protecting the “selectors”.

lets say this delicately – mostly to protect the incompetent. That is, those who don’t know to this day that their BT “vulnerability scanning” box is the NSA point of presence on their networks. It is there to “receive selectors” – which tune up the scanning over the logged events delivered from the linux/windows boxes, before sending “summaries” to BT for further analysis buy “intelligent” agents who scan for vulnerabilities.

What was interesting was the cover story used for these devices. It was interesting to watch the social dynamics of those knew the true purposes and those that had bought into the cover story.


About home_pw

Computer Programmer who often does network administration with focus on security servers. Sometimes plays at slot machine programming.
This entry was posted in spying. Bookmark the permalink.