Chapter
Clips
The development of a methodology for network attacks requires prior knowledge of the network to execute exploits.
1:04:23 - 1:06:56 (02:32)
Summary
The development of a methodology for network attacks requires prior knowledge of the network to execute exploits. To overcome this issue, open-source intelligence gathering on the target is critical to ensure the accurate execution of the mission.
ChapterThe NSA's Role in NIST Cybersecurity Standards
Episode83: NSA Cryptologists
PodcastDarknet Diaries
The Pit was NSA's super-secret red team and was responsible for a vulnerability threat assessment, as described in Fred Kaplan's book "Dark Territory".
1:06:56 - 1:12:44 (05:48)
Summary
The Pit was NSA's super-secret red team and was responsible for a vulnerability threat assessment, as described in Fred Kaplan's book "Dark Territory". NIST was responsible but passed the task quietly back to NSA to do the work, which was requested in a letter ultimately signed by the Attorney General Janet Reno.