Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

niyad

(113,291 posts)
Sat Jun 15, 2013, 10:22 PM Jun 2013

why are massive national security breaches so ridiculously easy?


Why Are Massive National Security Breaches So Ridiculously Easy?


While attending the court-martial of Pfc. Bradley Manning in Fort Meade yesterday, I was reminded once again that the biggest security breach in US history was as challenging and intricate as instant coffee. Witness after witness from the subcontracted world of “information assurance” took the stand to declaim the military’s ironclad information security (“InfoSec”) protocols and to also mumble about how these rules were never enforced. Installing the instant-message chat program mIRC may have been “not authorized,” but that didn’t keep the military itself from issuing bulletins on how to install it. Reporters from The Guardian long ago sketched the scene in the “SCIF”—“senstitive compartmented information facility”—at FOB Hammer where Manning worked in Army Intelligence as a scene of freshman-dorm indiscipline, with passwords posted on sticky-notes and everyone watching movies and playing online games, against the regs, on their computers. Manning famously exfiltrated the files on CD-ROMs in Lady Gaga drag, got them onto a memory stick which he later uploaded in his secret hideout, a busy Barnes & Noble in suburban Maryland, over an open WiFi signal. There really was no infosec to speak of at Pfc. Manning’s deployment, and the selectivity of punishing him for unauthorized behavior that was pandemic—if not as bold and meaningful as his—will surely come into play when it’s sentencing time.

A bigger question: Why are so many massive national security breaches ridiculously easy?

Consider the crack commando unit that busted into the Y-12 National Security Complex (famous for its uranium processing) in Oak Ridge,Tennessee, last July. By “crack commando unit”: I mean an 82-year-old nun, a housepainter and a man who listed his occupation as “drifter.” And yet these three members of the Transform Now Ploughshares Catholic peace community made it through three layers of security, James Bond–style (hardware-store bolt-cutters through chainlink fence) before eventually being happened upon by security guard Kirk Garland. (Garland was the only one at Oak Ridge fired for the breach; his very creditable lapse was not pulling his gun on the activists.) Sister Megan Rice, Michael Walli and Greg Boertje-Obed, I salute your courage, your message of peace and your mockery of the security at our nuclear facilities.

Airport security, it grows ever more intrusive with porno-scanners, pat downs and ten-plus years of gratuitous shoe removal in what few experts consider to be more than gestural security theater. Have our airports been secured? Ask Daniel Castillo, who accidentally beached his malfunctioning jetski on the embanked border of JFK Airport in New York last summer, climbed over an eight-foot fence and walked across two runways in a fluorescent yellow vest before anyone noticed him. Or the drunk driver who crashed his SUV through a fence and onto a runway at Philadelphia International Airport in March last year. And these two guys weren’t even trying!

But it’s infosec that’s the biggest joke of all. Our government sporadically bestirs itself to prosecute an Aaron Swartz or a Bradley Manning in a vain attempt to look serious. But the way the feds and the military handle information is as sloshy as a tray at the height of Oktoberfest. US military hard drives full of classified material, for sale at the Kabul bazaar! Documents about US war crimes in Iraq turning up at the town dump! Leon Panetta spewing, Tourettes-style, operational intelligence to Hollywood people and a top-secret Navy SEAL identity before an audience of a thousand people! Dana Priest and William Arkin in their fine recent study of grotesque secrecy bloat, Top Secret America, note that all sorts of classified material works its way onto the web, often because the senior intelligence officials don’t understand the file-sharing software that their kids install on their laptops.
“Don’t they vet these people?” has been a common indignant snort in response to the disclosures from contractor Edward Snowden. The truth is, there are 1.4 million people with top-secret security clearance, and you simply cannot vet 1.4 million people in any thorough way. Ben Franklin once said that three can keep a secret, if two are dead. Who are we kidding? Any piece of information that 1.4 million people are authorized to get at is really not a secret.

. . . .
http://www.thenation.com/blog/174791/why-are-massive-national-security-breaches-so-ridiculously-easy#axzz2WLETgusQ
3 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
why are massive national security breaches so ridiculously easy? (Original Post) niyad Jun 2013 OP
They aren't designed to be secure. HooptieWagon Jun 2013 #1
You are correct. Anytime you wonder about this shit, russspeakeasy Jun 2013 #2
. . . niyad Jun 2013 #3
 

HooptieWagon

(17,064 posts)
1. They aren't designed to be secure.
Sat Jun 15, 2013, 10:31 PM
Jun 2013

They are designed to maximize profit for the contractors. How else can you explain an $8 billion electronic eavesdropping program failing to catch a couple Chechan brothers who are all over facebook, and the Russians even WARNED us about them?

russspeakeasy

(6,539 posts)
2. You are correct. Anytime you wonder about this shit,
Sat Jun 15, 2013, 11:13 PM
Jun 2013

just follow the money. So far, I'm batting in the high 800's.

Latest Discussions»General Discussion»why are massive national ...