Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Feds: TSA Worker Tried to Sabotage Terror Database

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
friendly_iconoclast Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 03:31 PM
Original message
Feds: TSA Worker Tried to Sabotage Terror Database
Edited on Thu Mar-11-10 03:43 PM by friendly_iconoclast
Source: Wired News

Feds: TSA Worker Tried to Sabotage Terror Database

A former Transportation Security Administration contractor is being charged in Colorado for allegedly injecting malicious code into a government network used for screening airport security workers and others.

The malicious code, a logic bomb installed last October, was designed to cause damage and “disrupt” data on servers on an undisclosed date but was caught by other workers before it delivered its payload.

Douglas James Duchak, 46, had worked as a data analyst at the TSA’s Colorado Springs Operations Center (CSOC) since 2004. The CSOC is used to vet people who have “access to sensitive information and secure areas of the nation’s transportation network,” according to the indictment. A source involved in the case said this involved screening of both passengers and workers at airports and other transportation facilities.

He pleaded not guilty in a Denver federal court on Wednesday and was released on a $25,000 unsecured bond. The indictment did not say whether the malware was crafted to erase or alter data, or simply disable servers.

The CSOC network stores updated information from the government’s terrorist watchlist as well as criminal histories from the United States Marshal’s Service Warrant Information Network.....

Read more: http://www.wired.com/threatlevel/2010/03/tsa-worker-charged-with-attempted-sabotage/



More discussion here:

http://www.goodgearguide.com.au/article/339185/former_tsa_analyst_charged_computer_tampering/

http://www.boingboing.net/2010/03/10/tsa-analyst-indicted.html

Fear not, citizens! Your government is keeping you safe.
Printer Friendly | Permalink |  | Top
cutlassmama Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 03:37 PM
Response to Original message
1. shouldn't that be treason?
Printer Friendly | Permalink |  | Top
 
Mithreal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 03:56 PM
Response to Reply #1
6. Treason, not when some people do it.
Edited on Thu Mar-11-10 04:04 PM by Mithreal
"was released on a $25,000 unsecured bond"

:wtf:
Printer Friendly | Permalink |  | Top
 
gratuitous Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 04:02 PM
Response to Reply #6
8. That seems an awful low bail for such a serious charge
You can buy a bond for $2,500 to get $25,000 worth of bail. No security, and the guy can just skip. $2,500 could be a hard blow, financially, but going away to jail for a long time might make it worth the loss of the money. I wonder if the authorities are hoping he'll bolt, rather than expose how ticky-tacky their security system is, and how it's not really "protecting" anything except some phoney baloney make work jobs?
Printer Friendly | Permalink |  | Top
 
HereSince1628 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 03:37 PM
Response to Original message
2. Oh, now, that's unfortunate!
Series!111!
Printer Friendly | Permalink |  | Top
 
Lerkfish Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 03:39 PM
Response to Original message
3. they need to find out the incept date ASAP
it might be a scheduled terrorist attack.
Printer Friendly | Permalink |  | Top
 
friendly_iconoclast Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 03:54 PM
Response to Reply #3
4. He's the first we know of that got *caught* (allegedly).
How are we to know of any other possible hackers if they are/were good enough and/or lucky enough to cover their tracks?

Quis custodiet ipsos custodes? ("Who watches the watchers?")
Printer Friendly | Permalink |  | Top
 
Xipe Totec Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 03:55 PM
Response to Reply #3
5. More likely it was a dead man switch
In case he got fired.
Printer Friendly | Permalink |  | Top
 
Mithreal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 04:08 PM
Response to Reply #5
9. Well that certainly makes me feel better. "more likely"
:popcorn:
Printer Friendly | Permalink |  | Top
 
Truth2Tell Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:03 PM
Response to Reply #9
10. For all we know,
it could be a guy who has issues with the way the system is being abused. Or some personal issue, etc...

I think the liklihood that this is related to any real terrorist plot is very low. Just a feeling. I could be wrong. I am often. :)
Printer Friendly | Permalink |  | Top
 
Mithreal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:14 PM
Response to Reply #10
14. I agree, in all likelihood not terrorism related.
May be a good sign that the "system" is functioning at some level, if the story is true and he is guilty.

Would also not be surprised if it was a fabrication.

And if things like this were used to constrict our liberties more, wouldn't put it past anyone either.

Something doesn't smell right.
Printer Friendly | Permalink |  | Top
 
Xipe Totec Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 07:21 PM
Response to Reply #10
28. Pay no attention to Ignored
It is worse than unproductive.

It is counterproductive.

Printer Friendly | Permalink |  | Top
 
Mithreal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 07:54 PM
Response to Reply #28
29. Who? me? some whimper, some crawl under their beds and wish away
anyone who challenges their ideas.

Had a phone conversation with my State Senator on Monday morning, I do believe, could have been Tuesday. He's a blue dog. They are finishing a short session, sounded like he was just off the floor, could hear the noise in the background. He lowered his voice at one point and told me that sometimes conservatives deserve to win. The context as best I understood our conversation was that we are bad at persuasion sometimes.

Xipe, if you are talking about me, there is a line of Regressives waiting to walk all over you. Go talk to them, you'll see. Weakness isn't a virtue. If I misunderstood, then my bad.
Printer Friendly | Permalink |  | Top
 
Xithras Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:06 PM
Response to Reply #3
11. Lol! No terrorism. He was fired and was taking revenge.
It's right in thee OP. He was given two weeks notice, and injected the virus a week later. He was a disgruntled terminated employee who decided to get a little revenge.

He was also pretty stupid. Logic bombs are always traceable, so he was bound to get caught sooner or later.
Printer Friendly | Permalink |  | Top
 
Mithreal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:20 PM
Response to Reply #11
15. So disgruntled employees disrupting computers can't be called terrorism?
Like protesters to the Minneapolis RNC convention weren't treated as terrorists?

And the person who flew his plane into an IRS building wasn't a terrorist?

This is what we get for throwing around words like terrorism. Terrorism is a tactic used by people who feel powerless and sometimes outright revenge.

The only clue you needed that he wasn't going to be called a terrorist was his name.
Printer Friendly | Permalink |  | Top
 
Xithras Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:28 PM
Response to Reply #15
16. Eh, no. It's fairly safe to say that attacking computers is NEVER terrorism.
It may piss you off and inconvenience you, but it's not terrorism.
Printer Friendly | Permalink |  | Top
 
Mithreal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:31 PM
Response to Reply #16
17. Sure. Ever heard the word cyberterrorism? Yeah, didn't think so.
Printer Friendly | Permalink |  | Top
 
Xithras Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:49 PM
Response to Reply #17
20. Cyberterrorism is Bushism that I refuse to give any credence to.
Terrorism is an act designed to cause fear or panic to exact political change from the target.

Normal people don't get scared when their computers crash, ergo it's NOT terrorism.

There is a corporatist legal push that wants to label ALL disruptive online activities as a form of terrorism. Don't buy into it.

That said, there is ONE caveat. If someone were to attack the IT systems of a hospital with the goal of shutting down power to kill the patients, and they did so in order to further a political viewpoint, that WOULD be terrorism, and I probably wouldn't complain about it being called cyberterrorism. If someone tried to hack the computers of a nuclear power plant to cause a meltdown as an attack against the surrounding population, I WOULD consider that terrorism, and the cyberterrorism label would probably apply here too. The difference here is simple. Attacks designed to hurt PEOPLE are terrorism. Attacks designed to damage THINGS are not.

It should be noted, of course, that under those rules, there has yet to be a single cyberterrorism attack anywhere in the world.
Printer Friendly | Permalink |  | Top
 
Mithreal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:55 PM
Response to Reply #20
22. Moving target, aren't ya? I only concede that some argue for a more narrow definition.
I don't buy into terrorism. It's all semantics.

Printer Friendly | Permalink |  | Top
 
thecrow Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 06:05 PM
Response to Reply #20
23. This might interest you
http://www.nap.edu/openbook.php?record_id=6285&page=7
http://www.justice.gov/criminal/cybercrime/critinfr.htm

B. Presidential Decision Directive 63 - Protecting the Nation's Critical Infrastructures
On May 22, 1998, President Clinton announced two new directives designed to strengthen the Nation's defenses against terrorism and other unconventional threats: Presidential Decision Directives (PDD) 62 and 63. PDD-63 focuses specifically on protecting the Nation's critical infrastructures from both physical and "cyber" attack. These attacks may come from foreign governments, foreign and domestic terrorist organizations, and foreign and domestic criminal organizations. The NIPC is a part of the broader framework of government efforts established by PDD-63. A Fact Sheet summary and more detailed White Paper on PDD-63 are available through the links below.

Fact Sheet on PDD-63

White Paper on PDD-63
C. President's Commission on Critical Infrastructure Protection (PCCIP)

President Clinton created the President's Commission on Critical Infrastructure Protection (PCCIP) to advise and assist the President of the United States by recommending a national strategy for protecting and assuring critical infrastructures from physical and cyber threats. The PCCIP Web site may be accessed via the link below, which provides access to the Commission Final Report as well as Legal Foundations, a compilation of 14 supplemental reports of the PCCIP legal team that provide background on and further explain the legal recommendations that appear in tbe the PCCIP's final report.
PCCIP Web site

PCCIP Final Report

PCCIP Legal Foundations

The Computer Crime and Intellectual Property Section's List of Relevant Web Sites
Printer Friendly | Permalink |  | Top
 
friendly_iconoclast Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 06:27 PM
Response to Reply #23
25. That would make it a 'Clintonism', no?
n/t
Printer Friendly | Permalink |  | Top
 
thecrow Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 06:57 PM
Response to Reply #25
27. Why yes.... it would!
:fistbump:
Printer Friendly | Permalink |  | Top
 
Xithras Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-12-10 03:25 PM
Response to Reply #23
33. Not really. In the Clinton era, it was "cyberattack". Bush renamed it "cyber'terrorism'".
Cybercrime or cyberattacks are the correct term as they properly describe what the crime actually entails. Those terms were coined in saner days when our government understood that words actually meant something.

Then Bush, who never found a dictionary he couldn't doodle in, was sElected to office. Suddenly it was "Terra! Terra! Terra!" Everything was terrorism to him.

It's a reichwing Bushism. Don't get sucked into it.
Printer Friendly | Permalink |  | Top
 
Demeter Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:39 PM
Response to Reply #11
18. Smart Employers Don't GIVE Two Weeks' Notice
They walk the person out the door and bring his personal stuff in a box after.
Printer Friendly | Permalink |  | Top
 
Xithras Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:53 PM
Response to Reply #18
21. Depends on the reason for the termination.
It doesn't say whether he was an employee or a contractor (a very large percentage of federal programmers are contractors). If he was a contractor, they may have simply notified him that his contract wouldn't be renewed. That sort of notice typically happens weeks or months before the contract expiration. On the other hand, if his position were being eliminated, they might also let him know ahead of time that he'd be terminated on date X, and be expected to work until then.

The "escort out the door" thing is fairly common in for-cause terminations, but it's common for people to learn that they'll be losing their jobs weeks or months ahead of time when the employee is eliminated for other reasons.
Printer Friendly | Permalink |  | Top
 
damntexdem Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 04:01 PM
Response to Original message
7. Why bother to sabotage something that doesn't work well anyway?
Printer Friendly | Permalink |  | Top
 
friendly_iconoclast Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:11 PM
Response to Reply #7
12. Because it's treated (mostly) as if it *does* work, and is therefore relied upon
Edited on Thu Mar-11-10 05:12 PM by friendly_iconoclast
Which makes it a source of single point failure, as the term goes.

It's not so much the passenger watch lists. Not only do you have gate security giving you the gimlet eye, but if you start
misbehaving on a plane your fellow passengers will be happy to stomp you.

No, the real payoff for criminal or terrorist purposes is the vetting of people with ramp access at airports-
They don't get searched. All they have to do to get in is have a TSA ID card.

Think "Lufthansa robbery". Or the opportunity to put in (or remove) something not on the manifest onto a cargo plane
or the hold of a passenger airliner.
Printer Friendly | Permalink |  | Top
 
truthisfreedom Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:14 PM
Response to Original message
13. $25k bond? Peanuts!
Sounds like they're not taking this very seriously.
Printer Friendly | Permalink |  | Top
 
friendly_iconoclast Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 06:33 PM
Response to Reply #13
26. An inducement to plea bargain- or skip, as others have surmised.
Either way, it would keep details out of the public eye...
Printer Friendly | Permalink |  | Top
 
SkyDaddy7 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 05:40 PM
Response to Original message
19. IS THIS GUY CONNECTED TO DICK CHENEY?
Seriously, this guy could have been working for the GOP in order to try and fufill Cheney's deepest desire...A terrorist attack on Obama's watch!

Printer Friendly | Permalink |  | Top
 
Sen. Walter Sobchak Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 06:07 PM
Response to Original message
24. Wow another bag of shit working for the TSA,
Who could have guessed?
Printer Friendly | Permalink |  | Top
 
Extend a Hand Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-12-10 12:27 AM
Response to Original message
30. I worked as a programmer for many years
This sounds like b.s. Nobody, nobody updates production systems on the fly. I bet he got mad about being fired and left a nastygram for somebody in some test system.


“It wasn’t connected to anything that had to do with security,” Lindsey said. “Before anything he had his hands on left, it went to another system before it got into any live system that did screening. As I understand it, it is a system that does statistical analyses on the systems that are up and running. And when the tests are run, those are done at one level and then a second level and then at a final level before the analyses are verified and passed onto anything you would call a live system.”

Lindsey said the CSOC servers that were allegedly targeted for sabotage were used for screening workers primarily and were only “remotely, remotely” related to passenger screening, though he could not elaborate.

“The government has been very misleading in the indictment and press release as to any potential harm to the public,” he said, adding that the alleged malware was not a virus and will ultimately be shown to have been “nothing.”
Printer Friendly | Permalink |  | Top
 
friendly_iconoclast Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-12-10 12:47 AM
Response to Reply #30
31. Passenger screening is the front door security. Worker screening is for the service entrance
and *if* (as nothing has been proved yet) the hacking was done for nefarious purpose, the reason could just
as well be criminal as ideological. Having the 'keys to the airport' would be a smugglers' dream.

Alternately, like you said, he might have just left a big "FUCK YOU" nastygram. Stupid and technically illegal,
but not dangerous.

We'll just have to await further developments...
Printer Friendly | Permalink |  | Top
 
Extend a Hand Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-12-10 02:03 AM
Response to Reply #31
32. but the question is where he put it
Edited on Fri Mar-12-10 02:16 AM by Extend a Hand
most places have test systems where programmers play when they are writing new code. New code by a particular programmer would first be unit tested. Once the programmer was satisfied it was working correctly he'd go through some process for integration or system testing where the new code changes would be combined with everybody else's new changes for a particular release. After integration testing is satisfactorily completed, the code would be moved to a certification testing system where all the changes for a particular release are run with a known data set so that programmers or testers can look for unexpected results. These data sets usually would contain data designed to test out expected data and exception handling for bad input. Only after certification is complete would code go through some process to be 'released' into a production system. I would expect that code changes for systems related to worker screening would go through this process as well as those systems used for customer screening.

Here's my theory...
Since the guy did data updates (these would almost certainly be done programatically), I bet he did something like stick some manager's name that he was pissed at in the the test data for the watch list or something like that. Somebody told the manager (half the managers don't have a clue about what programmers do) the manager got mad about it and told other managers who also don't have a clue and they decided this was a 'security threat.'

Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 08:58 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC