SEARCH

Entries in Breach (3)

Tuesday
Jun142011

Hackers Break into Senate.gov Website

Jupiterimages/Thinkstock(WASHINGTON) -- Hackers broke into the Senate.gov website over the weekend and were able to access files placed on the server, the Senate Sergeant at Arms confirmed Tuesday, but the breach did not compromise the security of the network.

"The intruder did not gain access into the Senate computer network and was only able to read and determine the directory structure of the files placed on senate.gov," the office of the Sergeant at Arms, which monitors cyber security, said in a statement. "That server is for public access on the public side of the Senate's network firewall, and any files that individual Senate offices place there are intended for public consumption."

The vulnerability in the system was traced back to an individual senator's office, though the Sergeant at Arms did not name the senator. It will also conduct a review into the breach.

"Although this intrusion is inconvenient, it does not compromise the security of the Senate's network, its members or staff," the statement added. "Specifically, there is no individual user account information on the server supporting senate.gov that could have been compromised."

"Lulz Security," which claims to have hacked into Senate.gov, posted the directory names on its web site and on the surface it did not seem to contain any proprietary information.

"We don't like the US government very much. Their boats are weak, their lulz are low, and their sites aren't very secure," the group wrote on its Web site. "In an attempt to help them fix their issues, we've decided to donate additional lulz in the form of owning them some more! This is a small, just-for-kicks release of some internal data from Senate.gov - is this an act of war, gentlemen? Problem?"

This isn't the group's first foray into hacking a government website. In March, Lulz Security also claims to have breached the Web site of the Atlanta chapter of InfraGard, a grassroots group that works with the FBI to counter cyber crime threats. Hackers stole nearly 180 passwords and posted them on the Internet. Lulz Security at the time said the breach was in response to the Pentagon considering whether some cyber attacks should be designated as acts of war. "Lulz" is a hacker/gamer term roughly meaning "just for laughs."

Copyright 2011 ABC News Radio

Thursday
Dec092010

Rep. Pete Hoekstra Says Administration Blocking Full Scope of WikiLeaks Breach from Intel Committee

Photo Courtesy - ABC News(WASHINGTON) -- Rep. Pete Hoekstra, the ranking member of the House Permanent Select Committee on Intelligence, told reporters Thursday afternoon that the WikiLeaks data breach is the result of “a system that provided too many points of access” created in the aftermath of the September 11th terrorist attacks, and that the Obama administration is working to keep the full scope of the breach from congressional oversight by the intelligence committee.

“Massive quantities of data should never have been made available in one place at one system, and it should never have been available to as many people as what it was available to. It was an accident waiting to happen. The accident did happen,” Hoekstra, R-Mich., said. “The Executive Branch ought to be spending its time focus and energy on fixing that problem, assessing the damage, and not trying to figure out how to make sure that this information will not get to the Intelligence Committee.”

Hoekstra said that in past national security breaches, the intelligence committee is historically the first panel in Congress informed about the contents of a breach. But so far, according to Hoekstra, the State Department and the Executive Branch have not provided the committee with the answers to questions and information they have pursued.

Hoekstra, who is retiring from Congress at the end of the session later this month, said that if the intelligence committee is unable to fully access the leaked contents, it “continues to be difficult for us to assess the exact damage that has been done to national security, been done to the intelligence community, defense, or foreign policy.”

Hoekstra also told reporters that he’s not confident that only one source provided all the leaked secret documents.

“I look at this from a systems design standpoint,” Hoekstra said. “The amount of information that was in one place, the number of people that had access to that, the content of that information. No, I’m not at all confident that there was only one source for this information going out.”

Copyright 2010 ABC News Radio

Tuesday
Nov302010

State Dept. Cuts Dept. of Defense Access to Classified Cable System

Photo Courtesy - Getty Images(WASHINGTON) -- As a temporary measure while it determines how to stop future leaks of classified cables, the State Department last Friday severed the link between its classified cable system and the Department of Defense’s SIPRNet classified system, according to a senior U.S. official.
 
The official said this type of mass export of documents is impossible on the State Department network, so this step was taken until the Department of Defense strengthens its security measures. The SIPRNet system is the one Private Manning allegedly used to access and remove the classified information.
 
At a press briefing Tuesday, State Department spokesman P.J. Crowley wouldn’t go into details, but said that the department has taken temporary steps to narrow access to its classified system from one other outside network while it reviews its internal controls. In the future, says Crowley, officials will work to implement features that would detect and stop a mass export of documents.
 
Post-9/11, the government has worked to broaden information sharing throughout departments and agencies. Officials said Tuesday that in light of the recent breach, things might have to go in the other direction. Crowley said they must weigh the “need to know” and the “need to protect” information.

Copyright 2010 ABC News Radio







ABC News Radio