Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Zorro

(15,740 posts)
Sun Aug 25, 2019, 12:18 PM Aug 2019

Hackers could have breached U.S. bioterrorism defenses for years, records show.

Source: LA Times

The Department of Homeland Security stored sensitive data from the nation’s bioterrorism defense program on an insecure website where it was vulnerable to attacks by hackers for over a decade, according to government documents reviewed by The Times.

The data included the locations of at least some BioWatch air samplers, which are installed at subway stations and other public locations in more than 30 U.S. cities and are designed to detect anthrax or other airborne biological weapons, Homeland Security officials confirmed. It also included the results of tests for possible pathogens, a list of biological agents that could be detected and response plans that would be put in place in the event of an attack.

The information — housed on a dot-org website run by a private contractor — has been moved behind a secure federal government firewall, and the website was shut down in May. But Homeland Security officials acknowledge they do not know whether hackers ever gained access to the data.

Internal Homeland Security emails and other documents show the issue set off a bitter clash within the department over whether keeping the information on the dot-org website posed a threat to national security. A former BioWatch security manager filed a whistleblower complaint alleging he was targeted for retaliation after criticizing the program’s lax security.

Read more: https://www.latimes.com/science/sciencenow/la-sci-biowatch-20190402-story.html

6 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Hackers could have breached U.S. bioterrorism defenses for years, records show. (Original Post) Zorro Aug 2019 OP
Unfuckingbelievable. 50 Shades Of Blue Aug 2019 #1
Okay, so I'm not an IT person and know very little about PoindexterOglethorpe Aug 2019 #2
Sounds like they're not IT people and know very little about cyber security. defacto7 Aug 2019 #5
Why does everything have to be on a website? Owl Aug 2019 #3
Access. Igel Aug 2019 #4
It doesn't. But if one goes that route defacto7 Aug 2019 #6

PoindexterOglethorpe

(25,862 posts)
2. Okay, so I'm not an IT person and know very little about
Sun Aug 25, 2019, 01:23 PM
Aug 2019

cyber security. But shouldn't the people in charge of that information AND the people in charge of the website have been just a mite more concerned about such thing?

defacto7

(13,485 posts)
5. Sounds like they're not IT people and know very little about cyber security.
Sun Aug 25, 2019, 02:38 PM
Aug 2019

That's not unusual in government these days. I do have cyber security experience and it's not really that difficult. Makes one wonder.

Igel

(35,320 posts)
4. Access.
Sun Aug 25, 2019, 02:33 PM
Aug 2019

If there are attacks on 5 different cities and everything's ubersecure, then somebody with access will have to find the data, process the data, package the data, and get it out to everybody who should have that data in the 5 cities. Good luck with that--just keeping the database of who should have access would be a nightmare, as people change jobs and are promoted.

Moreover, if there's anything interesting about the data that managers in 50 other cities should know, that agency will have to dispense the information.

Moreover, if the data were secure and secret, then there'd have to be some way of getting the data in a secure way from the monitoring equipment to the server. The monitoring equipment is exposed to the public 24/7/365. The connections are public. It's not an easy and cheap problem to solve.

So put it on a website. 100 cities want the info? Fine, 100 cities get the info, including the 5 who require it (in full) and the 50 that might have a need.

But think about it. You're a hacker, a terrorist, whatever. You can tell if your attack's worked by accessing this information--but, you know, you'd learn that soon enough. You can tell if there's been an attack if you're an enemy country. But the only risk is that the database is hacked in one of two ways: To mask an attack or to signal a false attack. Masking an attack would prevent steps being taken quickly. A false attack would be fairly quietly managed.

The OP doesn't say the website contains detailed plans, knowledge of which would help a terrorist bypass precautions. It at best says where the detectors are set up--and I'm not sure that would be a big problem unless you're transporting anthrax in a leaky container.

defacto7

(13,485 posts)
6. It doesn't. But if one goes that route
Sun Aug 25, 2019, 02:47 PM
Aug 2019

they had better know exactly what they're doing and expect and be prepared for the consequences. It's really unnecessary. Access is no excuse in the present environment.

Latest Discussions»Latest Breaking News»Hackers could have breach...