protecting the “selectors”.


lets say this delicately – mostly to protect the incompetent. That is, those who don’t know to this day that their BT “vulnerability scanning” box is the NSA point of presence on their networks. It is there to “receive selectors” – which tune up the scanning over the logged events delivered from the linux/windows boxes, before sending “summaries” to BT for further analysis buy “intelligent” agents who scan for vulnerabilities.

What was interesting was the cover story used for these devices. It was interesting to watch the social dynamics of those knew the true purposes and those that had bought into the cover story.

Advertisements

About home_pw@msn.com

Computer Programmer who often does network administration with focus on security servers. Very strong in Microsoft Azure cloud!
This entry was posted in spying. Bookmark the permalink.