Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

Federal Computers Fail Hacker Test 125

Nintendork writes: "An article by the Associated Press, published on CNN tells of the latest network security report cards earned by Federal agencies. The Department of Defense along with several others failed. I hope terrorists that pose physical threats don't have any script kiddies in their arsenal."
This discussion has been archived. No new comments can be posted.

Federal Computers Fail Hacker Test

Comments Filter:
  • I don't buy it... (Score:3, Insightful)

    by Mustang Matt ( 133426 ) on Saturday November 10, 2001 @02:01PM (#2548707)
    I wish they would have gone into more detail about what tests were ran and how they were failed. It's easy to criticize the government but where are the facts?

    I can't believe that they could have scored at F on any security test. Am I naive?

    Is it physical security or through the internet or what?

    Does anyone have any links that show what tests were done and how they scored on each one?
    • Re:I don't buy it... (Score:5, Interesting)

      by Nick Number ( 447026 ) on Saturday November 10, 2001 @02:15PM (#2548750) Homepage Journal
      I can't believe that they could have scored at F on any security test. Am I naive?

      Well the following paragraph of the article gives some blatant examples of poor practices that were found:

      The GAO routinely hacks into federal computers to test security and rarely fails. At the Commerce Department, for example, the GAO in August found some computers didn't require any passwords; some used "password" as the password; and entire lists of passwords were stored in plain view on the computers themselves. When one Commerce employee detected investigators trying to hack the agency's computers during their testing, he launched an illegal, electronic counterattack against the GAO.

      This isn't all that hard to believe. These networks are huge, and there will always be some people who value convenience over security. The question is whether the admins are understaffed, inexperienced, or simply lax in enforcing policies.
      • I work at a school (Score:2, Insightful)

        by BlueboyX ( 322884 )
        I do volunteer work at a local elementary school. I have been helping them repair computers that got damaged due to renovations during the summer and weird things the teachers do.

        Now, teachers are somewhat educated people. You can't just instantly become a teacher (as you could get some other bureaucratic positions) yet they are technophobic or just plain computer illiterate. Heck, I have to help them set up their vcrs! The extent of computer security that they can handle is putting a password on the Accelerated Reader program so that kids don't change their grades.

        These people are not stupid or ignorant in general. They just know jack about computers. If these teachers, being more educated than your standard bureaucrat might be, can't deal with computer security then how could a standard bureaucrat be expected to?

        Government systems administrators? School networks don't have system admins. They have librarians that know a little bit about computers. That is who will be maintaining the network at the school I volunteer at when I eventually leave. As far as I can tell, they never have had a dedicated computer person in the entire school district who maintains these systems. I know there is a woman in the district who is going to be working on installing more computer equipment, but fixing things doesn't seem to be a normal part of her job.

        Just putting things in perspective.
        • I do volunteer work at a local elementary school. I have been helping them repair computers that got damaged due to
          renovations during the summer and weird things the teachers do.

          Now, teachers are somewhat educated people.


          I work for a large bio-tech company. Most of the company has at least one PHD. But yet I still have to make sure that their computer is plugged in. Some even send their passwords in plain text email to me if they have a problem. That doesnt mean that they are not smart, They are each VERY smart in their own field, the nation's leaders. I can't expect them to be even the slight bit knowledgeable in MY field, or else, lets face it, there would be no need for an IT department at all, they could do it themselves, and we'd all be out of a job.

          If a security audit came through on the day that Person A sent me their password in an email, and person B managed run and install a program that offers up a backdoor, no matter how good OUR security and policies are, we would just have failed.

    • One way to score an immediate 'F' is *not* to secure the default configurations for many systems. If that is not done, default passwords can be used by any shmo with a manual. I am guessing that too many administrators just install devices and leave them alone when they have ensured that they work. That is not going to cut it in any environment that requires secure configurations.
      • by BlueboyX ( 322884 )
        At the school I volunteer at I talked to a woman who will be setting up a new lan. She was discussing how complicated setting up secure networks is with the librarian. She seemed pretty happy with herself that she knew how to prevent people from getting onto the computers by just clicking the 'X' button on the login menu. Her face looked pretty impressive when I told her that another trick lets people get in a system by loging in as 'Default'

        Heh, I used that trick once to get in a hospital computer system where my father worked (he forgot his new password). The X trick didnt work, but Default sure did.

        Let's just face it, we are dealing with normal people here. Not nerds. Most of us here could set up a more secure network than you will find on average. And I include alot of us who have never actually set up a network in that statement. Alot of things that are common sense to us are magical or totally unknown to normal people.

        The only way the gov and various businesses are going to get more secure is if they train their people in computers (unlikely) or hire more nerds (also unlikely, for the gov at least. They cant/dont compete with businesses very well).

        In other words, alot of basic things in the beurocratic and commercial worlds are going to have to change if they are going to seriously make their systems secure.
        • Erm... I'd like to know how you prevent people from using the "X"-Trick, do you mind telling me? It's not about secruity for me but about my parents. They're always confused when they accidently hit Cancel and find a completely different desktop.
          • I am only guessing, but it sounds like the "X" trick is hitting cancel on a win9x login screen? Win9x includes *no* security - does not require login, does not restrict filesystem access, etc.

            To secure such a system, you should, well - upgrade to NT or better still, some brand of *nix. To secure a win9x system you need to use a third party utility. Symantec used to have a product called "Your Eyes Only" which included a bootlock, passworded screensaver, multiuser password administration and encryption. It was pretty good, but was discontinued. If you have win9x and need security the only solution I know of is NAI's Corporate PGP desktop, but I would still upgrade.

    • I don't have any info on that, but I think I know why they havn't said:

      If the tiger teams got in so easily, would-be net.terrorists could get in just as easily. This is just buying them time until their security cluefulness loan clears the bank. It's also possible that this report is a few weeks to a few months old, which would buy them further time. Whether or not this extra time was actually used productively is anyone's guess.

      Proteus' Child

    • I can't believe that they could have scored at F on any security test. Am I naive?

      F is for Fedral

      It is also for fixed ideas, fubar, etc. very simply, if you think you have the answers, you will not look in the right places.

      which is why you get situations like that.

      Fotunately, or maybe not so fortunately, a lot of terrorist are not so interested in computer stuff as tools for their actions. they are more into things that go boom.

      • I don't know for sure, but I would guess most terrorists are more interested in blowing people up than hacking. Kiddies and pranksters hack. Terrorists kill people. This isn't a tough one.
        Now, if you are Education or Social or etc, that's fine. But what about Defense...that could hurt when someone finds a backdoor into weapons orders. Or Transportation...or just general integrity of systems. A good hacker that took out major Fed networks could cause major chaos, and open the door for terrorists. But Al Quaeda is never gonna post to a newsgroup that they hacked the DoE's computers. Or anything like that. They don't care. They want death. So i'm not too worried about terrorists...just idiots.
    • You must be naive. Why would you think that the government, or more specifically all government, would pass a security test.

      Someone like the CIA or FBI, I might find a little hard to believe. However, I worked for the government for a few years and they are seriously laxed in security. Especially net security. They think they are safe behind their little firewalls, but they are penetrable.
  • DoD still runs Windows?
  • Homemade Unix (Score:3, Interesting)

    by Ashcrow ( 469400 ) on Saturday November 10, 2001 @02:06PM (#2548718) Homepage
    A boss of mine a few years back was an ex-administrator on a private mil network. I picked his brain about some of the stuff and he explained that they use NT on the public networks (IE: for email to friends and family and other trivial things) and a hommade UNIX version for their private/secure networks. Of course this was just for his area of the military.

    As for the DOJ, I met a guy who was arested for cracking into it when he was 19. He explained that it is a lot easier than people think and he cracked it about 11 times before he was caught. He now works for a large security consulting group.
    • Isn't the Internet great? Even script kiddies can get jobs!
    • The SSA (Score:5, Insightful)

      by RageMachine ( 533546 ) on Saturday November 10, 2001 @03:15PM (#2548911) Homepage
      I did a small job working for Compaq installing NT4 boxen for the local SSAs (Social Security Agency)(s). They used a Centralized NT 4 server with SP3 (Yes, service pack 3) and the administrator password was... get this... "password1". The client machines loged in to the PDC on a TokenRing network which took minutes just to download a 50k profile. The man who was in charge of all of this was being overpaid, since I could tell that some of these older machines still had virii on them. :\ and the server crashed twice because of a tokenring bug in service pack 3, and they din't know what it was, nor did they know that SP6a was available. The assistant din't even know what Windows2000 was, much less BSD/Linux.

      Yes, the governement does have very terrible security. I thought our taxdollars were paying for more than this? Im not bashing, or trying to be a troll, but wouln't some form of UNIX like BSD, or Linux reduce our tax rates, providing the admins know how to use it? I know they are paying thousands just for that ONE NT4 server running on a Pentium Pro 200, with 128mb ram.
  • by baptiste ( 256004 ) <{su.etsitpab} {ta} {ekim}> on Saturday November 10, 2001 @02:06PM (#2548719) Homepage Journal
    Note this from teh article:
    The grades are based on information the departments gave to the Office of Management and Budget (OMB). Under a new federal law, agencies must report regularly to OMB on their efforts to keep computers safe.
    Please - this was just an audit of what agencies SAID they did. Can you imagine the grade they'd get if they actually scanned the systems and networks for vulnerabilities? A monumental task no doubtm but still scary to contemplate.

    Of course the flip side is that the security may be much better than this report leads you to believe. I'd imagine many gov't sysadmins have secured systems beyond what the paper pushers have speced out for them.

    • If indeed these grades are based no self-evaluation reporting then it is possible that the agencies in question reported terrible problems in an effort to gain additional financial resources. I believe the fact that they reported poor performance to the Office of Management and BUDGET is in line with such a theory.


      Perhaps in effect they said, "We dunno nothin' 'bout dem puters securin matters. Duh. Maybe you give us money to get dat der schoolin? Or maybe we could hire someone whats smarter 'en us?"

    • Yep - no "glory" cracking into a D- system.
    • Please - this was just an audit of what agencies SAID they did. Can you imagine the grade they'd get if they actually scanned the systems and networks for vulnerabilities?

      Actually, I think you need to read the article more closely.

      The GAO routinely hacks into federal computers to test security and rarely fails. At the Commerce Department, for example, the GAO in August found some computers didn't require any passwords; some used "password" as the password; and entire lists of passwords were stored in plain view on the computers themselves. When one Commerce employee detected investigators trying to hack the agency's computers during their testing, he launched an illegal, electronic counterattack against the GAO.

      I'm pretty sure they didn't gather the "we keep passwords taped to our monitors" information through a form that the DOD filled out.
    • Of course the flip side is that the security may be much better than this report leads you to believe. I'd imagine many gov't sysadmins have secured systems beyond what the paper pushers have speced out for them.

      I've worked for or with the DoD for the past 10 years (both as active duty AF and now as a government contractor) - the last 5 working in security. Unfortunately, it has been my experience that your statement is exactly what you said - imagined. (I can really only speak on DoD - The AF and some nameless joint commands in particular.)

      So many security problems exist at so many different levels, it's amazing no major infiltration has occured (that we know about anyway). Sure, IIS web servers all over the DoD are being defaced, but this is small potatos (and on par with the civilian sector). So many "mission critical" systems exist on the NIPRNET (Non-secure Internet Protocol Router NETwork - the DoD's chunk of the internet) with very very few competent administrators... it actually scares me. Patient tracking, Command and Control, Supply, Personnel, and etc. systems ride the NIPRNET. Glean enough information from these systems and you have the equivalent of classified information.

      I said so many problems at so many different levels - What am I talking about? Example: The basics are not being followed. User education is horrendous. I know I could walk into most any secretary's office and find his/her password in minutes. How? Look under the keyboard, inside the monitor's control panel door, under the coffee cup on the desk, inside the top drawer, etc. etc. "Who cares? It's just a secretary. She/He couldn't possibly have access to important information." Well, they don't give secretaries to just any grunt. She's probably the secretary to at least a Colonel (O-6) and she probably has access to his email. What's more littered with sensitive information than a Colonel's or General's email.

      Grab a phone book from any military facility (just look in the trash), get some names, call up the help desk. "This is Sgt Such-and-such... I've just locked myself out. I guess I've forgotten my password. Could you please reset it." "SURE. Your password is now P@ssW0rd. You'll be forced to change it when you next login." (YES, it really is this easy! - I know, I've done it during exercises.) Etc. etc. etc. Pick a basic security best practice and I can guaruntee it is not being followed at most DoD installations.

      I've said this in many previous posts on /. and I'll say it again - MOST DOD ADMINISTRATORS ARE INCOMPETENT! The DoD isn't exactly paying top dollar for their personnel (that's why I'm a governement CONTRACTOR not an EMPLOYEE); Training for the grunts is next to SHITE; and a complete misunderstanding of information security bleeds throughout the top brass in the DoD.

      It's pretty sad, but I keep banging away to make my little chunk of the DoD network(s) more secure. Wish me luck. I think I'll need it!

      • I'm developing an organization wide crypto management system for the NSA/USAF/DOD for my employer as part of a private contract. The security is piled on via air gap and the standard DOD secure communications networks. The software inside the airgap is not failsafe, and runs on top of Winders. Although clearance was needed to work on the project, the details of the project are not actually classified. Certainly there are less secure, less reliable applications used by DOD. The application handles critical data such as air unit comsec encryption keys and launch codes. It should be running on top of the most reliable kernel available.

        The evidence that some part of this system shows signs of complacence/ignorance frightens me.
      • And furthermore, when their people come in and audit these practices, and report them as "unacceptable", there's often tremendous pressure (up to and including "change that to passing and sign it, or you're fired") to simply ignore it, report it cryptically or just plain lie, and go on with your business. Especially in the military, but even in the "civilian" agencies that should know better, such as NSA.
  • by haruharaharu ( 443975 ) on Saturday November 10, 2001 @02:08PM (#2548724) Homepage

    I hope terrorists that pose physical threats don't have any script kiddies in their arsenal

    So, Al Queda is going to deface the DOD's webpage? Who cares? The article mentioned the ever present password list taped to a computer, which would imply physical access. I doubt the average script kiddie has the social skills to get that.

    • There is potentially more at stake here than their website. For all we know, sensitive data could be vulnerable.
    • Actually, if you carry a clipboard and act like you know what you're doing, or carry a pizza delivery bag, you can get in just about anywhere. There was an article a few weeks ago
      here [slashdot.org] talking about just that.
    • and what's to stop an Al Queda member, say, from getting a job with the DOD? I doubt they're going to check the box on their job application that says "Are you a terrorist, either in fact or potentially?"
  • by Tim_F ( 12524 ) on Saturday November 10, 2001 @02:09PM (#2548726)
    I'm not sure I agree that international hackers re the greatest threat here. If I were the US government, I'd be more concerned about the American script kiddies (for example when the CIA site was defaced).
    • Although there are more script kiddies, I still think international hackers are the biggest threat to the government. All script kiddies can do is deface a few websites and cause a some wanton destruction.

      However, spies could hack into the government to gain access to classified information, which is far worse. For example, imagine the Taliban finding out the next place to be bombed and evacuating in advance, rendering the bombings ineffective. That is much worse than a little data loss. Script kiddies wouldn't know what to do with classified information.

  • by Ieshan ( 409693 ) <ieshan@g[ ]l.com ['mai' in gap]> on Saturday November 10, 2001 @02:09PM (#2548728) Homepage Journal
    Personally, I don't buy the article because it doesn't tell which computers failed the tests. Somehow, I doubt there's any sensitive, highly classified information stored on 95% of government computers - most government workers simply don't have access to that type of data or knowledge.

    I'm scared at the fact that someone could report on this with so little attention to detail. It's an article simply designed to scare people into thinking that the US government isn't more prepared than they are.
  • Without a specification of what these letter grades mean, this is all fairly meaningless and subjective. A 'C' could mean anything.
    An 'F' is the worst possible grade, so does this mean that there is no possible way for those agencies to have done worse?

    I found the results from last year here [house.gov]. It's interesting that it was released on September 11 2000.

    • yeah, i've heard of some letter grade systems (used by companies, not schools or anything) that use more than just A-F, I think they go up (or down) to H or so, in which case the gov't systems getting an F wouldn't be as bad (still bad, just not as bad) as we think.
    • I don't think that a grade of "F" means that the security risk couldn't get greater. I think it means that at that point, the risk is deemed unacceptable and it doesn't matter how unacceptable it is, it needs to be fixed. I'm sure that specific reports are freely availalbe to the departments themselves, but that to the public, only the letter grades are released.
  • Vulnerabilities (Score:4, Informative)

    by Rebulator ( 446147 ) on Saturday November 10, 2001 @02:19PM (#2548758)
    It's been known for quite some time that government agencies are quite an easy target. The fact is, most agencies are not centrally controlled as to what software they need to run, much less what service packs/security patches that need to be installed.

    I was on an independant team to go over several different agencies policies and security models concerning the Internet, and this is what we found.

    1) Most of the time we could find a vulnerable host on a network to exploit from the Internet with an off the shelf exploit.

    2) The hosts and their networks usually tend to not have much information worth a terrorists time. I'm not saying that this is an excuse, merely pointing out the fact that if they're running a default install of IIS4, most of the time there isn't much on the network worth the time invested.

    3) Most networks with something worth looking for, have some levels of security in place.

    All of that said, I can assure you that most skript kiddies (the ones that posted to attrition.net, etc) don't have the knowledge to gain access to anything more than a default install on a jpl or nasa.gov host.

    Reb
    • At a school I volunteer at, they are still running win95 and win3.1 Nobody has talked about how they are going to maintain the new lan, nobody on site knows a whole lot about computers (myself excluded, but I am not an employee). Security patches are a non-issue; they aren't even being considered. There simply isn't anyone there to do it.

      This area is powered by old hydroelectric generators; we get significant spikes daily. This school was barely able to scrape together the money for surge protectors. They plugged their computers straight into the wall before they got some. They will be lucky to get security patches every few years.

      If they could barely handle the one-time expense of getting surge protectors, they certainly aren't getting any tech people any time soon.

      On the other hand, there isn't much people would want. Other than elementary level skript kidz trying to mess up the school's computer for fun, they don't really have alot of security concerns. Terrorists aren't likely to attack these machines, and if someone does get in the worst they can do is make the network unusable for a while.

      At least, that is what everyone hopes.
  • scoring system? (Score:2, Interesting)

    by BigBir3d ( 454486 )
    Does 'F' imply no password protection?
    Does 'D' imply posted password?
    Does 'C' imply password?
    Does 'B' imply encryption?
    Does 'A' imply near perfection?

    I presume an 'A+' is un-obtainable. If it has a way in, then, can't it be cracked?
  • by redhotchil ( 44670 ) on Saturday November 10, 2001 @02:22PM (#2548770) Homepage Journal
    ::strong arabian accent::

    Hello, sir, um, secretary, sir, um, could you, um, read the words taped onto your screen?

    "k5jd930d03DfA"

    Praise Allah!

    *click*
  • It must be a mess (Score:3, Interesting)

    by Quizme2000 ( 323961 ) on Saturday November 10, 2001 @02:24PM (#2548775) Homepage Journal
    When one Commerce employee detected investigators trying to hack the agency's computers during their testing, he launched an illegal, electronic counterattack against the GAO.

    This makes it apparent that the IT department is extremly mismanged. Standards and procedures for dealing with hacker attacks, critical loss, and computer abuse are the core requirements of ant IT support. I'm guessing that alot of gov't computers have access to the internet that do not require access for its job function. Every terminal thats connected is a security risk that must be addressed. Probably setup by very underpaid gov't worker that was "trained" in a day.
  • Kept in deep caves, as I understand.

    Once in awhile we have to upgrade the older versions, in which case the older stuff is simply destroyed and replaced with newer operating systems, and operators.

    Microsoft should be so pragmatic.

  • "any" key, which knowing the government, probaly is listed under the 500 dollar hammer.

    I hate to rag on government employees (in some respect I "R" one) but we are not talking about the best and the brightest in the business.

    Most are administration, working joes/janes who just want to do thier job...not unix/window/computer security professionals.

    Does the "F" surprise me? Nope. Can this be improved...oh yes it can. Of course the optimist in me (and the cynic, too) thinks everything above an "F" is an improvement, and I'd be right.

    Let's just hope they don't discover the wonders of Passport because knowing how secure Passport is and the grade they made it would probably be best not to see "if it can get any worse".

    My Humble Opinion.
  • by kindbud ( 90044 ) on Saturday November 10, 2001 @02:38PM (#2548815) Homepage
    When one Commerce employee detected investigators trying to hack the agency's computers during their testing, he launched an illegal, electronic counterattack against the GAO.

    I wish they had defined "illegal, electronic counterattack." What exactly did he do? I bet he did just what any one of you would have done, he performed portscan to see if there were any open ports suggesting a compromised system.
    • I would assume 'illegal' to mean "...against agency policy..." The employee most likely took personal responsibilty of counter-attacking a supposed hacker instead of reporting to the proper departmental channels. In which case (if it were a real hacker and not an internal test hack) the employee could have compromised more of the system or tipped off the hacker that they were noticed causing them to leave and the security department having to deal with the remains of a hack rather then monitoring and tracing a live/current hack. Or causing the hacker to freak and cover his found tracks radically by taking down entire systems.

      I too would have been interested in knowing the guidlines for these grades. Prior to 9/11/01 it is possible that the systems were looked at in a much less crucial manner, whereas after 9/11/01 those reviewing the systems may have been much more critical. This causing the grades to drop when the systems actually remained at the same level of security. - Henry Smith
  • Be careful (Score:3, Insightful)

    by Kiro ( 220724 ) on Saturday November 10, 2001 @02:40PM (#2548819)
    The FBI and CIA have been known to do turnabouts on hackers. Just ask Max Vision. The gov't fought long and hard to demonize and criminalize even the whitest hats of hacking, and Ashcroft's pushing to get them labeled as terrorist acts on top of that.
    The DoD's had it's fair share of smudged histories. Be Alert. Keep your pistol handy.
    Yes, you can be useful in combatting terrorism. Just make sure you know where the line is getting drawn and be on the correct side of it.
    And realize that some of combatting terrorism may go against projects you've been supporting, like anonymous remailers, strong crypto for everyone, anti-censorship protections, and the elusive set of projects working to enable dissidents in countries such as China to safely communicate with the outside world. These and other tools can also be used by the bad guys, and will no doubt become targets

    .
    • Re:Be careful (Score:3, Insightful)

      by BrookHarty ( 9119 )
      Good example, the CIA armed, and gave billions to Afghanistan to fight Russia. Now some of those Afghanistan rebels/terrorists are armed and well funded by the USA.

      Good intentions can turn around and bite you on the ass.
  • Management style... (Score:2, Interesting)

    by GISboy ( 533907 )
    anyone old enough to remember various management styles, would probably refer to this as the "Open Door Policy".

    In my brief stint at a Panasonic refurbishing depot, the management there also had the same policy.

    "My door is always open, as long as you never walk in, it will remain so."

    "First rule of management; EVERYTHING is your fault" --Hopper, A Bug's Life.

    (note: misfiring neurons due to my son startling me awake at 5am. sigh.)
  • Does anyone find it odd that Microsoft has more security measures on their internal processes than the Department of Defense?

    Seems to be indicative of Microsoft's sense of self-importance and the DOD's sense of self-security...

    -Chardish
  • A few things come to mind, they need to be more worried about dumb ass script kiddies, even an idiot can run a program and do something, crackers would be their next likely problem. If they want some help, I'm sure there are many hackers that would jump at the chance to work for them. It is a tough time in the technology field right? Besides, who is more likely to know about all the exploits, crackers for sure, but a very good chance that it is the hackers who were the people that originaly found the exploit.

    We don't have our noses's burried in books and reading the "latest and greatest" security information for no reason.
  • After operation desert storm, where Iraq basically just took a big chunk of their young male population out for incineration, there are probably a number of Iraqi women looking for husbands. This means many of them will end up being geekettes.

    Now, we all know that geeks don't like girls except for the electronic kind so there is no danger of Iraqi geekettes showing their favors to Western geeks thereby offering them a better deal than they have gotten in the West -- particularly not when the likes of Jon Katz are granting the Western geeks the favor of writing stuff about the wonders of globalization of the West at which geeks are allowed to gawk for simulated exhilaration.

  • big deal (Score:1, Insightful)

    by Anonymous Coward
    I contracted for an audit department for the DoD and they had nothing but accounting on their computers (novell and windows). Big deal, are people going to hack in and see what their are paying their various contractors. I'm sure that the stuff that should be really secure IS really secure.
  • Systemic Problems (Score:5, Insightful)

    by Marcus Erroneous ( 11660 ) on Saturday November 10, 2001 @03:16PM (#2548917) Homepage
    Having worked for the government for awhile, both in and out of the military, there are several insights for that part of the network. For awhile, the official architecture was Windows NT. Regardless of it's strengths or weaknesses. We were using Novell at the time and under constant pressure from on high to get with the official architecture. Fortunately, my boss was more concerned with costs and effectiveness than official position. However, security wasn't an issue. Even in '98 we didn't have a firewall and the director didn't see the need for one. And since he didn't see the need for one, there wasn't going to be one. Only secure networks were using firewalls, and they weren't using NT for that. You might say, "I thought you just said the official architecture was to use NT?" and you would be correct. But even MS couldn't overcome the obligation for classified networks to look at security and stability first and evangelism second. The firewalls were manned by *nix boxen or other platforms and people that knew how to configure them.
    Another problem is the civil service. You can have someone rise from a computer background to head a major department responsible for all IT and Telecomm issues that can barely use an e-mail client and can't explain one difference between ISDN and POTS. Then, they hire based on longevity. If you show up with the qualifications for a gs-9/10/11 position but haven't been in civil service, don't even think about it. Come in as a 4 or 5 and work your way up. Those inside the system feel that the higher position should be their's by virtue of having "put in their time". Promotions should be based on how long you've been in the system, not whether or not you can do it. My wife, who was in the civil service was once warned not to even think about applying for a specific position. Despite have a degree in the field and current certifications (medical field where those things frequently mean something) she hadn't been there long enough to deserve to apply for it. The woman who warned her used to have current qualifications, but had stopped bothering to stay current over 10 years ago. Nor attend any sort of training or classes to at least stay up on developing techniques. Not smart in any field. This sort of personnel system doesn't encourage people to stay or even to try to hire on. At this particular installation, those of us that could move on, did. Oh, did I mention that the pay isn't one of the more enticing features? I started at a large corporation making more than the director of that organization. Not that I make that much, they make that little.
    Let's see, forced system architectures from the top down. A system that rewards longevity at the expense of competence. No central policies to control and/or coordinate at the command level, let alone service level, let alone within the civilian side of the house. And an incredibly low pay scale. I can't imagine why there would there would be any deficiencies. The good news is that there still exist some competent, dedicated people within this structure. Which is why any of the networks and/or machines passed at all.
    • Years ago, there used to be a hotline to report fraud, waste or abuse within the U.S. government. It shouldn't be too hard to put together a case regarding Microsoft products in one or more of those categories and then report it. There may even be a financial reward.

      The decision to use NT over viable alternatives such as UNIX or Novell could certainly be questioned.

  • by raumdass ( 210351 ) on Saturday November 10, 2001 @03:18PM (#2548921)
    Anyone who has put in a few years doing IT or security at a big organization (University, large corporation, whatever) can attest to the fact that the people who are ultimately in charge of the Big Security Decisions (i.e. the ones that can write the checks or sign-off on policy) are often the ones that have the least clue about it. They don't see the "Bad Guys" parked outside with their tools and getaway cars, waiting to break in while your not looking, so they think worrying about security and user education is either a waste of time and that you're too paranoid for always talking about "security", or they've bought whatever line they were sold by whomever sold them the promise of "security" and delivers instead a world of Macro Viruses and Code Red worms.

    While I have to believe the "really important super-secret stuff" is kept safely locked away by geeks wiser and smarter than us, it cannot come as a surprise that the state of government computer security is about the same as security on the internet at large... it mostly sucks. Why? We can blame the software companies that release easily exploited code, and maybe we should start making them more accountable, but as long as people keep picking dumb passwords, administrators keep letting them, and they in turn keep following poor practices (fricken clear-text password lists!?!), then this what happens.
    • There is a duty for the people who can decide on security policy and pay checks to realize a few facts about IT security. While the best security may not always be affordable just understanding that each node on the Internet is a possible "bad guy" with tools and a getaway vehicle. The bad guys are everywhere and anywhere and you just can't ever know.

      Jeremy
  • What would you do if some group offered you to perform some hacking job for a silly amount of money and you needed that money for survival (food, etc). Would you choose morals over survival if the hacking job didnt harm lives and was just some sort of DoS.

    If it involved lives im sure morals would win in the majority of cases.

    But what if...
    • "If it involved lives im sure morals would win in the majority of cases. "

      Let's continue that scenario a little.

      If it involved terrorists trying to get in DoJ computers, the choice is probably 'do it or die.' All they have to do is find one nerd who feels his own life is more important than the DoJ computer system and they are in. Doesn't sound too hard...
  • The reality check (Score:2, Interesting)

    by Anonymous Coward
    I am currently a sysad for a small military unit that has 3 WinNT servers (one PDC and 2 BDCs) using MS Exchange 5.5. I have done all I can to lock/patch these monsters down, but it seems like every damn day I am patching this, reinstalling SP-whatever on that. As long as they rely on MS software, it is always going to fail. I have been screaming about getting a firewall for months and months now, but they just look at me and tell me "We don't have the money yet." DON'T HAVE THE MONEY YET!?!?!?! THIS IS THE FRICKIN' DoD WE ARE TALKING ABOUT! I have seen them waste more money on building electro-conference rooms and overhead projectors for useless cheese slides! My nets get scanned by outsiders at least 3 or 4 times a day, and that is only because I HAVEN'T had them registered in the .mil DNS system. If I did, the number would go up.
    The Emperor has no clothes, gentlemen, and I have no sympathy for ANY Government network that gets hacked, when it could have been prevented.
  • Federal Computers Fail Hacker Test


    Damn. I knew computer AI was not advanced enough to simulate real intelligence, but I thought by now computers would be smart enough to pass a hacking test, since the pseudo-intelligence required to perform as well as scrip-kiddies is so low. But some Israeli firm even claimed to have a computer which was as smart as a 2 year old. I guess give that child/computer 10 years and we'll be there.

  • The report itself (Score:3, Informative)

    by jamie ( 78724 ) <jamie@slashdot.org> on Saturday November 10, 2001 @03:37PM (#2548963) Journal
    Here's the presentation by Robert Dacey (Director of IS Issues at the GAO), which the AP story references. Always more enlightening to go to the source:

    http://www.gao.gov/new.items/d02231t.pdf [gao.gov]

  • Yeah, I'd probably stick them into the firing chamber and lob them at the enemy too... that's about all they're good for.
  • This doesn't surprise me a bit. I work for a law firm who does a fair bit of work dealing Federal courts who REQUIRE electronic filings. You can't submit a brief or pleading on paper; you have to submit a .PDF file of the document to the court through their web site.

    Guess what systems have been widely infected by Code Red. And Code Red II. And NIMDA. These are organizations who are expected to serve a public trust, and who are DEPENDENT on their web servers to stay up. Not only do they fail to keep up with security patches (Code Red), they fail to apply patches when it becomes obvious they've failed to do so (Code Red II). They don't even apply patches or take servers offline when they've been rooted (NIMDA).

    I couldn't figure out where all the Code Red etc. worms were still coming from until I discovered this while working with an attorney to file a brief with an infected court system. Your tax dollars at work.
    • I would just like to add some insight to this.. I work for the Federal Courts in Systems, and while I know that all of the districts are not like this, ours is very secure compared to what I've heard described. Our users run 98 through Novell, but everything is behind a firewall. For our servers we run a combination of Novell and Unix/Linux. We are very security conscious about anything that happens, and our main sysadmins don't let anything even potentially compromising through.. as I'm just near the low end of the totem pole, I don't know the specifics of all the setup, but everyone has current certifications on everything they do, and for the most part knows what they're doing. So not *ALL* government systems are bad.... maybe just most of them. :)
  • An even more possible threat of this would be the after marketing.

    If a hacker to access the Gov systems, extract the information they wanted and then with the increasingly more intelligent virii/worms being developed, attach the information to a worm and set it loose in the wild. The virii/worm wouldn't even need to be malicious. Imagine the ramifications of someone obtianing 'real' govermental Area 51 information or President Kennedy assasination cover-up documentation and distibuting it.

    The information alone could cause a government break down from within the US and distrust in our leaders.

    The potential problems of anything less then an A+ could be severe! - Henry Smith
  • F is for ... (Score:2, Interesting)

    by blang ( 450736 )
    Freedom of Information. For once, the feds have chosen the most efficient way to implement something.
  • It's a well known fact that the Department of Defense pretty high on hackers' hit lists. I think it's up there right under AOL and Microsoft.
  • Holy crap, man! How insecure federal government computers, along with AOL and other huge companies, have shown to be! It almost makes me think that it's *difficult* to completely secure an entire /8 subnet when you have tens of thousands of employees responsible for different pieces of it.

    My guess is, they may have hacked into a few desktops running winders, but getting into shell.int.us.mil is still relatively difficult.
  • Likely the most sensitive sites are built on some custom UNIX stuff, but isn't a good portion of the U.S. government simply standardized on Microsoft products?

    Well, when you're tapdancing through a minefield, you shouldn't be surprised when you wind up legless.

    ~Philly
    • I don't think so. In the area I worked (USDA) there was computing WAY before MS. And since most people don't like change, it stayed that way even into the early 90s. Only during the past few years have they pushed for "desktop" machines... even when I worked there (97) alot of work was still done through remote X to a set of AIX servers... even with all the difficulty they had keeping them up, people continued to insist on using them. That's another story. :)
  • I'm currently a Network/Security Engineer for one of the larger DOD networks (appox 10th largest Class B network in the world) Since I've started working here, I've realized a lot of things that are slightly disturbing about the way security is managed. I have had my boss tell me that he didn't care if a new business process would completely undermine our security infrastructure as long the users don't have to login second time. The point I'm trying to make is that there are a lot of very intelligent and hard working people in the federal networks. The problem is a management system that promotes 'appearance' over 'reality'. If we had our way and had the authority to enforce our security model on all of our sites our network would be tight as a drum. One thing to note though. When the GAO did audit our security, they weren't able to get far enough into out network to even perform basic mapping. On top of it, they whined when we blocked them after detecting the attacks on our IDS consoles. I guess the moral is, you can bring your manager a cup of water, but you can't make him drink it.
  • Yeah.. but then again.... Its always been a fact that the Yanks can`t keep a server secure to save themselves. How many times have you seen a server attached to the UK government being hacked? Answer = twice How many times have you seen a server attached to the US government being hacked? Answer = EEEEK!!!
  • You know, as a security engineer laid off from a telecom recently, I think there is an interesting perspective here. I don't know when the report was written, but if you remember, the government spent the past three or four years prior to this preparing for Y2K. These same folks gave most of the government F grades on their Y2K preparedness, but come 1 January, 2000, the government computers didn't shut down, nuclear reactors didn't melt down, aircraft didn't fall out of the sky and the air traffic control system didn't go off the air.

    Now, in the post-September 11 landscape, this report hits the streets. Do you think the GAO had time to go and do a complete survey in the last two months? No. the legwork for most of this report was probably done this year, but I think the government's views have changed, at least on the higher levels, since 9/11.

    Are there still sites which put their password list within view of the computer? Yes. Are there lazy or slothful admins in government service? Yes. Are there good and secure networks within the government? Absolutely. Are there similar problems in the civilian market. You betcha.

    As I said, I was laid off from a telecom. I have seen, since 9/11 that the government is hungry for security folks. The civilian market seems to be taking the approach that if they don't change the status quo, they are safe. There has not been much change in the requirements for security folks, where the government has seen the light.

    The other thing I have seen is that your biggest problem is with upper management when it comes to security. Even if they do sign the checks, they are also the ones who feel that the rules don't apply to them. They think that its the rank-and- file's problem, and that they are above the law. User education is hardest in dealing with upper management.

    All in all, I think the government is moving in the right direction. I wonder about industry...
  • I quote the article's title:

    Federal Computers Fail Hacker Test
    Don't you mean 'cracker test'?

    (Woot, now my /. purity value will go down even more, since I've now explained the difference between 'hacker' and 'cracker' to a member of the press!)
    • There is no difference between hacker and cracker, although if you use cracker, most non-geeks will think you're talking about a saltine.

      The language changes, ESR notwithstanding. Get over it. There's nothing sillier than geeks trying to be pedantic about usage. (Oh, and let's not forget what a geek is.)
  • Fact: People are stupid.
    This implies that people don't think when they choose they're password.

    Fact: People are lazy.
    Fact: "1234" is a helluva lot easier to remember than "jE9kNq^"
    Thus stupid people choose stupid passwords.

    Quick Fix:
    Access Card, Fingerprint ID, Retinal Scan, Voiceprint ID, Facial ID, or combination thereof.
    If your working for the department of defense and have information worth protecting, the least you could do is swipe a card and say "Hello, My name is ______ ____, My voice is my passport, verify me" before using your computer. Then only people as smooth as the guys in Sneakers could crack it.
  • I can attest first had why the DoD has failed security tests. I am an electronics technician in the Navy, and as one of my collateral duties I play network administrator, the actual administrator is not to knowledgable to be kind. The reason that I say 'play' is that my main job is to make sure that all of my HF/UHF/SHF radios are maintained and all working, this takes priority over everything else, I have to fit administration in on the side. The rating in the navy that would actually be responsible for the computers would be the information technicians. The problem is, is that most of them don't know how to operate a computer, let alone administer one. The school that they send the network administrators to is a 3 month crash course in basic computers and very basic administration, then they come straight to their network admin job and become in charge of the whole network. The organization of the military, unfortunately allows for people to be in charge of something that they know nothing at all about. When I came to my current command, the person running the network had used his first computer 6 months prior, needless to say the network was administered horrible. None of the computers had virus scanners (or had one, but it was disabled and never updated). Most of the passwords used were something that could be guessed using a very basic dictionary. Luckily we were behind a pretty good firewall, managed somewhere else by someone who knew what they were doing. This network that I am speaking of is for unclassified information. The network that is for classifications above that is set up pretty good, and uses some pretty advanced technology to guarentee that nobody can snoop in. Although like any computer, if you have access to the local machine, you can get anything you want off it.
  • I am curious as to what operating systems and daemons the government sites are currently using. I would like to see a list of this to see as to:
    1: How much is spent on computer security.
    2: Salary of these so called admins for these networks.
    3: What OSes the government has standardized on.
    4: To determine if one OS is better than the other.

    Since each different division uses different software, which OSes are the least vulnerable and start converting to those OSes.

    Another thing that should be pointed out is that the departments that got "F" marks should suspend/fire the admin without pay or atleast get a new admin and send the current admin to a 1-2 year course on the specific platforms.

    Another thing I have noticed is that there really is NO security schools to help admins get a better knowledge of securing OSes. Maybe this idea can be a new niche market for anyone out there interested in teaching computer security.
    • About four years ago I visited my dear-ol' dad's office on a DoD base, and half the comps there were running Windows 1.0 on MS-DOS 3.0. Do we still consider that vulnerable even though it doesn't natively support networking? Perhaps regression is the best method of protection.
  • Does NT4.0/2K/XP allow arbitrary length passwords? (Sorry, been Win-free for a few years now.)


    I don't see why computers don't all come with a diceware program or a pronouncable password generator. Random, secure passwords are pretty easy to comy by, assuming /dev/urandom or equivalent is sufficiently random.

    I could come up with a good 2,048 word list off the top of my head, which would mean 11 bits of entropy per word. Random capitilization of the first and last letters means 13 bits per word. That's five words for about the strength of 64-bit encryption. Anyone should be able to remember 5 words. Assuming account lockouts for 15 minutes or so after 3 failed logins, this should be sufficient. Of course, Windows networking sends salted hashed passwords in the clear, right? That would mean you probably want at least about 80-bit strong passwords.


    I really need to just sit down and write that password generator I've been meaning to get arround to. The hardest part is the 2,048 word list.

    see diceware [diceware.org] for a simple way to generate secure passwords.

"Here's something to think about: How come you never see a headline like `Psychic Wins Lottery.'" -- Comedian Jay Leno

Working...