Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The US agency plundered by Chinese hackers made one of the dumbest security moves possible
Business Insider ^ | 6/18/15 | Natasha Bertrand

Posted on 07/12/2015 12:37:06 AM PDT by Libloather

Contractors in Argentina and China were given "direct access to every row of data in every database" when they were hired by the Office of Personnel Management (OPM) to manage the personnel records of more than 14 million federal employees, a federal consultant told ArsTechnica.

The massive breach of OPM's database — made public by the Obama administration this month — prompted speculation over why the agency hadn't encrypted its systems, which contain the sensitive security clearance and background information for intelligence and military personnel.

Encryption, however, according to Ars, would not have helped in this case because administrators responsible for managing these records had root access to the system, Department of Homeland Security Assistant Secretary for Cybersecurity Dr. Andy Ozment testified yesterday at a two-hour hearing before the House Oversight and Government Reform Committee.

(Excerpt) Read more at businessinsider.com ...


TOPICS: Crime/Corruption; Editorial; Government; News/Current Events
KEYWORDS: chinese; hackers; internet; security
Navigation: use the links below to view more comments.
first previous 1-2021-4041-48 next last
To: Libloather

“...Contractors in Argentina and China were given “direct access to every ...”

You don’t think China has everything secret the US government has?? Obviously we are essentially handing it to them - a la Billy Clinton. After all, they own us with all the money they have given us in exchange for worthless bonds.

How many contracts has the Pentecost, now filled with Obama people, awarded to China?? And for doing what??


21 posted on 07/12/2015 5:02:09 AM PDT by elpadre (AfganistaMr Obama said the goal was to "disrupt, dismantle and defeat al-hereQaeda" and its allies.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pepsionice

what damages have you personally been subject to that would justify a law suit?


22 posted on 07/12/2015 5:04:31 AM PDT by bert ((K.E.; N.P.; GOPc.;+12, 73, ..... No peace? then no peace!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: bert
what damages have you personally been subject to that would justify a law suit?

If someone borrows your valuable car and then the car is stolen from the friend do you not believe you have a cause of action? A car is one thing, all your most private personal information is priceless. It is valuable property that you have entrusted in the hands of a trustee and the trustee has lost your valuable property. There is a fiduciary duty that applies. Moreover, privacy laws come into play and just the breach is actionable.
23 posted on 07/12/2015 5:15:53 AM PDT by iontheball
[ Post Reply | Private Reply | To 22 | View Replies]

To: iontheball

I think your analogy is false

absent damages, real damages, I see no merit for a law suit

the fact some unknown now has the data does not mean that you personally were damaged. If they make a mortgage application or file an ammended tax return, there might be damages


24 posted on 07/12/2015 5:22:28 AM PDT by bert ((K.E.; N.P.; GOPc.;+12, 73, ..... No peace? then no peace!)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Libloather

Bush’s fault. Republican sequester’s fault. Not enough spending’s fault. Global warming’s fault.

Obama’s awesome awesomeness will protect us.


25 posted on 07/12/2015 5:34:31 AM PDT by Organic Panic
[ Post Reply | Private Reply | To 1 | View Replies]

To: dfwgator

They probably required something more secure:

Pa$$w0rd

Capital and lower case, numbers and special characters. Looks like a strong password to me.


26 posted on 07/12/2015 5:48:20 AM PDT by PAR35
[ Post Reply | Private Reply | To 3 | View Replies]

To: pepsionice

The way a class action settlement would work would be the attorney gets most of the money, the named plaintiffs get a little bit, and the class members get something essentially worthless.


27 posted on 07/12/2015 5:50:26 AM PDT by PAR35
[ Post Reply | Private Reply | To 2 | View Replies]

To: PAR35

Has anyone been fired for this?


28 posted on 07/12/2015 5:54:27 AM PDT by hal ogen (First Amendment or Reeducation Camp?)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Rummyfan; dfwgator

“The password was “12345”

At least they changed it from password.”

Dont worry. This time they got smart and changed it to “qwerty”


29 posted on 07/12/2015 5:59:57 AM PDT by lowbridge
[ Post Reply | Private Reply | To 9 | View Replies]

To: Libloather


30 posted on 07/12/2015 6:01:20 AM PDT by JoeProBono (SOME IMAGES MAY BE DISTURBING VIEWER DISCRETION IS ADVISED;-{)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gaffer

Dont need keys, password or a badge when the door is left wide open.


31 posted on 07/12/2015 6:01:38 AM PDT by Delta 21 (Patiently waiting for the jack booted kick at my door.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Libloather
I suspect that Edward Snowden's massive theft of NSA data is linked to this. He may have been recruited by the Chinese. At the very least, the Chinese would have known of his importance during his stay in Hong Kong, and would have thoroughly exploited it before allowing him to leave for Russia. Even if Snowden wanted to keep the Chinese from accessing his stolen files, he would have had no means to do so. The Truecrypt encryption program he used would have only temporarily impeded Chinese (and then Russian) intelligence.

I think it is very likely that China and Russia have copies of the crown jewels of our intelligence databases. I think it is likely they have multiple active backdoors into key government databases to keep their database snapshots current. The backdoors are almost certainly augmented by redundant tiers of human agents.

The level of stupidity, incompetence, and danger in this matter is so great that one can only deal with it by ignoring it. That seems to be working for now as very few citizens know anything about this, much less care. Americans have been well conditioned to have a broad contempt for their country, after all.

Unfortunately, these are the sort of failures that result in lost wars. Every week we seem to be moving closer to war with one or both of our major adversaries.

32 posted on 07/12/2015 6:05:45 AM PDT by Jeff F
[ Post Reply | Private Reply | To 1 | View Replies]

To: dfwgator

Hey - That’s the combination on my LUGGAGE!


33 posted on 07/12/2015 6:11:53 AM PDT by MortMan (All those in favor of gun control raise both hands!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Libloather
The OPM IT team frequently outsources its work to foreign contractors working in their home country.

Idiots. Bribes were paid. I remember a defense company CIO who helped pimp incompetent US based outsourcing so he could attend conferences and get a few rounds of golf for free. Imagine what foreigners offered.

34 posted on 07/12/2015 6:13:43 AM PDT by King Moonracer (Bad lighting and cheap fabric, that's how you sell clothing.....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pepsionice

What’s stopping you from starting a class-action lawsuit?


35 posted on 07/12/2015 6:23:17 AM PDT by null and void (She who uses rope to contain reporters during her candidacy will use rope to hang them when in power)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Libloather
You can read the comments at the site and see the organized campaign to try to excuse this by talking about all the private sector companies that got hacked too. They're so consistent it's pretty obvious they're all reading from the same "talking points" memo.

They don't even realize that bringing that up is actually making it worse. Every one of those breaches that was discovered exposed one or more security weakness in those systems. Any competent security administrator should have been examining his own systems for those same vulnerabilities and getting them corrected once they were exposed and shown that they were actively being exploited.

36 posted on 07/12/2015 6:27:37 AM PDT by tacticalogic ("Oh, bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pepsionice

How can we learn if our information was compromised?


37 posted on 07/12/2015 6:28:16 AM PDT by Caipirabob (Communists... Socialists... Democrats...Traitors... Who can tell the difference?)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Libloather

Outsourcing government work to contractors in Argentina and China? Words fail.


38 posted on 07/12/2015 6:42:18 AM PDT by Will88
[ Post Reply | Private Reply | To 1 | View Replies]

To: Libloather

It could have helped if the database tables were encrypted themselves.

Root access wouldn’t have helped them.


39 posted on 07/12/2015 8:15:22 AM PDT by dila813
[ Post Reply | Private Reply | To 1 | View Replies]

To: gleeaikin

Not to be a smart-mouth, but they’ll be most interested for the time being in 20- and 30-somethings, and file those, uh, older for later use (after they’re no longer with us) to build false IDs; in Asians; skills with non-English languages; overseas assignments; some other criteria.


40 posted on 07/12/2015 8:18:48 AM PDT by SunkenCiv (What do we want? REGIME CHANGE! When do we want it? NOW)
[ Post Reply | Private Reply | To 4 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-48 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson