Second hack exposed military and intel data

Rum, beer, movies, nice websites, gaming, etc., without interrupting the flow of martial threads.

Second hack exposed military and intel data

Postby windwalker on Fri Jun 12, 2015 5:21 pm

I don't really have a problem with who ever hacked it.
I do have a problem with those who are supposed to prevent it.

In the Army during war, if someone fs up usually the result is that either they'er dead or others are.

Here, it seems the blame is on those who've done it, not those who where supposed to prevent it.

I just don't understand how the US gov, could allow it to happen.

It amazes me the lack of accountability for what should be something that should be almost impossible to do.



http://news.yahoo.com/union-says-federa ... itics.html

Outside experts were pointing to the breaches as a blistering indictment of the U.S. government's ability to secure its own data two years after a National Security Agency contractor, Edward Snowden, was able to steal tens of thousands of the agency's most sensitive documents.

After the Snowden revelations about government surveillance, it became more difficult for the federal government to hire talented younger people into sensitive jobs, particularly at intelligence agencies, said Evan Lesser, managing director of ClearanceJobs.com, a website that matches security-clearance holders to available slots.

"Now, if you get a job with the government, your own personal information may not be secure," he said. "This is going to multiply the government's hiring problems many times."



The real question is are other gov also being hacked like this?
For example has China been hacked if not why?

Some may feel its because we dont do it, a mistake I belive that has been shown with the many other things that "we" dont do :-\
Last edited by windwalker on Fri Jun 12, 2015 5:28 pm, edited 4 times in total.
windwalker
Wuji
 
Posts: 10634
Joined: Sun Mar 25, 2012 4:08 am

Re: Second hack exposed military and intel data

Postby Peacedog on Fri Jun 12, 2015 7:21 pm

Part of it is generational. For at least the last 10-15 years schools practically indoctrinate kids that no real responsibility exists.

The other part involves the lack of civil liability on the government worker end. While a government worker can face criminal liability in limited circumstance, even Lois Lerner kept her pension.

Contractors at a minimum can be fired. However, civil service employees with over three years on the job are essentially impossible to fire and are immune to civil prosecution under virtually all circumstances.

A movement is beginning to strip civil service employees of their civil court immunity, but it will probably be another 10-15 years before this becomes law.
Peacedog
Great Old One
 
Posts: 2195
Joined: Fri May 23, 2008 5:22 am
Location: Standing right next to your girl....

Re: Second hack exposed military and intel data

Postby windwalker on Fri Jun 12, 2015 8:49 pm

The Social Security numbers were not encrypted, the American Federation of Government Employees said, calling that "an abysmal failure on the part of the agency to guard data that has been entrusted to it by the federal workforce."


wow, the real problem is "us" accepting incompetency, while the media and gov tires to blame state actors for the hack. What difference does it make?
It was hacked something that was known, expected and supposedly prepared for.
After Snowden, event , http://www.washingtonpost.com/news/morn ... d-snowden/
One would have thought some things would have changed. guess not. :-\
Last edited by windwalker on Fri Jun 12, 2015 8:52 pm, edited 1 time in total.
windwalker
Wuji
 
Posts: 10634
Joined: Sun Mar 25, 2012 4:08 am

Re: Second hack exposed military and intel data

Postby windwalker on Wed Jun 24, 2015 3:52 pm

Hess countered assertions by Archuleta on Tuesday and Wednesday. She told lawmakers that hackers used a stolen KeyPoint credential to break into the network. Credentials are equivalent to electronic keys.

"There was a credential that was used, and that's the way they got in," Archuleta said, answering a question from Rep. Bonnie Watson Coleman, D-N.J.

Hess later told lawmakers that Archuleta was referring to a KeyPoint employee who had an OPM account.

Rep. Matt Cartwright, D-Pennsylvania, was critical of Hess's parsing of responsibility, saying he was making "some fine distinctions" in explaining the role of a KeyPoint employee in the data breach.

https://www.yahoo.com/tech/s/personnel- ... itics.html

thought it would come to something like this.

She said, in fact, that no one person was responsible, and blamed the hackers for the intrusion.

::) If not for those those pesky hackers, seems like it would have been a sweet job.

A little jail time for the people in charge would fix a lot of this.



brings to mind a story

Instead of carrying out his commands, the maids started giggling. Sun Tzu said, turning very serious, "It apparently is my fault not to have made the rules and regulations and commands plain enough. " So he reiterated what he had said before, explaining very carefully the rules and regulations and the way to carry out the commands.

After that he once again had the drummers beat out martial music and started giving commands. However, he met with only rings of laughter. Now Sun Tzu looked very stern and said seriously, "If I had not made sufficiently clear the discipline and the commands, it would be my fault.

Now that everything has been made clear and still you have failed to execute my orders, the company commanders must be held responsible. " He ordered that the two company commanders be beheaded immediately in public, as a warning to all.

The King of Wu was filled with great consternation when he saw that his two most beloved concubines were to be killed. Without delay he sent an official to say to Sun Tzu, "His Majesty can see you are very good at military affairs.

But those two are his favorites. Please let them off. " In reply, Sun Tzu said, "Military training is no child's play. No one can be allowed to trifle with it. Since I have received the king's express orders to be in charge of the drills, I am bound by duty not to obey his command when I am trying to enforce military discipline. " After saying that, Sun Tzu had the two royal concubines executed without delay.

http://journeyeast.tripod.com/suntzu.html
Last edited by windwalker on Wed Jun 24, 2015 4:04 pm, edited 1 time in total.
windwalker
Wuji
 
Posts: 10634
Joined: Sun Mar 25, 2012 4:08 am

Re: Second hack exposed military and intel data

Postby Steve James on Wed Jun 24, 2015 4:21 pm

It's human error (or the human factor), and that's what is always exploited. How did they crack the enigma code? Human error. How did those guys escape from the prison? Exploit the human.

Btw, yes, if we are hacking Germany and France, we're hacking China. "An army without spies is like a man without ears or eyes."
"A man is rich when he has time and freewill. How he chooses to invest both will determine the return on his investment."
User avatar
Steve James
Great Old One
 
Posts: 21219
Joined: Tue May 13, 2008 8:20 am

Re: Second hack exposed military and intel data

Postby windwalker on Wed Jun 24, 2015 4:48 pm

What happened was very preventable, somewhere they where to compliant.
The problem as I see it, is that the higher level people are very rarely held accountable.
Kinda ironic that while we hack them we ask them not to hack us.

U.S. President Barack Obama reaffirmed in a phone call with his French counterpart Francois Hollande on Wednesday Washington's commitment to end spying practices deemed "unacceptable" by its allies.

http://www.reuters.com/article/2015/06/ ... EM20150624

Only when caught is it "unacceptable" ;)
Last edited by windwalker on Wed Jun 24, 2015 4:51 pm, edited 2 times in total.
windwalker
Wuji
 
Posts: 10634
Joined: Sun Mar 25, 2012 4:08 am

Re: Second hack exposed military and intel data

Postby yeniseri on Thu Jun 25, 2015 7:56 am

I do not believe that it was the second time that this hack occurred but it is the 2nd one that they were aware of it.
NSA and other agencies should have been watching out for stuff like this but instead they concentrate their effort on innocent US citizens. That is the problem
When fascism comes to US America, It will be wrapped in the US flag and waving a cross. An astute patriot
yeniseri
Wuji
 
Posts: 3805
Joined: Sat Dec 12, 2009 1:49 pm
Location: USA

Re: Second hack exposed military and intel data

Postby Steve James on Thu Jun 25, 2015 8:18 am

it is the 2nd one that they were aware of it.


It's the second one that they let the public know about. And there's really no way to know why they're releasing the news. Remember when Target was hacked? They alert their customers, and then they give them credit protection. Before that, though, they may have had a year of preparation to try to avoid future hacks of this kind --and to set some traps. For all espionage, there is counter and counter-counter espionage. Truth is not something publicized unless absolutely necessary.
"A man is rich when he has time and freewill. How he chooses to invest both will determine the return on his investment."
User avatar
Steve James
Great Old One
 
Posts: 21219
Joined: Tue May 13, 2008 8:20 am

Re: Second hack exposed military and intel data

Postby chud on Thu Jun 25, 2015 10:07 am

According to the Wall Street Journal this is bad, it affects US intelligence assets as well.

Obama’s Cyber Meltdown
The Chinese attack on federal personnel files keeps getting worse.

June 23, 2015 7:14 p.m. ET

If you thought Edward Snowden damaged U.S. security, evidence is building that the hack of federal Office of Personnel Management (OPM) files may be even worse.

When the Administration disclosed the OPM hack in early June, they said Chinese hackers had stolen the personal information of up to four million current and former federal employees. The suspicion was that this was another case of hackers (presumably sanctioned by China’s government) stealing data to use in identity theft and financial fraud. Which is bad enough.

Yet in recent days Obama officials have quietly acknowledged to Congress that the hack was far bigger, and far more devastating. It appears OPM was subject to two breaches of its system in mid-to-late 2014, and the hackers appear to have made off with millions of security-clearance background check files.

These include reports on Americans who work for, did work for, or attempted to work for the Administration, the military and intelligence agencies. They even include Congressional staffers who left government—since their files are also sent to OPM.

This means the Chinese now possess sensitive information on everyone from current cabinet officials to U.S. spies. Background checks are specifically done to report personal histories that might put federal employees at risk for blackmail. The Chinese now hold a blackmail instruction manual for millions of targets.

These background checks are also a treasure trove of names, containing sensitive information on an applicant’s spouse, children, extended family, friends, neighbors, employers, landlords. Each of those people is also now a target, and in ways they may not contemplate. In many instances the files contain reports on applicants compiled by federal investigators, and thus may contain information that the applicant isn’t aware of.

Of particular concern are federal contractors and subcontractors, who rarely get the same security training as federal employees, and in some scenarios don’t even know for what agency they are working. These employees are particularly ripe targets for highly sophisticated phishing emails that attempt to elicit sensitive corporate or government information.

The volume of data also allows the Chinese to do what the intell pros call “exclusionary analysis.” We’re told, for instance, that some highly sensitive agencies don’t send their background checks to OPM. So imagine a scenario in which the Chinese look through the names of 30 State Department employees in a U.S. embassy. Thanks to their hack, they’ve got information on 27 of them. The other three they can now assume are working, undercover, for a sensitive agency. Say, the CIA.

Or imagine a scenario in which the Chinese cross-match databases, running the names of hacked U.S. officials against, say, hotel logs. They discover that four Americans on whom they have background data all met at a hotel on a certain day in Cairo, along with a fifth American for whom they don’t have data. The point here is that China now has more than enough information to harass U.S. agents around the world.


And not only Americans. Background checks require Americans to list their contacts with foreign nationals. So the Chinese may now have the names of thousands of dissidents and foreigners who have interacted with the U.S. government. China’s rogue allies would no doubt also like this list.

This is a failure of extraordinary proportions, yet even Congress doesn’t know its extent. The Administration is still refusing to say, even in classified briefings, which systems were compromised, which files were taken, or how much data was at risk.
***

While little noticed, the IRS admitted this spring it was also the subject of a Russian hack, in which thieves grabbed 100,000 tax returns and requested 15,000 fraudulent refunds. Officials have figured out that the hackers used names and Social Security data to pretend to be the taxpayers and break through weak IRS cyber-barriers. As Wisconsin Senator Ron Johnson has noted, the Health and Human Services Department and Social Security Administration use the same weak security wall to guard ObamaCare files and retirement information. Yet the Administration is hardly rushing to fix the problem.

Way back in March 2014, OPM knew that Chinese hackers had accessed its system without having downloaded files. So the agency was on notice as a target. It nonetheless failed to stop the two subsequent successful breaches. If this were a private federal contractor that had lost sensitive data, the Justice Department might be contemplating indictments.

Yet OPM director Katherine Archuleta and chief information officer Donna Seymour are still on the job. Mr. Obama has defended Ms. Archuleta, and the Administration is trying to change the subject by faulting Congress for not passing a cybersecurity bill. But that legislation concerns information sharing between business and government. It has nothing to do with OPM and the Administration’s failure to protect itself from cyber attack.

Ms. Archuleta appears before Congress this week, and she ought to remain seated until she explains the extent of this breach. While Russia and Islamic State are advancing abroad, the Obama Administration may have allowed a cyber 9/11 at home.

http://www.wsj.com/articles/obamas-cybe ... 1435097288
User avatar
chud
Great Old One
 
Posts: 3546
Joined: Fri May 16, 2008 7:42 am
Location: Alamo City, Lone Star State

Re: Second hack exposed military and intel data

Postby chud on Thu Jun 25, 2015 10:10 am

The Cliff's Notes version of above article is that if you're in Intelligence, your cover is at risk, if not already blown.
Using "exclusionary analysis" and cross-matching of databases, the hackers can infer things about people even if OPM didn't have their records.
Last edited by chud on Thu Jun 25, 2015 10:33 am, edited 4 times in total.
User avatar
chud
Great Old One
 
Posts: 3546
Joined: Fri May 16, 2008 7:42 am
Location: Alamo City, Lone Star State

Re: Second hack exposed military and intel data

Postby windwalker on Thu Jun 25, 2015 1:24 pm

Clapper had said earlier in his talk: "You have to kind of salute the Chinese for what they did. If we had the opportunity to do that, I don't think we'd hesitate for a minute."


one of the few honest statements made in awhile.

The problem of course in trying to hack the Chinese, is that, they seem to have a higher standard, a sense of following protocols that tend to minimize the human element.
The Chinas gov

The Central Government Procurement Center issued the ban on installing Windows 8 on Chinese government computers as part of a notice on the use of energy-saving products, posted on its website last week.

The official Xinhua news agency said the ban was to ensure computer security after Microsoft ended support for its Windows XP operating system, which was widely used in China.

http://www.nbcnews.com/tech/security/op ... or-n381661

The state-controlled Xinhua News Agency reported the announcement on Sunday, citing U.S. surveillance as one of the reasons Chinese engineers are developing their own operating system for desktop computers and mobile devices.
The new software would compete directly with Microsoft (MSFT, Tech30) Windows and Google (GOOG) Android. It would be available to China's consumers and government personnel alike. The operating system is slated for release in October, Xinhua reported.

http://money.cnn.com/2014/08/25/technol ... /china-os/



Very simple idea, and insures control over something that protects them. Meanwhile our own gov, wants
The Government Wants A Backdoor Into Your Online Communications

https://www.eff.org/deeplinks/2013/05/caleatwo

ironic they want this but cry foul when others make their own back doors to the gov, systems.
Also notice we seem to be the ones talking privacy, freedom of speech, but behind close doors its a different story ;)
Is it more honest, open and transparent when a gov tells you that certain types of speech or communications may cause problems,
instead of saying one thing and doing another? :-\


She told lawmakers that hackers used a stolen KeyPoint credential to break into the network. Credentials are equivalent to electronic keys.

"There was a credential that was used, and that's the way they got in," Archuleta said, answering a question from Rep. Bonnie Watson Coleman, D-N.J.

Hess later told lawmakers that Archuleta was referring to a KeyPoint employee who had an OPM account.


I dont know if I would call this a hack, since they accessed it according to what is known using a "key" that somewhere somehow someone forgot to account for.


Seems to indicate very lax security awareness, in ability to follow SOPs, an over confidence or complacency, not understanding the nature of the threat.
Last edited by windwalker on Thu Jun 25, 2015 1:48 pm, edited 6 times in total.
windwalker
Wuji
 
Posts: 10634
Joined: Sun Mar 25, 2012 4:08 am

Re: Second hack exposed military and intel data

Postby windwalker on Thu Jun 25, 2015 1:45 pm

China then blacklisted Microsoft's latest operating system, Windows 8, banning it from all government computers. The Chinese news agency named Microsoft's "monopoly" as one reason for bringing production domestic -- rather than upgrading government computers to Windows 8.
But it also cited U.S. spying as a reason for backing its own OS, suggesting that the Chinese government is worried the U.S. National Security Agency might be inserting backdoors into U.S.-made software like Windows and Android.

http://money.cnn.com/2014/08/25/technol ... /china-os/

"they might be inserting backdoors into US made software like windows and android" na not the US ;)

Once they get their system up and running it will be interesting to see if it takes off outside of China.
I would expect all US major software makers to accommodate what ever they make to run on it.
Business is business USA inc. :-\
windwalker
Wuji
 
Posts: 10634
Joined: Sun Mar 25, 2012 4:08 am

Re: Second hack exposed military and intel data

Postby mrtoes on Thu Jun 25, 2015 2:18 pm

Peacedog wrote:Part of it is generational. For at least the last 10-15 years schools practically indoctrinate kids that no real responsibility exists.

The other part involves the lack of civil liability on the government worker end. While a government worker can face criminal liability in limited circumstance, even Lois Lerner kept her pension.

Contractors at a minimum can be fired. However, civil service employees with over three years on the job are essentially impossible to fire and are immune to civil prosecution under virtually all circumstances.

A movement is beginning to strip civil service employees of their civil court immunity, but it will probably be another 10-15 years before this becomes law.


Are you sure? Nothing to do with terrible infosec, including lack of ring fencing and unencrypted storage of highly sensitive information, lack of two factor authentication for remote connections and IT projects that routinely run over budget and don't match spec - which would normally be contracted out to the private sector incidentally. Add in antiquated systems including computers running out of date software without the latest security patches patches which are routinely breached. Then let's throw in the NSA who would rather weaken the worlds encryption standards than strengthen their (your) own defenses.

The failures are systematic and bureaucratic not some moral failing of the individual or a lapse in education, and have everything to do with jaw droppingly terrible IT security and incredibly backward thinking on the part of the people who are supposed to be maintaining the nations security. It'll take more than stringing up a couple of overpaid bureaucrats to fix that.

Matthew
Last edited by mrtoes on Thu Jun 25, 2015 2:37 pm, edited 1 time in total.
mrtoes
Wuji
 
Posts: 1351
Joined: Thu Jun 05, 2008 5:06 am
Location: Central America

Re: Second hack exposed military and intel data

Postby bailewen on Thu Jun 25, 2015 3:16 pm

@Chud,

I gotta admit, feels like poetic justice to me. I'd say the end of the 4th amendment is definitely on my list of top 3 political issues that I am the most absolutely furious about. Sure, I can't get too happy because there are safety issues out there (more irony) but to a certain extent, it serves those fuckers right. (not those in the field of course)

@MrToes,

That.

Without having read up on the event, my first instinct is too assume the security breach was basically related to a generation gap. Almost everyone I know above a certain age is just an idiot when it comes to IT security. Most people my age or younger too actually. It blows my mind that even the most basic information security protocols are not just default on everything. I would say that less than 1 out of 10..or even out of 20, people have done even the basic free stuff.

- encrypt your hard drive (at least now it's a common installation option for Linux and OSX...but nobody chooses to do it.)
- Basic SSL connections online. (not perfect but it helps.)
- Encrypted email (I recently switched to protonmail for this reason.)

And even easier stuff that is completely idiotic not to make a habit:

- turn off your phones bluetooth, Wi-Fi and GPS when you are not using them. Bluetooth has probably gotten better but used to be famously insecure. Wi-Fi not only wastes your battery, it continuously scans for available networks which means it is continuously broadcasting your location and initiating communication with anything it finds. It's a good way to get your phone hacked. GPS...really? Why in the hell would you want to voluntarily broadcast this information if you are not currently using google maps or something.
- When you run apps on your phone....and the calculator asks for location information...!?! Select NO! for gods sakes. Why the hell does your calculator, your angry birds or anything else that is not a navigation tool or a running app, need to access your location? Just refuse this stuff by default.

None of this is perfect but when I see that, in essence, the entire internet doesn't even lock its doors...

Locks can be picked but most of us still use them. And since nobody does... stuff like this is inevitable. Even if they have good policies in place, the vast majority of the employees just don't have the awareness. :p
Click here for my Baji Leitai clip.
www.xiangwuhui.com

p.s. the name is pronounced "buy le when"
User avatar
bailewen
Great Old One
 
Posts: 4895
Joined: Tue May 13, 2008 11:20 am
Location: Xi'an - China

Re: Second hack exposed military and intel data

Postby windwalker on Thu Jun 25, 2015 7:01 pm

Reading Bailewens' post

some might find the following interesting if needed.

https://protonmail.ch/pages/about
https://www.boxcryptor.com/en

Windows 8.1 will automatically encrypt the storage on modern Windows PCs. This will help protect your files in case someone steals your laptop and tries to get at them, but it has important ramifications for data recovery.

http://www.howtogeek.com/173592/windows ... d-to-know/

bad news if you happen to lose your log in pass word :-\
Last edited by windwalker on Thu Jun 25, 2015 7:06 pm, edited 1 time in total.
windwalker
Wuji
 
Posts: 10634
Joined: Sun Mar 25, 2012 4:08 am

Next

Return to Off the Topic

Who is online

Users browsing this forum: Trick and 92 guests