CIA Suffered Historic Data Loss From Lax Cybersecurity, Report Says
WASHINGTON — In early 2017 the Central Intelligence Agency suffered a massive data loss when an agency employee stole vast quantities of information including some of its most secretive hacking tools because of lax cybersecurity measures, according to a redacted investigation report obtained by Sen. Ron Wyden, a senior member of the Senate Intelligence Committee.
The employee took away about 180 gigabytes to as much as 34 terabytes — or the equivalent of about 11.6 million to 2.2 billion pages of Microsoft Word documents — which included some of the agency’s most valuable hacking tools from its so-called Vault 7, according to the report. The employee later gave the data to WikiLeaks, which published it in a series of posts.
Citing the CIA’s task force report that examined the breach, Wyden said in a letter addressed to the newly installed Director of National Intelligence John Ratcliffe that the agency had “prioritized building cyber weapons at the expense of securing their own systems.”
In a statement accompanying the letter, Wyden said his office obtained the redacted investigative report after the Justice Department introduced the material as evidence in a court case. Federal prosecutors have charged former software engineer Joshua Shulte, but his family and lawyers have said he is not responsible, The New York Times reported in 2018.
The probe into the CIA leak found that the agency’s “day-to-day security practices had become woefully lax … most of our sensitive cyber weapons were not compartmented” and users shared their passwords with one another. The CIA’s Center for Cyber Intelligence had no plan on mitigation if its weapons were stolen, the investigation found.
The CIA’s hacking tools developed between 2013 and 2016 had been used by the agency to penetrate web browsers including Google Chrome, Microsoft Edge and Mozilla Firefox, as well as smart cars and smart TVs.
Wyden said that U.S. intelligence agencies must begin complying with U.S. law which requires federal agencies to comply with cybersecurity standards and technologies developed by the Department of Homeland Security. Congress had previously exempted U.S. intelligence agencies from that provision.
“It’s now clear that exempting the intelligence community from baseline cybersecurity requirements was a mistake,” Wyden said in his June 16 letter.
Wyden also asked Ratcliffe to answer in an unclassified report questions on how the intelligence agencies are addressing cybersecurity risks, including steps they have taken to secure their websites using multi-factor authentication, employing anti-phishing technologies, and steps the agencies would take to comply with the 22 recommendations made by the Inspector General of the Intelligence Community on tightening cybersecurity standards.
Wyden said U.S. intelligence agencies have yet to require multi-factor authentication on their websites as required by the Cybersecurity and Infrastructure Security Agency, which issued the recommendation in early 2019. The spy agencies also have failed to adopt anti-phishing technologies, another recommendation made by CISA in October 2017, Wyden said.
©2020 CQ-Roll Call, Inc., All Rights Reserved
Distributed by Tribune Content Agency, LLC.
In The News
WASHINGTON — Just days before the Aug. 3 scheduled start of school, officials at the Athens Independent School District in East Texas received a shock. Cybercriminals had attacked the district’s entire computer network, encrypting all the data and demanding $50,000 in ransom for its release. Access... Read More
WASHINGTON -- The FBI’s director acknowledged Thursday that the risks of terrorism and other attacks against the United States are evolving so fast that his agency has difficulty managing them. Cyberattackers threaten the next presidential election, COVID-19 vaccine development and U.S. industries’ best research into new... Read More
Groups from Russia, China and Iran have stepped up cyberattacks in an effort to disrupt the U.S. presidential election in November, a Microsoft Corp. investigation found. The groups have increased cyberattacks targeting the political campaigns of Democratic presidential nominee Joe Biden and U.S. President Donald Trump,... Read More
CAMBRIDGE, Mass. - Election officials across the country have a new tool to help them recognize and respond to malicious interference in the votes they oversee. Created by the Belfer Center at Harvard University's Kennedy School of Government, the new "Election Influence Operations Playbook" focuses on... Read More
WASHINGTON — Terrorism hasn’t disappeared just because a pandemic is happening. In fact, calamitous world conditions embolden those who want to do others harm, and police budget cuts, virus-related conspiracy theories, and other vulnerabilities are exacerbated during the COVID-19 crisis. To better understand the impact of... Read More
WASHINGTON — U.S. officials said they see little evidence of coordinated voter fraud or efforts by foreign adversaries to manipulate mail-in balloting ahead of the November election even as President Donald Trump repeatedly warns that the vote is at risk. In a briefing Wednesday, intelligence officials... Read More