{"id":110797,"date":"2017-11-30T13:44:00","date_gmt":"2017-11-30T13:44:00","guid":{"rendered":""},"modified":"2023-01-08T11:04:07","modified_gmt":"2023-01-08T11:04:07","slug":"the-mother-lode","status":"publish","type":"post","link":"https:\/\/cvnextjob.com\/index.php\/2017\/11\/30\/the-mother-lode\/","title":{"rendered":"The Mother Lode"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><h3 class=\"post-title entry-title\" itemprop=\"name\"><\/h3>\n<div class=\"post-header\"> <\/div>\n<p>Take a look at <a href=\"http:\/\/r.search.yahoo.com\/_ylt=A0LEVikXiHVVRTgAZLEnnIlQ;_ylu=X3oDMTEzdnB2ZmcwBGNvbG8DYmYxBHBvcwMxBHZ0aWQDRkZVSUMwXzEEc2VjA3Ny\/RV=2\/RE=1433794711\/RO=10\/RU=http%3a%2f%2fwww.opm.gov%2fforms%2fpdf_fill%2fSF86.pdf\/RK=0\/RS=qTdm0vl2cQat44n0aLWurmegXs4-\">this<\/a>:  it&#8217;s the Standard Form 86, also known as the Questionnaire for National  Security Positions.&nbsp; Anyone who has ever held a security clearance  knows it well; it must be completed by anyone seeking a clearance, or  updating one that is already active.<\/p>\n<p>At 127 pages (including instructions), the SF 86 is voluminous, asking  applicants to describe virtually all aspects of their lives: where they  have lived; employment history, friends and associates, military  service, schools attended, foreign travel, financial interests, foreign  contacts and drug and alcohol abuse (to name a few).&nbsp; All must be listed  on the form, creating a road map for the Office of Personnel Management  (OPM).&nbsp; Not only did the organization create the form, it is  responsible for 95% of all federal background investigations, covering  100 different federal agencies.&nbsp; When someone applying for a clearance  completes the SF 86, a copy goes to their current or prospective  employer, while another goes to OPM.<\/p>\n<p>And that&#8217;s why last week&#8217;s data breach at the agency&#8211;reportedly  conducted by Chinese hackers&#8211;represents such a grave threat to national  security.&nbsp; Never before has a U.S. adversary obtained so much  information about so many people in positions with access to classified  information.&nbsp; It&#8217;s Christmas morning for a spymaster; need to recruit  American &#8220;insiders&#8221; who might be willing to pass on sensitive  information?&nbsp; Just convert the OPM security clearance files into a  searchable database; in very short order Chinese intelligence will have  the names, addresses and other contact information of potential  turncoats who might be willing to betray their country for financial  gain, ideology or other reasons.<\/p>\n<p>Looking for someone with family ties to a foreign power, say the PRC?&nbsp;  It&#8217;s on the SF 86.&nbsp; Hoping to recruit someone with an existing clearance  who is burdened by a mountain of debt?&nbsp; You can glean that information  from the OPM files as well.&nbsp; Searching for a potential spy who is  working on a specific program at a designated federal agency or defense  contractor?&nbsp; You can start identifying potential candidates by comparing  their reported information to other data associated with the program. <\/p>\n<p>And this should come as no surprise: the OPM breach was a disaster waiting to happen, according to a recent report in <a href=\"http:\/\/www.seattletimes.com\/nation-world\/why-us-got-hacked-the-mystery-is-what-took-the-chinese-so-long\/\"><i>The New York Times<\/i><\/a>:<\/p>\n<p><span style=\"font-size: xx-small;\">The inspector general at the Office of Personnel Management (OPM),  which keeps the records and security-clearance information for millions  of current and retired federal employees, issued a report in November  that essentially described the agency\u2019s computer security system as a  Chinese hacker\u2019s dream.<\/span><\/p>\n<p><span style=\"font-size: xx-small;\">By the time the report was published, Chinese hackers had already  downloaded tens of thousands of files on sensitive security clearances  and were preparing for a much broader attack that obtained detailed  personal information on at least 4 million current and former government  employees. The agency is still struggling to patch vulnerabilities.<\/span><br \/>&nbsp; &nbsp; <br \/><span style=\"font-size: xx-small;\">[snip]<\/span><\/p>\n<p><span style=\"font-size: xx-small;\">A number of Obama administration officials painted a picture of a  government office struggling to catch up, with the Chinese ahead at  every step.<\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><\/span><span style=\"font-size: xx-small;\">OPM did not possess an inventory of all the computer servers and  devices with access to its networks. It did not require anyone accessing  information from the outside to use the kind of basic authentication  techniques that most Americans use for online banking. It did not  regularly scan for vulnerabilities in the system and found that 11 of  the 47 computer systems that were supposed to be certified as safe for  use last year were not \u201coperating with a valid authorization.\u201d<\/span><\/p>\n<p><span style=\"font-size: xx-small;\">The problems were so severe for two systems that hosted the databases  used by the Federal Investigative Service \u2014 which does background  investigations for officials and contractors who are issued security  clearances \u2014 that the inspector general argued for temporarily shutting  them down because the security flaws \u201ccould potentially have national  security implications.\u201d<\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Despite these alarm bells, the OPM soldiered on with its vulnerable systems, and the Chinese took full advantage.&nbsp; The <i>NYT <\/i>reports  that PRC-based hackers first targeted the security clearance  information database last summer; when that effort proved successful,  they mounted a second, much larger attack in December, but the scope of  the penetration was not discovered until April. &nbsp;&nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Now in  damage control mode, the Office of Personnel Management is promising to  implement a two-step encryption system and is offering free credit  monitoring to current and former federal employees that may be affected  by the breach.&nbsp; Of course, that&#8217;s tantamount to fixing the broken barn  door after the horse is already gone.&nbsp; While some of the personal  information stolen in the attack will wind up with identity thieves  (providing cover for the PRC government), most the the data will remain  with China&#8217;s intelligence services, for use in future recruitment  operations. &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Ultimately,  the number of spy cases rooted in the OPM breach will be relatively  small&#8211;in comparison to the amount of information that was compromised.&nbsp;  Not that Beijing is really concerned; given the opportunity to case a  wide net, they took it, realizing OPM&#8217;s security failures were providing  a broad view of who has access to the nation&#8217;s secrets, and who among  those individuals might become a potential asset. &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">One  more prediction: no one at OPM will lose their jobs over this debacle.&nbsp;  The director might be reassigned, but the rank-and-file bureaucrats will  remain with the agency, sustaining the same level of unsatisfactory  performance.&nbsp; This follows the example of recent personnel actions at  TSA, where the agency director was moved to another post after it was  learned that security personnel missed 95% of all weapons and explosives  being &#8220;smuggled&#8221; onto planes in training exercises. &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Until  federal incompetents are fired&#8211;and stripped of pensions and other  benefits&#8211;disasters like those at OPM and TSA will continue.&nbsp; As we&#8217;ve  noted before, there is virtually no accountability in the federal  system.&nbsp; Managers and executives engage in behavior that is negligent or  criminal and most receive nothing more than early retirement and a fat  government pension. &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">More  disturbingly, the Obama Administration has developed a neat trick to  explain away virtually any bureaucratic snafu.&nbsp; Whatever the problem,  whether its an AMTRAK train that crashes at 106 mph (on a curve rated  for 50), or a sensitive computer network with less security than  Amazon.com, the problem isn&#8217;t the engineer or the managers in charge;  it&#8217;s a lack of spending on infrastructure.&nbsp; If we had only allocated  more millions&#8211;or billions&#8211;the accident or security breach would have  been prevented.<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Rubbish.&nbsp;  At OPM, AMTRAK or any other federal agency, it&#8217;s up to management to  set priorities and fund them.&nbsp; Apparently, the vulnerability of OPM&#8217;s  personnel databases was an open secret, yet no one was in a hurry to fix  the problem.&nbsp; The agency kept grinding along, and we&#8217;ll assume that  managers kept collecting the bonuses.&nbsp; After all, it&#8217;s the federal way.&nbsp;  And when China&#8217;s Ministry of State Security (MSS) recruits a  high-ranking American to give away our crown jewels, no one will bother  to connect it to OPM, and the utter ineptitude that opened the door. &nbsp; &nbsp;  <\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Take a look at this: it&#8217;s the Standard Form 86, also known as the Questionnaire for National Security Positions.&nbsp; Anyone who has ever held a security clearance knows it well; it must be completed by anyone seeking a clearance, or updating one that is already active. At 127 pages (including instructions), the SF 86 is [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110797"}],"collection":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/comments?post=110797"}],"version-history":[{"count":0,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110797\/revisions"}],"wp:attachment":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/media?parent=110797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/categories?post=110797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/tags?post=110797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}