Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

State Department Hit With Many More Break-Ins 143

adjust28 writes to tell us CNN is reporting that the US State Department has been dealing with a number of computer break-ins with regards to their headquarters and offices dealing with China and Korea over the past couple of weeks. From the article: "Investigators believe hackers stole sensitive U.S. information and passwords and implanted backdoors in unclassified government computers to allow them to return at will, said U.S. officials familiar with the hacking."
This discussion has been archived. No new comments can be posted.

State Department Hit With Many More Break-Ins

Comments Filter:
  • Lack of motivation (Score:5, Interesting)

    by Anonymous Coward on Wednesday July 12, 2006 @03:48AM (#15703862)

    The government seems to have never placed much importance on computer security. I recently read Cliff Stoll's 1989 chronicle of a hacking, The Cuckoo's Egg [amazon.com] . Back then the government was slow to respond and pretty unmotivated, and it seems like little has changed today. Yet, once they catch someone, they give him a draconian punishment that ruins his life, just look at Mitnick. The government can't seem to decide it's priorities. It'll punish you more for cracking than for murder, but at the same time it won't secure it's own systems and heed experts.

  • by mcrbids ( 148650 ) on Wednesday July 12, 2006 @03:56AM (#15703885) Journal
    I spent a few months not so long ago tracking down a cracker who had compromised a mail server for an ISP. He'd gotten root, and installed rootkit style stuff that hid directories, etc.

    It was a long process to penetrate all his defenses. Finally, I ended up chatting with the cracker a la Yahoo Chat, including video. He was from Romania, and liked diet 7-up.

    So, I get all the sources together with which he compromised the server. I had everything, down to IP addresses. I called the FBI and they referred me to some web page that didn't even allow enough upload to report everything I had found.

    I submitted what I could. I didn't even gt a "thank you" email. I would have been happy with a "thank you" message. But I got nothing.

    My opinion of the dept of Homeland Security as well as the FBI sank immeasurabily as a result.
  • The horse has bolted (Score:5, Interesting)

    by jdbartlett ( 941012 ) on Wednesday July 12, 2006 @04:10AM (#15703918)

    I don't want to trigger a Windows/Linux debate, but relevant is this quote from a recently slashdotted interview with McKinnon:

    "I found out that the US military use Windows," said Mr McKinnon in that BBC interview. "And having realised this, I assumed it would probably be an easy hack if they hadn't secured it properly."

    Source here [bbc.co.uk]

    Even if it is considered right to treat such breakins so seriously: how many times must the horse bolt before the barn door?

  • Disabling security (Score:3, Interesting)

    by Mr. Freeman ( 933986 ) on Wednesday July 12, 2006 @05:53AM (#15704062)
    After the State Department break-ins, many employees were instructed to change their passwords. The department also temporarily disabled a technology known as secure sockets layer, used to transmit encrypted information over the Internet.
    Wait a minute, they actually disabled their security after they got hit with an attack??!? Someone tell me if I'm wrong about secure sockets layer being a security measure of sorts.
  • by aadvancedGIR ( 959466 ) on Wednesday July 12, 2006 @07:40AM (#15704256)
    SSL is good news for you when you try to connect to your bank, but very bad ones when you don't know your machine has been changed into a server by a trojan.
    I believe their target were the incoming SSL connexions.
  • by NickFortune ( 613926 ) on Wednesday July 12, 2006 @08:10AM (#15704350) Homepage Journal
    Entering a computer that has no password or no security is NOTHING like not locking the door of a house.

    I can sympathise with a desire to see the correct terminology used, but in this instance, I'm not sure I can see the harm.

    The trouble is that hacking is, in terms of human society, comparatively new. Everyone understands the times when it is right or wrong to enter someone else's house. The same is not clear for remote computer access.

    So, it makes sense to look for an situation analagous to unathorised access and reason from that starting point. A lot of people, myself included, find the housebreaking metaphor apt.

    Of course, it remains an analogy, and necessarily inexact, but it does provide a useful frame of reference. I'm not sure it's possible to consdier the issue without one. Is there anything intrinsically good or bad in accessing a computer system? Why should permission alter the scenario? At least if we talk about houses and bolts we make our presumptions clear from the start.

    Do you think the analogy is unhelpful? Do you have a better starting point? I can't see how else to approach the problem.

  • by infosec_spaz ( 968690 ) on Wednesday July 12, 2006 @09:56AM (#15704922) Homepage
    Right....Classified systems are on a seperate network...until, that is, some network eng. patches them together to make his/her job easier. Have you ever done a audit of a military/government network? I personally have, and found over 60 paths to so called "Secured" networks from a machine which was Internet accessable...Let's stop cherry picking, and call it like it is...totally kludged up, non-functonal, messy security at best.
  • The U.S. government is doing a great job of making the papers out to be 'the bad guys', and one can only imagine that it's certainly not helping their subscribership.


    Actually, I'd guess that in this political climate, it's helping their subscribership quite a bit.

    Two things:

    1) The Bush administration has failed to realize that the "trust us, we know what we're doing" meme has died. Every time they push it these days their numbers go down.
    2) The facts of this particular story was out YEARS before the NYT (and two other papers, btw) put it in the public eye. As those facts come out (and they have been) it will exascerbate #1 above.

    Gov: "Realeasing this information will kill us all!!"
    NYT: "So why did you release it on government websites two years ago?"
    Gov: "UUUhhhhhh.... MMmmmmmMMmmm...."

If you think the system is working, ask someone who's waiting for a prompt.

Working...