Thrilling! Thank you OPM!

OPMI kept hearing about the data breach at the OPM. I thought to myself, “no big deal,” because I’ve never been a government employee. But then one of the articles I read spoke about a particular form. The form number seemed familiar.

Out of curiosity I checked my encrypted drive.

AHHHH SHIT!!!!

Yep, that’s a form I filled out while I was working for a government contractor.

DAMN! Checking some of the other forms and sure enough! There’s a TON of information that I provided to my employer. I’m sure that that information got sent at some point to the OPM, and is now in the hands of the Chinese.

I’m sitting here looking at my encrypted volume that contains this information thinking a couple of things.

CybersecurityFirst, I’m wondering why I take the security of this information so seriously? Why is it that I’ve spent the money to secure my data and theirs (some of the information contained in the forms I filled out for them also contains information that relates directly to THEIR projects) and am mindful of what data I have “live” on my system and what data I keep in cold storage? Cold storage in my life is something (like a drive) that is archival, MUST be turned on or attached directly to my computer and is encrypted.

Second, If I can secure my data with COTS (Commercial Off The Shelf) software why can’t our government?

Third, Why is the United States Government data vulnerable in the first place? We KNOW the safest computers are computers which are not connected to a network. Granted, that’s impractical because the government must share data.

Hearings

BUT  it is possible to isolate critical subsystems. One way to do that, don’t allow employees to transport any data offsite. No USB memory sticks or other media, and laptops are available only to those employees who absolutely need mobility. Employees using those laptops have VPN access to the corporate systems and for the most part those laptops when connected to the corporate VPN are Terminals in the old school meaning of terminals. ie dumb as a rock.

The point I’m making here is that the need for computer & network security isn’t new.  So why the hell hasn’t our government kept up with the needs for security?

Having seen the way government contracts work, I have a guess.

redtape

Imagine a situation where a bunch of cooks get in the soup and specify all manner of equipment down to the smallest detail. Once finished,  the specification goes from committee to committee and after a year or two the spec is approved, money is appropriated and the funds become available.

Our happy IT guys call a government approved vendor of equipment, and are told that equipment isn’t available anymore. Or worse yet, the equipment or software can be purchased but now it’s a custom build and will be 50% more expensive than the original product and by the way have significantly fewer capabilities than current off the shelf products costing significantly less than the originally specified equipment or software originally sold for.

Old terminal

So in the one case the specification process starts over again. In the other case the “approved equipment” is less capable,  yet more expensive, than the machine a hacker in China purchased on the internet yesterday.

Rather than the committees addressing the fundamental problem in terms of appropriations and approvals they’re content to keep failing. Meanwhile the security of government systems continues to fall further and further behind.

This isn’t a partisan issue. Regardless of what the administration might say. This is an epic systemic failure on the part of an entity that has access to all of our private data. A.K.A The United States Government.

UNIVAC

How do you solve this problem?

The simplest way is to allow the IT people, The REAL IT people, not the morons that built the healthcare.gov site, say “we need a router and after figuring out which is the best unit for the money… They BUY IT!

That should go for a single router or a RACK of routers.

Does Dianne Freakin Feinstein have a clue about the difference between a CISCO and a Barracuda? NO!

So why are people like Feinstein reviewing and voting on these appropriations bills or worse yet wasting time and money having hearings about shit they’ll never understand, when they should be letting the professionals do the job? You can tell pretty darn fast if an IT dept. is pissing money away and a quarterly budget review (again by IT pros who know what’s needed and what it costs) would keep the expenditures in check and at the same time maintain security.

I’ve got another dose of BAD news for you dear reader…

JihadiHacker

The longer our leaders put off fixing the government IT infrastructure, the more expensive it’s going to be.

Think about putting off having your brakes fixed on your car.

Brake pads cost $45 a wheel, Brake ROTORS cost $1000 a wheel. Most of us average folks learn the hard lesson, it’s always better to spend the $180 rather than spending the $1180. We all learn it once!

We never make that mistake again unless we’re wealthy, elitist,  over-educated, dumbasses.

Unfortunately, most of our politicians are the latter kind of people not the former.


Update 2015 06 19

As more comes out about this breach, I think it’s clear that the government IT people are not up to the challenge.

Here is a line to an ars Technica article titled Encryption “would not have helped at OPM says DHS official”

Below is the article minus the video.


Encryption “would not have helped” at OPM, says DHS official

archuleta-opm-640x359

Office of Personnel Management Director Katherine Archuleta would be happy to discuss the particulars of the OPM brief with Congress—in a classified briefing.

CSPAN

During testimony today in a grueling two-hour hearing before the House Oversight and Government Reform Committee, Office of Personnel Management (OPM) Director Katherine Archuleta claimed that she had recognized huge problems with the agency’s computer security when she assumed her post 18 months ago. But when pressed on why systems had not been protected with encryption prior to the recent discovery of an intrusion that gave attackers access to sensitive data on millions of government employees and government contractors, she said, “It is not feasible to implement on networks that are too old.” She added that the agency is now working to encrypt data within its networks.

But even if the systems had been encrypted, it likely wouldn’t have mattered. Department of Homeland Security Assistant Secretary for Cybersecurity Dr. Andy Ozment testified that encryption would “not have helped in this case” because the attackers had gained valid user credentials to the systems that they attacked—likely through social engineering. And because of the lack of multifactor authentication on these systems, the attackers would have been able to use those credentials at will to access systems from within and potentially even from outside the network.

House Oversight Chairman Jason Chaffetz (R-Utah) told Archuleta and OPM Chief Information Officer Donna Seymour, “You failed utterly and totally.” He referred to OPM’s own inspector general reports and hammered Seymour in particular for the 11 major systems out of 47 that had not been properly certified as secure—which were not contractor systems but systems operated by OPM’s own IT department. “They were in your office, which is a horrible example to be setting,” Chaffetz told Seymour. In total, 65 percent of OPM’s data was stored on those uncertified systems.

Chaffetz pointed out in his opening statement that for the past eight years, according to OPM’s own Inspector General reports, “OPM’s data security posture was akin to leaving all your doors and windows unlocked and hoping nobody would walk in and take the information.”

When Chaffetz asked Archuleta directly about the number of people who had been affected by the breach of OPM’s systems and whether it included contractor information as well as that of federal employees, Archuleta replied repeatedly, “I would be glad to discuss that in a classified setting.” That was Archuleta’s response to nearly all of the committee members’ questions over the course of the hearing this morning.

At least we found it

Archuleta told the committee that the breach was found only because she had been pushing forward with an aggressive plan to update OPM’s security, centralizing the oversight of IT security under the chief information officer and implementing “numerous tools and capabilities.” She claimed that it was during the process of updating tools that the breach was discovered. “But for the fact that OPM implemented new, more stringent security tools in its environment, we would have never known that malicious activity had previously existed on the network and would not have been able to share that information for the protection of the rest of the federal government,” she read from her prepared statement.

Dr. Ozment reiterated that when the malware activity behind the breach was discovered, “we loaded that information into Einstein (DHS’ government-wide intrusion detection system) immediately. We also put it into Einstein 3 (the intrusion prevention system currently being rolled out) so that agencies protected by it would be protected from it going forward.”

But nearly every question of substance about the breach—which systems were affected, how many individuals’ data was exposed, what type of data was accessed, and the potential security implications of that data—was deferred by Archuleta on the grounds that the information was classified. What wasn’t classified was OPM’s horrible track record on security, which dates back at least to the George W. Bush administration—if not further.

A history of neglect

During his opening statement, Chaffetz read verbatim from a 2009 OPM inspector general report that noted, “The continuing weakness in OPM information security program results directly from inadequate governance. Most if not all of the [information security] exceptions we noted this year result from a lack of leadership, policy, and guidance.” Similar statements were read from 2010 and 2012 reports, each more dire than the last. The OPM Office of the Inspector General only began upgrading its assessment of the agency’s security posture in its fiscal year 2014 report—filed just before news of a breach at a second OPM background investigation contractor surfaced.

Rep. Will Hurd (R-Texas), a freshman member of Congress, told the OPM executives and the other witnesses—DHS’ Ozment, Interior Department CIO Sylvia Burns, the new US CIO Tony Scott, and OPM Assistant Inspector General Michael Esser— that “the execution on security has been horrific. Good intentions are not good enough.” He asked Seymour pointedly about the legacy systems that had not been adequately protected or upgraded. Seymour replied that some of them were over 20 years old and written in COBOL, and they could not easily be upgraded or replaced. These systems would be difficult to update to include encryption or multi-factor authentication because of their aging code base, and they would require a full rewrite.

seymour-opm-640x359

Enlarge / OPM CIO Donna Seymour said that systems couldn’t simply have encryption added because some of them were over 20 years old and written in COBOL.

Personnel systems have often been treated with less sensitivity about security by government agencies. Even health systems have had issues, such as the Department of Veterans’ Affairs national telehealth program, which was breached in December of 2014. And there have been two previous breaches of OPM background investigation data through contractors—first the now-defunct USIS in August of last year, and then KeyPoint Government Solutions less than four months later. Those breaches included data about both government employees and contractors working for the government.

But some of the security issues at OPM fall on Congress’ shoulders—the breaches of contractors in particular. Until recently, federal agents carried out background investigations for OPM. Then Congress cut the budget for investigations, and they were outsourced to USIS, which, as one person familiar with OPM’s investigation process told Ars, was essentially a company made up of “some OPM people who quit the agency and started up USIS on a shoestring.” When USIS was breached and most of its data (if not all of it) was stolen, the company lost its government contracts and was replaced by KeyPoint—”a bunch of people on an even thinner shoestring. Now if you get investigated, it’s by a person with a personal Gmail account because the company that does the investigation literally has no IT infrastructure. And this Gmail account is not one of those where a company contracts with Google for business services. It is a personal Gmail account.”

Some of the contractors that have helped OPM with managing internal data have had security issues of their own—including potentially giving foreign governments direct access to data long before the recent reported breaches. A consultant who did some work with a company contracted by OPM to manage personnel records for a number of agencies told Ars that he found the Unix systems administrator for the project “was in Argentina and his co-worker was physically located in the [People’s Republic of China]. Both had direct access to every row of data in every database: they were root. Another team that worked with these databases had at its head two team members with PRC passports. I know that because I challenged them personally and revoked their privileges. From my perspective, OPM compromised this information more than three years ago and my take on the current breach is ‘so what’s new?'”

Given the scope and duration of the data breaches, it may be impossible for the US government to get a handle on the exact extent of the damage done just by the latest attack on OPM’s systems. If anything is clear, it is that the aging infrastructure of many civilian agencies in Washington magnify the problems the government faces in securing its networks, and OPM’s data breach may just be the biggest one that the government knows about to date.


<END>

What does the NSA think of my web searches?

CHP

In writing this blog I find that I do some of the darnedest searches.

I look for racist materials, I’ve looked up the KKK repeatedly. I’ve searched for Al Qaida, ISIS, nuclear materials, and bomb making.

Hey I’m curious about stuff.

When I was a kid, there were actual books that had diagrams describing the basics of Little Boy and Fat Man. I had Golden Chemistry books that described how to change household chemicals into basic chemicals for experimentation.

I once had a copy of the anarchists cookbook.

sealion

I dare you to find ANY of that material today with a web search. I should warn you that if you do find this information, you’re probably going to end up on a terrorist watch list.

I was thinking about this in a Starbucks yesterday while I had a big police officer behind me doing paperwork. I know he could see my computer screen and I guess that’s why I was thinking about “The MAN” watching me.

bitcoin

Then I thought about all the deviant stuff I’d looked up, photos for this blog for example. You know that the internet is like a library… YOU CAN’T EVER just go in to look at only one book!

I mean looking for pictures of female sea lions leads you to “Whales blowing” which leads you to pictures of really fat chicks giving head to really skinny guys. You can all thank me for NOT posting that picture… Bitcoin payments accepted!

Anyway there is a part of me that loves the thought of some NSA analyst jumping up from my data feed screaming “MY EYES, MY EYES!”

I wonder what exactly they have put in my records!

frenchfries

I’ve turned all the safeties off on my browsers. As my dear mother found out when she casually typed “Best FF in Florida”

She meant french fries… what she got caused her to completely forget about french fries and possibly scarred her for life.

So the next time you go searching for something offbeat, just remember you’re leaving breadcrumbs and your web history isn’t only stored on your computer.

Happy Searching.

Microsoft I have a bone to pick

windowslogo

Back in the day Xbox required that it’s users convert CASH into Microsoft Points. For people like me this meant that over time we accumulated credits.

Recently Microsoft decided that the points were going to be phased out in favor of straight cash transactions.

Now those credits have been converted back to a cash value (At no interest) Microsoft has also started a countdown to forfeiture of the credit amount in our account.

Here’s the bone.

XboxLogo

I can’t spend that money on anything except a game, rental, or purchase of movies, or purchase of music. 

Okay so I want to buy a game. 

It costs 59.95. I have 45.65 on account. So logically you’d think that Microsoft would say

59.95-45.65 = 13.30 

Then offer to take the 13.30 + taxes from my credit card.

You’d be wrong!

They want to bill the entire amount to my credit card and leave me with the 45.65 still to spend and still to expire on June 1.

This is exactly WHY I hated the whole converting money to credits in the first place. 

Additionally Microsoft won’t let me use the credit to pay for my xbox gold membership or pay for anything else from the Microsoft line as far as I can tell.

I feel really screwed over this and I find myself thinking that the next game console I purchase will likely be from Sony. Xbox Live is expensive on a yearly basis if you’re only an occasional player and it’s a pain in the ass to sign up once in a while if you’re not sure that you’re going to be playing online. 

At the same time you practically have to have the Xbox Live account active because if you don’t, then decide to turn it on you have to deal with updates and more updates and more updates before you can play the freaking game you wanted to play.

I went through that today. I just wanted to play Call of Duty.  BUZZZZ! There are updates required…

After navigating a counterintuitive user interface to select the game I wanted to play then to be told I couldn’t play the game because there was a required update, then waiting for that update I’d already gone on to other things and wasn’t interested anymore. The downloads finished and I turned the machine off.

Pages Logo

Am I impatient? Probably!

But sometimes you only have a half hour to play and updates like that really cramp your style.

So Microsoft… here are a couple of things you might want to consider.

1) My account should be my account across all your product lines. Credit balance or not.

2) Learn to freakin do math!

3) You better really come up with some seriously awesome games because I’ve seen the Sony Playstation render games (DAMN!) and it also includes a nice BluRay player!

But most of all, 

We as customers shouldn’t be thought of as “Fish in a Barrel”

Applelogo

I’m writing this on a Mac, I have office and I like the Office 365 preview you’ve been kind enough to share.

BUT…

I also have viable alternatives to Office, Windows, Skype, and in fact your entire product line. You might want to be a little more “Customer Friendly”

Just saying…

Well that seems to have cured the problem…

workinglaptop

Unfortunately, It means that now I have to get back to work, looking for work.

My network is once again happy and stable. Backups are being made in minutes instead of hours and surprise surprise surprise, my access to the internet is once again solid.

It’s amazing what a few bad components (all of whom report they’re happy and functional) can do to screw your world up.

It’s going to take me a few more days to stop being twitchy about my network, but I’m sure that in no time I’ll take it for granted like I’ve done for the past 5 or 6 years.

We’ve got bandwidth, we’ve got gigabit, we’ve got connection!

I’m happy!


computer idiot

Oh and I discovered another little bit of interesting information.

Those of you that are not Time Capsule or Mac users might want to stop reading here.

I think I’ve found an answer to a problem that I’ve been seeing over the past month or so. The internet has been almost completely useless in resolving the issue in part because of one guy who apparently posted the exact same question on every message board ON THE PLANET! Hey dumbass, that kind fucks up any useful search results for the rest of us.

Anyway…

I think I’ve found the solution for one of the discoveryd problems. This may work for you, it may not. Apple’s discoveryd service has been, and is being documented as having serious issues. Some of these issues appear to be associated with Apple’s “handoff” and automatic hotspot functions.

IPv6addresslayout

I haven’t figured out that stuff yet. But I have managed to put a stop to my logs being overrun with one particular error.

Here’s the deal,

I’ve been seeing this error all over my logs.

5/15/15 10:31:05.057 PM discoveryd[75]: Basic Sockets Couldn’t set IP_BOUND_IF on socket fd[63] scopeID[4] errno[22] result[-1]

This error happened so frequently and hit my computer so hard that it would suck the battery down in just a few hours, my computer would heat up because it was running the CPU at near 100% and all the while it’s silent except for the traces in the log.

internetrainbow

I thought this was an artifact of the dying routers and drives, but that assumption was wrong.

Last night after I’d become mostly convinced that the network was stable, I noticed my computer was running warm again. I wasn’t doing anything to account for the system being run hard enough to be that warm. I had safari open in the background but I was actually doing some word processing.

I checked the logs and found that this error was literally zipping past. The console application was posting this message 50 times a second.

So I went to google. There I found the dumbass person’s question all over the place but few possible explanations and no answers.

Then I decided to look at IP_BOUND_IF to find out if it was an Apple only function or if it was a general UNIX function. Turns out, it was discussed on a general UNIX board.

From there I started investigating. I noticed by navigating to some web sites I could increase the frequency of the messages and by going to other web sites I could stop the message all together.

switches

This suggested that the problem wasn’t actually in my computer or even in my network, but that the problem was externally induced.

There were some websites that wouldn’t render any page, but those same sites would make this IP_BOUND_IF error post faster.

Then I stumbled across some sites talking about IPv6 having been enabled on some ISPs. This reminded me that I’d seen an IPV6 DNS entry when I was setting up the new router and that entry had been automatically populated.

I was curious if my new ISP had in fact turned on IPv6, so I went to the router control interface. Sure enough, there was an IPv6 DNS entry. Oh Cool! I thought, then I noticed there was no IPv6 address being provided to the router via the WAN.

DHCP is providing my IPv4 xxx.xxx.xxx.xxx address and an appropriate DNS address to the router. But the only IPv6 information is a WAN supplied DNS address.

I wondered if my web requests were trying to go out to the IPv6 DNS address for lookup and results were supposed to come back to an IPv6 Client address that wasn’t assigned. That might explain why IP_BOUND_IF was failing. I know next to nothing about IPv6 standards. I’ve tried reading about it but have found that the specification makes a much better sleeping aid than educational one.

logos

I figured, “Awww what the hell,” I told the router, do local link IPv6 only. That means that my machines that support it inside my network will get IPv6, but that it will not be routed to the internet at large.

The IP_BOUND_IF errors went away, my internet surfing got faster and all pages now rendered properly. I don’t know if I guessed right, but my logs aren’t sucking up 100% of my CPU resources anymore.

Obviously, my ISP is working on IPv6 and they’ll probably implement it sometime in the future. When they do turn is on I’ll tell my router to use it. For the time being though, I’ll keep the IPv6 internal and rely on the good old IPv4 standard to surf the web.

For what it’s worth, I hope this helps. I make no warranty or guarantee.

Sometimes being cheap is more expensive.

AppleTimeCapsule

After fiddling around with backups, networks, dropping WiFi connections, and a myriad of other tiny annoying issues I came to the conclusion that I’d have quite enough of death by a thousand cuts!

I just yanked out two 7 year old Apple time capsules and the NetGear router that was freaking awesome when I bought it, but which became a complete POS with subsequent firmware upgrades.

With each “Upgrade” the machine got slower. Now its to the point that the device is now almost completely useless. (Before you ask, I’ve downgraded the unit to previous versions of the firmware. It doesn’t help. At some point, there must have been a hardware module that was reprogrammed, but is not being flashed to its original state. Or theres something really wrong with the device itself.)

The Time Capsules were very reliable over their lifespans. The larger of the two units WiFi had become unreliable and that’s what prompted me to purchase the NetGear. I was trying to save money by replacing the WiFi and continuing to use the hard drives in the Time Capsules.

Recently the drives were becoming increasingly unreliable and the NetGear device had become way too SLOW to do any kind of WiFi to disk transfer. In fact the NetGear unit was slowing data transfers down on wired connections too. 

IMG 0472

Although the NetGear bought me a year, I should have done what I did yesterday instead of going cheap…


Yesterday, I bought a new 3TB Apple Time Capsule. If this one lasts 7 years like the previous units it’s replacing, I’ll have gotten my money out of it.

Best Buy is running a $50 off special on the unit so there is that.

This also simplified the network cabinet considerably, I was able to remove 2 devices completely.

This little cabinet is where all the communications in the house is accessible. Phone line, cables for TVs in whatever rooms and of course al the networking. I do wish that when the installation people for the Satellite TV and the Satellite internet had been a bit more frugal with the lengths of the cable they were running. It’s a pain in the butt fighting with 8 or 10 RG58 & RG56 cables that run along the back of the top shelf. 

In a fit of annoyance yesterday, I mounted a spitter and some kind of power unit from DirecTV to the top and rear wall of the cabinet. I shouldn’t have had to do that, the installation guy should have done it. I didn’t notice until after the installation guy split, that he’d not mounted these things, having them rattling around in the top of the cabinet was a royal pain in the ass anytime I needed to do something up there.

IMG 0474

I still need to purchase a set of CAT6 patch cables of the correct length to connect the switch to all the wall sockets and peripherals. But the cabinet is once again clean and in general orderly.

I can provide Gigabit speed ethernet throughout the house. Once I pick up the patch cables all but one of the ports on the switch will be connected (Yes, I have 13 sockets in the house. Hey I wanted to be prepared for whatever! You never know when you might have to supplement NORAD…)  

Currently, not all the devices in the house can take advantage of gigabit due to their age, but the potential is there as equipment is updated.


Success! I’ve moved the salvageable data from the older drives onto the new Time Capsule. I haven’t flushed those units quite yet. I’ll wait until the new TC is past its infant mortality period. Then its low level format time and reset to factory defaults for everything I’ve yanked out of the network. (Quite a pile now.) Then it is away to E-Recycling for all of it, I hate trashing this stuff, I wish to heck it was repairable. 

Its not a sentimental attachment, its hating the thought of adding to the e-waste problem. I’d really appreciate Apple or whoever making products that could be retrofitted with the latest technology.  

Macbook Air

Take my MacBook Air for example. It’s a fantastic machine. Because I purchased the full boat machine with all the upgrades available at the time, it still beats many of the new Apple Machines including the new Macbook, and all of the Macbook Airs.

There are two areas that are starting to become dated. 1) WiFi and 2) The display is not a retina display.

As of this writing new Macbook Airs aren’t available with a retina display anyway.

It would be very cool to hand Apple my Air, plunk some cash on the table and have them upgrade the WiFi, the display and hell, why not throw a 1TB SSD in the machine while they’re at it.

Because… I am sentimentally attached to my Macbook.

I suppose it would cut into their sales a bit but they’d be SUPER Green if they offered that option.

I can swap out the current 512 SSD drive for a 1TB SSD through Other World Computing. It only costs about $500 or so. I’m not that slammed for disk space yet but when I get there, I’ll go for it. Hopefully It’ll extend the life of my Air for another 4 years.


Oh Cool! Thus far, I’m seeing major speed improvements on data being moved to the network drives and my backups are now taking only 6 minutes instead of a projected 8 hours.

I’m such a dumbass, I saved $150 bucks last year only to subject myself annoyances and troublshooting that cost far more in terms of my time, lost data, and general frustration, than the savings.

OH well… Live and freaking learn!