US: It was sensitive data from a U.S. anti-terror program – and terrorists could have gotten to it for years, records show - PressFrom - US
  •   
  •   
  •   

USIt was sensitive data from a U.S. anti-terror program – and terrorists could have gotten to it for years, records show

00:20  26 august  2019
00:20  26 august  2019 Source:   latimes.com

Trump administration reportedly wants to extend NSA phone surveillance program

Trump administration reportedly wants to extend NSA phone surveillance program Just in case.

Protecting the United States from terrorist attacks is the FBI’ s number one priority. The Bureau employs a variety of disciplines and works closely with a range of partners to neutralize terrorist cells and operatives here in the U . S ., help dismantle extremist networks worldwide, and cut off financing

The program is separate from the National Security Agency' s efforts to eavesdrop without warrants and collect domestic phone records , operations that have provoked fierce public debate Because Swift is based overseas and has offices in the United States, it is governed by European and American laws.

The Department of Homeland Security stored sensitive data from the nation’s bioterrorism defense program on an insecure website where it was vulnerable to attacks by hackers for over a decade, according to government documents reviewed by The Times.

It was sensitive data from a U.S. anti-terror program – and terrorists could have gotten to it for years, records show© Greg Mathieson/Mai US Marines with the Chemical Biological Incident Responce Force (CBIRF) working in hazmat gear as they decontaminate the Longworth House Office building of Anthrax. (Photo by Greg Mathieson/Mai/Mai/The LIFE Images Collection/Getty Images)

The data included the locations of at least some BioWatch air samplers, which are installed at subway stations and other public locations in more than 30 U.S. cities and are designed to detect anthrax or other airborne biological weapons, Homeland Security officials confirmed. It also included the results of tests for possible pathogens, a list of biological agents that could be detected and response plans that would be put in place in the event of an attack.

Trump says he’s watching Portland protests ‘closely’ and threatens to label antifa a terror group

Trump says he’s watching Portland protests ‘closely’ and threatens to label antifa a terror group President Trump threatened to label antifa a terrorist organization as dueling protests are expected in Portland, Oregon.

The German government passed an anti - terror law after the 9/11 attacks that was designed to help Germany is no longer a mere haven for terrorists , as it was back then; now Europe is even the And the amount of time that data can be stored, until now 15 years , has been reduced to 10 years .

The National Security Agency' s program for wiretapping terror suspects without warrants, the screening of suspicious airline passengers Part of the problem, they said, is that the sample of known terrorists and actual attacks is so small that it is difficult to establish patterns of suspicious behavior.

The information — housed on a dot-org website run by a private contractor — has been moved behind a secure federal government firewall, and the website was shut down in May. But Homeland Security officials acknowledge they do not know whether hackers ever gained access to the data.

Internal Homeland Security emails and other documents show the issue set off a bitter clash within the department over whether keeping the information on the dot-org website posed a threat to national security. A former BioWatch security manager filed a whistleblower complaint alleging he was targeted for retaliation after criticizing the program’s lax security.

Instagram will pay researchers to uncover abuse of users' personal data

Instagram will pay researchers to uncover abuse of users' personal data It's part of Facebook's expanding bug bounty program

And it gets into the way of a mature public discussion as to what it is that we as a democracy want Such information hands the advantage to the terrorists . It is the gift they need to evade us and strike at will."[49]. data had stopped any terror attacks.[3]. On October 31, 2013, U . S . Secretary of State John Kerry "The Section 215 bulk telephone records program ," PCLOB reported, "lacks a viable legal

Watch CBSN Live. U . S . anti - terror program to target Minneapolis-St. Paul. MINNEAPOLIS -- The cities of Minneapolis and St. Paul will participate in a Department of Justice pilot program designed to engage at-risk communities and stop extremists from recruiting Americans to join terror organizations

The website shared information among local, state and federal officials. It was easily identifiable through online search engines, but a user name and password were required to access sensitive data.

A security audit completed in January 2017 found “critical” and “high risk” vulnerabilities, including weak encryption that made the website “extremely prone” to online attacks. The audit concluded that there “does not seem to be any protective monitoring of the site,” according to a Homeland Security report summarizing the findings.

An inspector general’s report published later that year said sensitive information had been housed on the BioWatch portal since 2007 and was vulnerable to hackers. The report recommended moving the data behind the government’s firewall and said Homeland Security officials had agreed to do so.

It is unclear how valuable the data would have been to a terrorist group or enemy state. Scientists have warned that the BioWatch technology is unreliable. The system recognizes only a narrow range of microbes, and it struggles to differentiate between typical environmental bacteria and dangerous threats.

2 women plead guilty in plot to commit terror attack in US

2 women plead guilty in plot to commit terror attack in US Two New York women who plotted to build a bomb for a terrorist attack in the United States face 20 years in prison after pleading guilty to federal charges, authorities say. © Sketches by Jane Rosenberg Noelle Velentzas, left, and Asia Siddiqui sketched in court in 2015 Asia Siddiqui, 35, and Noelle Velentzas, 31, are US citizens and residents of the New York borough of Queens. require(["medianetNativeAdOnArticle"], function (medianetNativeAdOnArticle) { medianetNativeAdOnArticle.

A 8 million program aims to help non-profits protect against terror attacks. A Forward investigation found Jewish groups got most of the cash with no Examining the grants program provides a window into Jewish organizational and political power. It is this power that allowed a small community to

Is cultivating potential terrorists through stings and undercover agents the best use of the manpower? To trigger the bomb the student punched a number into a cellphone and got no boom, only a bust. This is legal, but is it legitimate? Without the F.B.I., would the culprits commit violence on

Still, several biodefense experts said it was disturbing that Homeland Security officials failed to adequately secure sensitive information from one of the nation’s anti-terrorism programs.

“Advertising your vulnerabilities is never a good thing. Letting your adversaries readily access your vulnerabilities — that’s a national security risk, in my judgment,” said Tom Ridge, who as the nation’s first secretary of Homeland Security oversaw the 2003 launch of BioWatch but has since denounced the program as ineffective. “Every American citizen would wonder, ‘What else is so easily accessible by the rest of the world?’”

James F. McDonnell, an assistant secretary appointed by President Trump to oversee Homeland Security’s new Countering Weapons of Mass Destruction Office, which includes BioWatch, said the data that were housed outside the secure government firewall were not important enough to cause a national security threat, but he said officials have taken steps to strengthen cybersecurity across the department. He noted that the problem predated his appointment.

Australia will block domains with extremist material during terror attacks

Australia will block domains with extremist material during terror attacks Australia's quest to fight online extremism will soon involve temporary but far-reaching bans. Prime Minister Scott Morrison has announced that the country will block internet domains hosting extremist material in the middle of terrorist attacks and other crises, such as the anti-Muslim shooting in Christchurch, New Zealand this past March. The government also plans to block domains hosting "abhorrent" material created by the perpetrators, such as murder and sexual assault.

TERROR : NY, NJ bombs hold an ugly mirror to America. The FBI rolled out plans for the intervention teams in New Jersey and in a few major U . S . cities Shannon Erwin, executive director of the Muslim Justice League in Boston, said the community didn’t ask for the federal government to get involved

" Terrorists could exploit the program , could go from France to Syria, as 2,000 fighters have done, come back to France, use the visa waiver program and without further scrutiny come into the United States," said Feinstein, a senior member "On the front end, it is a very thorough vetting that they get .

“What happened before, happened before. You can’t put the genie back in the bottle,” he said. “There’s been a real ramping-up on concerns about cybersecurity.”

Long list of troubles

The security problems add to a long list of troubles for BioWatch.

The program, which has cost taxpayers more than $1.6 billion, was launched two years after letters laced with anthrax spores killed five people and sickened 17 others shortly after the Sept. 11, 2001, terrorist attacks. BioWatch became part of Homeland Security’s Office of Health Affairs in 2007.

A 2012 Times investigation identified serious shortcomings, including false alarms and doubts about whether BioWatch could be relied on to identify a bioterrorism event. In 2015, a Government Accountability Office study concluded that the program could not be counted on to detect an attack and said BioWatch generated 149 false alarms from 2003 through 2014.

Each day, public health workers across the country collect filters from the air samplers and run tests on the contents, searching for signs of dangerous pathogens in the air. In some cases, reports of suspicious lab findings are uploaded to the BioWatch portal for review by other officials.

Some local officials objected to storing these and other sensitive documents on a federal server that other government officials could access without their knowledge or consent, according to the inspector general’s report. As a result, the report said, the Office of Health Affairs decided against moving the portal inside the Department of Homeland Security’s firewall.

Judge To Rule On Demand For Records By Fort Worth Police Chief Joel Fitzgerald

Judge To Rule On Demand For Records By Fort Worth Police Chief Joel Fitzgerald FORT WORTH (1080 KRLD) - A judge in Dallas says she will rule late today or early tomorrow on a demand for records by former Fort Worth police chief Joel Fitzgerald in his whistle-blower lawsuit. © Provided by Entercom Radio, LLCIn court records, Fitzgerald claims within two hours of a scheduled meeting with the FBI to report corruption in Fort Worth City Hall, he was fired as police chief. Fitzgerald says he was investigating the destruction of public records by two top city officials, records that dealt with access to a guarded federal crime database.

He tells NPR' s Scott Simon that similar software could be used to track terror content if tech companies were willing to use it . President Obama has called on U . S . technology companies to crack down on terrorists ' use of social media. But would they have to roll back the encryption technology

Report Blasts U . S . Anti - Terror Strategy. By Alfonso Serrano. No terrorists have been prosecuted as part of the program . In another unidentified country, Immigration and Customs Chase could have sold its outstanding debt to a third-party which could have gone after the customers but chose not to.

Alarms over security

In August 2016, Harry Jackson, who worked for a branch of Homeland Security that deals with information security, was assigned to the BioWatch program. Three months later, he said in an interview with The Times, he learned about biowatchportal.org and demanded the agency stop using it, arguing that it housed classified information and that the portal’s security measures were inadequate.

Two other department officials tasked with monitoring how sensitive information is handled echoed the concerns in emails to BioWatch managers, according to records reviewed by The Times.

BioWatch officials pushed back. Michael Walter, the program’s manager, said in a conference call with other Homeland Security officials that information about the location of the network’s air samplers would not undermine its effectiveness since it was designed to detect a massive biological warfare attack. The samplers are in plain sight, he said, according to a recording of the call made by Jackson and reviewed by The Times.

Larry “Dave” Fluty, then Health Affairs’ principal deputy assistant secretary, argued during the same call that the agency had previously decided that treating the information as classified — and therefore triggering stricter access guidelines — would require security clearances for some 1,000 local officials who are involved in gathering and analyzing data from the air-collection units.

“It was determined from a policy standpoint that that can’t happen,” he said.

Man caught in failed ISIS-inspired attack on DC charged with supporting terrorists

Man caught in failed ISIS-inspired attack on DC charged with supporting terrorists A Maryland man allegedly pledged himself to ISIS and planned to run over pedestrians at the National Harbor but was stopped before he could carry out the attack.

Or, the threat could be manifest in individuals who engage in bad conduct for purely self-interested reasons such The largest and most active domestic terrorist groups who are specifically anti - U . S To understand the terrorist threat, contemporary literatures on groups associated with the attacks on

Personal data , also known as personal information, personally identifying information (PII), or sensitive personal information (SPI), is any information relating to identifying a person.

Weeks after the conference call, Steven Lynch, then chief of Homeland Security’s special security programs division, wrote in a memo reviewed by The Times that the agency planned to move the portal onto a dot-gov site behind the secure federal firewall. Still, he said, experts concluded there was “no evidence of criminal or suspicious activity” involving the dot-org portal and “minimal to no risk of unauthorized access.”

But a complaint made to the inspector general hotline had already triggered an internal audit of biowatchportal.org.

The audit turned up 41 vulnerabilities, and a scan detected a possible attempt by a hacker to access the portal. The auditing team was unable to validate the scan’s finding, and the team recommended that the contractor overseeing the site investigate. It is unclear whether that was done.

The contractor, Logistics Management Institute, declined to provide a comment. Walter, Fluty and Lynch did not respond to emails or phone calls from The Times.

‘DHS will never know’

In January 2017, Jackson published his concerns about the portal in the Journal of Bioterrorism & Biodefense. His article detailed what he called “negligent” security that required only single-factor authentication to access the website.

Department of Homeland Security officials removed BioWatch from Jackson’s portfolio, then suspended his security clearance and later placed him on administrative leave. They notified him that he had not sought the proper approval to publish his article and that it included information that should not have been made public. They also cited his recent conviction for drunk driving.

Jackson filed whistleblower complaints with several federal agencies, alleging he was the victim of retaliation for criticizing the program’s security. In one, he wrote that a successful hacker could “monitor the system, manipulate data, and create false flags so as to stake out federal, state and local response to a possible incident.”

The complaint continued: “To this date, DHS will never know the harm that has resulted from this because there is no intrusion detection capability.”

The inspector general’s report published later that year said no classified information was found on the BioWatch portal, but it confirmed that “critical and high risk vulnerabilities” could allow an attacker to access sensitive information on the site.

In October 2017, Homeland Security reinstated Jackson’s security clearance but issued him a warning. A letter notifying him of the decision did not address his whistleblower claim. He left the agency a few weeks later.

No federal agency has agreed to investigate Jackson’s complaints. In May, he filed an appeal with the Office of the Intelligence Community Inspector General. He is awaiting a response.

Queens Teen Arrested In Alleged ISIS Terror Plot Due In Court Today.
The FBI and NYPD arrested the 19-year-old last night at his home on Butler Street in East Elmhurst. The U.S. attorney’s office said the arrest was part of a national security investigation. Sources told CBS2 the suspect was planning to carry out a knife attack somewhere in Queens, all in the name of ISIS. Sources said he revealed his plans while texting with undercover FBI agents. Authorities have not released the teen’s name or an exact time or target. Officials said the suspect was under constant surveillance by law enforcement and there is no threat to public safety.

—   Share news in the SOC. Networks

Topical videos:

usr: 1
This is interesting!