CIA Suffered Historic Data Loss From Lax Cybersecurity, Report Says
WASHINGTON — In early 2017 the Central Intelligence Agency suffered a massive data loss when an agency employee stole vast quantities of information including some of its most secretive hacking tools because of lax cybersecurity measures, according to a redacted investigation report obtained by Sen. Ron Wyden, a senior member of the Senate Intelligence Committee.
The employee took away about 180 gigabytes to as much as 34 terabytes — or the equivalent of about 11.6 million to 2.2 billion pages of Microsoft Word documents — which included some of the agency’s most valuable hacking tools from its so-called Vault 7, according to the report. The employee later gave the data to WikiLeaks, which published it in a series of posts.
Citing the CIA’s task force report that examined the breach, Wyden said in a letter addressed to the newly installed Director of National Intelligence John Ratcliffe that the agency had “prioritized building cyber weapons at the expense of securing their own systems.”
In a statement accompanying the letter, Wyden said his office obtained the redacted investigative report after the Justice Department introduced the material as evidence in a court case. Federal prosecutors have charged former software engineer Joshua Shulte, but his family and lawyers have said he is not responsible, The New York Times reported in 2018.
The probe into the CIA leak found that the agency’s “day-to-day security practices had become woefully lax … most of our sensitive cyber weapons were not compartmented” and users shared their passwords with one another. The CIA’s Center for Cyber Intelligence had no plan on mitigation if its weapons were stolen, the investigation found.
The CIA’s hacking tools developed between 2013 and 2016 had been used by the agency to penetrate web browsers including Google Chrome, Microsoft Edge and Mozilla Firefox, as well as smart cars and smart TVs.
Wyden said that U.S. intelligence agencies must begin complying with U.S. law which requires federal agencies to comply with cybersecurity standards and technologies developed by the Department of Homeland Security. Congress had previously exempted U.S. intelligence agencies from that provision.
“It’s now clear that exempting the intelligence community from baseline cybersecurity requirements was a mistake,” Wyden said in his June 16 letter.
Wyden also asked Ratcliffe to answer in an unclassified report questions on how the intelligence agencies are addressing cybersecurity risks, including steps they have taken to secure their websites using multi-factor authentication, employing anti-phishing technologies, and steps the agencies would take to comply with the 22 recommendations made by the Inspector General of the Intelligence Community on tightening cybersecurity standards.
Wyden said U.S. intelligence agencies have yet to require multi-factor authentication on their websites as required by the Cybersecurity and Infrastructure Security Agency, which issued the recommendation in early 2019. The spy agencies also have failed to adopt anti-phishing technologies, another recommendation made by CISA in October 2017, Wyden said.
©2020 CQ-Roll Call, Inc., All Rights Reserved
Distributed by Tribune Content Agency, LLC.
In The News
The White House on Thursday unveiled sweeping sanctions on Russia in retaliation for cyberattacks, foreign influence operations and other behavior. The measures include the expulsion of 10 Russian diplomats. The moves were announced Thursday morning in a lengthy statement from the Biden administration which for the... Read More
The two federal laws governing sex trafficking online have disproportionately harmed more sex workers than saved victims of human trafficking, said Danielle Borrelli, operations coordinator at the California Cybersecurity Institute, today at a Lincoln Network event moderated by Alexiaa Jordan. Known and used collectively as SESTA-FOSTA,... Read More
WASHINGTON — Microsoft is placing the blame for a hack on its email software on China after President Joe Biden called on allied nations to create a new set of rules governing cybersecurity threats across the globe. It is believed that a Chinese hacker group known... Read More
WASHINGTON -- A congressional hearing Friday showed that foreign computer hackers are facing a growing likelihood of counterattack from the United States as a result of the SolarWinds software breach. Lawmakers and computer industry officials agreed the hackers must face consequences to deter them in the... Read More
WASHINGTON (AP) — Jolted by a sweeping hack that may have revealed government and corporate secrets to Russia, U.S. officials are scrambling to reinforce the nation's cyber defenses and recognizing that an agency created two years ago to protect America's networks and infrastructure lacks the money,... Read More
WASHINGTON -- Cybersecurity experts suggested to a congressional committee Wednesday that lawmakers act quickly to address growing threats from hackers. They mentioned the SolarWinds computer infiltration by the Russians last year and a hacker’s attempt to poison a Florida municipal water supply last week as examples.... Read More