure source of information...

  • Won't it work with Linux or OSX? Or does the NSA run completely on -gulp- windows?
    • Re: (Score:2, Troll)

      does the NSA run completely on -gulp- windows?

      You can rest assured that of all of the organizations on the planet this is one that will never be using Windows for its core mission. The tool is for the defense department dweebs, contractors, secretaries, suits, etc., where you expect to find Windows.

      • by AHuxley ( 892839 )
        What can a captured defence department dweebs, contractors, secretaries, suits, troops tell the bad guys about MS?
        I log in, move the cursor, type, reboot, log in, move the cursor, type and over charge the US tax payer another million, then make coffee?
        I did have a dream home and a consulting job waiting for me back home ...
        I move the cursor, log in, move the cursor, type, reboot .. select the non US icons on the small map and watch the horizon light up?
        I did have a family waiting for me back home ...
        M
  • Useless Tool... (Score:5, Informative)

    by Manip ( 656104 ) on Tuesday April 13, 2010 @03:30PM (#31838430)

    Since you can set the security policy on a domain to ban USB and External devices, and since you can also unplug a machine from the network this tool seems to serve little to no real world purpose. It might inform you after the fact if a device has been plugged in or heck even during, but by then you've just learned that you have configured your systems incorrectly and you will need to re-image your network either way.

    Sorry if I'm being negative but Microsoft closed this "hole" a long time ago.

    • Re:Useless Tool... (Score:5, Informative)

      by ironicsky ( 569792 ) on Tuesday April 13, 2010 @03:34PM (#31838524) Journal

      Agreed. You can either change the value of HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor and/or deny anyone who is not an admin access to the following files in the NTFS %SystemRoot%\Inf\Usbstor.pnf and %SystemRoot%\Inf\Usbstor.inf and they wont be able to mount a US drive... Password protect the bios and disable the USB storage there too.

      Of course this only works for Windows, linux users and Mac users can simply be denied access to the device chain in /dev/

      • I think the point of this is to be used on computers where the users are not administrators, e.g. most corporate environments, in such case you couldn't edit the registry or install "USB Detection Blocker" software, etc.

        I don't think there is anything wrong with this. Very useful for companies keeping data secure.

      • Re:Useless Tool... (Score:4, Interesting)

        by captaindomon ( 870655 ) on Tuesday April 13, 2010 @03:49PM (#31838760)
        That's not the point. The reason for this software is to add one more layer of security to an already extremely secure network, and mostly to detect friendly accidental use by tech-clueless intelligence analysts (yes, most intelligence analysts are experts on geopolitics or military tactics and not Windows). This is not designed to prevent true espionage attacks by insiders who are technology experts, there are a lot of other layers of security for that.
      • Re: (Score:2, Informative)

        by fatalwall ( 873645 )

        password protecting the bios does nothing unless you put a lock on the computer case. password resets are really easy to do on a bios

      • Re:Useless Tool... (Score:4, Informative)

        by Bacon Bits ( 926911 ) on Tuesday April 13, 2010 @04:19PM (#31839136)

        I tested this extensively on WinXP SP2 for a hospital worried about HIPAA. These methods only work if the UsbStor key hasn't already been created. Once it's there you can keep plugging devices in and they will all install normally (new or old).

        Under Vista and 7 there's supposed to be a new Group Policy that will prevent USB drives, but I'm not sure how it works.

      • Some places fill the USB connectors with hot glue.

        I prefer 3 inch drywall screws.

        They're system agnostic...
      • by jrumney ( 197329 )
        What if the users have a need to use authorized USB devices? It seems this is aimed at such cases, where approved devices can be filtered from the log.
    • Well, since they are in the espionage business, maybe they want to trap whomever does it by making it possible to mount the drive but triggering a silent alarm.

      • Re:Useless Tool... (Score:4, Interesting)

        by IndustrialComplex ( 975015 ) on Tuesday April 13, 2010 @03:59PM (#31838900)

        Well, since they are in the espionage business, maybe they want to trap whomever does it by making it possible to mount the drive but triggering a silent alarm.

        Not quite, the NSA can really be seen as two groups. The Data Processing NSA and the Anti-Network-Intrusion/Espionage & Policy NSA. But you are correct that they probably want the ability to determine and track before simply blocking all access.

        I'm quite sure on the computer I'm at right now I could go hog-wild and do all sorts of things. Things that would be logged and flag my account/use as one to watch.

    • This is software being used by the NSA. It is much better in their opinion to detect espionage than prevent it.

      If it is being done by a government employee, they can "execute" a "termination" of employment.

      • by AHuxley ( 892839 )
        The Russian handlers work long hours understanding and watching out for their US government employees.
        When a government employee is found to have gone over "execute" is such a strong word, its mostly hanging, multiple gun shot suicide or out sourced artistic home invasion.
  • by codepunk ( 167897 ) on Tuesday April 13, 2010 @03:37PM (#31838556)

    5 or so meeeliionnns of well spent money....our brilliant govt at work.

  • The "geniuses" at the NSA couldn't even come up with a filter driver to detect the connection in real time (and block access)? I worked at a company years ago that had such a tool commercially available. Sweeping the registry is sort of "after the fact".

    On Linux, you could control users' (not "root", but if they've got local "root" access ...) ability to mount USB/Firewire/... removable storage with a simple change to the udev rules.

    • Maybe they think it's more valuable to identity what data was being smuggled (and by whom) than just blocking it outright. More to the point, since they've been using this for years, and since they created the specs for it, I'm sure it already does exactly what they want it to-- so why question it?

  • And there are 100's of ways to monitor/report on windows activities as they happen.

  • This post... (Score:4, Informative)

    by danwesnor ( 896499 ) on Tuesday April 13, 2010 @03:52PM (#31838800)
    ... is bait meant to lure out Slashdotters who can't be bothered to RTFA. The article does not mention anything about how the device works. The mention of the registry comes from a footnote in a DHS report (you know, the guys who can't find bombs if they're in your underwear). It is not sourced, and most likely an assumption since the NSA isn't in the habit of telling anybody how their $#!+ works.
  • by vrmlguy ( 120854 ) <samwyse@NOSPAm.gmail.com> on Tuesday April 13, 2010 @03:53PM (#31838822) Homepage Journal

    If you work for the government and you want to get a co-worker in trouble, go buy an iPod and plug it into his computer whenever he's away from his desk. The next time there's a security audit, he be taken to some windowless office, denying everything and not being believed.

  • Congrats NSA! Novell has been performing this miraculous feat of software wizardry for a few years now... http://www.novell.com/products/zenworks/endpointsecuritymanagement/ [novell.com]
  • Halfway to completing the suite, and offering a tool to detect and READ USB storage devices on networks.

    NSA is nothing if not ambitious. Good job, guys!

  • The security game has already been lost.

    • by pclminion ( 145572 ) on Tuesday April 13, 2010 @05:25PM (#31839780)

      The intent here is to make it more difficult for insiders to surreptitiously export data without going through proper security controls. This kind of argument always puzzles me. It's like you're saying that because there is no perfect security, we should therefore do nothing.

      In a locked-down environment, a user with physical access to a machine may still have difficulty exporting large gobs of data. Transfer over the network may be difficult, and certainly is monitored. Data can be printed out, but this requires a printer, and a way to smuggle paper out of the facility without suspicion. A cell phone with a camera could be used to photograph a computer screen, but this is very low-bandwidth, and certainly looks strange to anyone happening to observe. A USB stick is easily hidden, easily plugged and unplugged, and can have a very large capacity. It's an important vector of attack.

      Even without malicious intent, a user might decide for some reason that transferring data via USB stick is more convenient than another method. They may have good intentions, but the data still leaks onto the USB stick and you lose control over it. Just because something could be defeated doesn't make it worthwhile. And software which monitors connected machines for insertion/removal of media is not exactly hard to design. It doesn't cost you a billion dollars.

      • by ProppaT ( 557551 )

        " It's like you're saying that because there is no perfect security, we should therefore do nothing."

        This is the key. The biggest security risk is the lay person who uses the system on a daily basis, not the enemy. This is a key reason why credit checks are a regular part of gaining a security clearances. Most sensitive information leaks are from internal sources, not from enemy infiltration.

  • by gestalt_n_pepper ( 991155 ) on Tuesday April 13, 2010 @04:29PM (#31839258)

    Management eventually figured out that if you couldn't trust the guys you hired, you were screwed from go. More effective to treat your employees fairly in the first place. We stopped installing the service on new machines.

    Fun to write though.

  • How is that different from group policy now?
    (kick off usb storage drivers towards the stairwells, disable usb hubs)

  • I formatted it with a bootable Ubuntu installation image!

  • Obligatory xkcd reference
    http://xkcd.com/463/ [xkcd.com]

  • The company I work for makes to different pieces of security/monitoring software that can both detect this.

    It's not exactly a new thing...

    • by ProppaT ( 557551 )

      The thing is, the software is useless to the NSA if they don't have full access to all of the source and no one else does. They have to make sure that there are no holes are security issues with the software and they have to make sure no one else has access to the software source to find potential security holes.

      The fact that this software exists isn't any big news....big whoop, it's not really any amazing feat that hasn't been done already. The fact that the NSA has software for this that is approved is

  • Interesting. For years my computers have been telling me whenever I plug in a USB device. This little balloon in the lower right corner of the screen always pops up saying something like "Device detected." I guess the NSA has taken over my computer!

In practice, failures in system development, like unemployment in Russia, happens a lot despite official propaganda to the contrary. -- Paul Licker

Working...