Get Task & Purpose in your inbox
Hackers could have breached US bioterrorism defenses for years, records show. We'll never know if they did
The Department of Homeland Security stored sensitive data from the nation's bioterrorism defense program on an insecure website where it was vulnerable to attacks by hackers for over a decade, according to government documents reviewed by The Los Angeles Times.
The data included the locations of at least some BioWatch air samplers, which are installed at subway stations and other public locations in more than 30 U.S. cities and are designed to detect anthrax or other airborne biological weapons, Homeland Security officials confirmed. It also included the results of tests for possible pathogens, a list of biological agents that could be detected and response plans that would be put in place in the event of an attack.
The information — housed on a dot-org website run by a private contractor — has been moved behind a secure federal government firewall, and the website was shut down in May. But Homeland Security officials acknowledge they do not know whether hackers ever gained access to the data.
Internal Homeland Security emails and other documents show the issue set off a bitter clash within the department over whether keeping the information on the dot-org website posed a threat to national security. A former BioWatch security manager filed a whistleblower complaint alleging he was targeted for retaliation after criticizing the program's lax security.
The website shared information among local, state and federal officials. It was easily identifiable through online search engines, but a user name and password were required to access sensitive data.
A security audit completed in January 2017 found "critical" and "high risk" vulnerabilities, including weak encryption that made the website "extremely prone" to online attacks. The audit concluded that there "does not seem to be any protective monitoring of the site," according to a Homeland Security report summarizing the findings.
An inspector general's report published later that year said sensitive information had been housed on the BioWatch portal since 2007 and was vulnerable to hackers. The report recommended moving the data behind the government's firewall and said Homeland Security officials had agreed to do so.
It is unclear how valuable the data would have been to a terrorist group or enemy state. Scientists have warned that the BioWatch technology is unreliable. The system recognizes only a narrow range of microbes, and it struggles to differentiate between typical environmental bacteria and dangerous threats.
Still, several biodefense experts said it was disturbing that Homeland Security officials failed to adequately secure sensitive information from one of the nation's anti-terrorism programs.
"Advertising your vulnerabilities is never a good thing. Letting your adversaries readily access your vulnerabilities — that's a national security risk, in my judgment," said Tom Ridge, who as the nation's first secretary of Homeland Security oversaw the 2003 launch of BioWatch but has since denounced the program as ineffective. "Every American citizen would wonder, 'What else is so easily accessible by the rest of the world?'"
James F. McDonnell, an assistant secretary appointed by President Trump to oversee Homeland Security's new Countering Weapons of Mass Destruction Office, which includes BioWatch, said the data that were housed outside the secure government firewall were not important enough to cause a national security threat, but he said officials have taken steps to strengthen cybersecurity across the department. He noted that the problem predated his appointment.
"What happened before, happened before. You can't put the genie back in the bottle," he said. "There's been a real ramping-up on concerns about cybersecurity."
Long list of troubles
The security problems add to a long list of troubles for BioWatch.
The program, which has cost taxpayers more than $1.6 billion, was launched two years after letters laced with anthrax spores killed five people and sickened 17 others shortly after the Sept. 11, 2001, terrorist attacks. BioWatch became part of Homeland Security's Office of Health Affairs in 2007.
A 2012 Times investigation identified serious shortcomings, including false alarms and doubts about whether BioWatch could be relied on to identify a bioterrorism event. In 2015, a Government Accountability Office study concluded that the program could not be counted on to detect an attack and said BioWatch generated 149 false alarms from 2003 through 2014.
Each day, public health workers across the country collect filters from the air samplers and run tests on the contents, searching for signs of dangerous pathogens in the air. In some cases, reports of suspicious lab findings are uploaded to the BioWatch portal for review by other officials.
Some local officials objected to storing these and other sensitive documents on a federal server that other government officials could access without their knowledge or consent, according to the inspector general's report. As a result, the report said, the Office of Health Affairs decided against moving the portal inside the Department of Homeland Security's firewall.
Alarms over security
In August 2016, Harry Jackson, who worked for a branch of Homeland Security that deals with information security, was assigned to the BioWatch program. Three months later, he said in an interview with The Times, he learned about biowatchportal.org and demanded the agency stop using it, arguing that it housed classified information and that the portal's security measures were inadequate.
Two other department officials tasked with monitoring how sensitive information is handled echoed the concerns in emails to BioWatch managers, according to records reviewed by The Times.
BioWatch officials pushed back. Michael Walter, the program's manager, said in a conference call with other Homeland Security officials that information about the location of the network's air samplers would not undermine its effectiveness since it was designed to detect a massive biological warfare attack. The samplers are in plain sight, he said, according to a recording of the call made by Jackson and reviewed by The Times.
Larry "Dave" Fluty, then Health Affairs' principal deputy assistant secretary, argued during the same call that the agency had previously decided that treating the information as classified — and therefore triggering stricter access guidelines — would require security clearances for some 1,000 local officials who are involved in gathering and analyzing data from the air-collection units.
"It was determined from a policy standpoint that that can't happen," he said.
Weeks after the conference call, Steven Lynch, then chief of Homeland Security's special security programs division, wrote in a memo reviewed by The Times that the agency planned to move the portal onto a dot-gov site behind the secure federal firewall. Still, he said, experts concluded there was "no evidence of criminal or suspicious activity" involving the dot-org portal and "minimal to no risk of unauthorized access."
But a complaint made to the inspector general hotline had already triggered an internal audit of biowatchportal.org.
The audit turned up 41 vulnerabilities, and a scan detected a possible attempt by a hacker to access the portal. The auditing team was unable to validate the scan's finding, and the team recommended that the contractor overseeing the site investigate. It is unclear whether that was done.
The contractor, Logistics Management Institute, declined to provide a comment.
Walter, Fluty and Lynch did not respond to emails or phone calls from The Times.
'DHS will never know'
In January 2017, Jackson published his concerns about the portal in the Journal of Bioterrorism & Biodefense. His article detailed what he called "negligent" security that required only single-factor authentication to access the website.
Department of Homeland Security officials removed BioWatch from Jackson's portfolio, then suspended his security clearance and later placed him on administrative leave. They notified him that he had not sought the proper approval to publish his article and that it included information that should not have been made public. They also cited his recent conviction for drunk driving.
Jackson filed whistleblower complaints with several federal agencies, alleging he was the victim of retaliation for criticizing the program's security. In one, he wrote that a successful hacker could "monitor the system, manipulate data, and create false flags so as to stake out federal, state and local response to a possible incident."
The complaint continued: "To this date, DHS will never know the harm that has resulted from this because there is no intrusion detection capability."
The inspector general's report published later that year said no classified information was found on the BioWatch portal, but it confirmed that "critical and high risk vulnerabilities" could allow an attacker to access sensitive information on the site.
In October 2017, Homeland Security reinstated Jackson's security clearance but issued him a warning. A letter notifying him of the decision did not address his whistleblower claim. He left the agency a few weeks later.
No federal agency has agreed to investigate Jackson's complaints. In May, he filed an appeal with the Office of the Intelligence Community Inspector General. He is awaiting a response.
©2019 the Los Angeles Times. Distributed by Tribune Content Agency, LLC.
A Minnesota Army National Guard UH-60 Black Hawk helicopter with three Guardsmen aboard crashed south of St. Cloud on Thursday, said National Guard spokeswoman Army Master Sgt. Blair Heusdens.
At this time, the National Guard is not releasing any information about the status of the three people aboard the helicopter, Heusdens told Task & Purpose on Thursday.
The Pentagon's latest attempt to twist itself in knots to deny that it is considering sending up to 14,000 troops to the Middle East has a big caveat.
Pentagon spokeswoman Alyssa Farah said there are no plans to send that many troops to the region "at this time."
Farah's statement does not rule out the possibility that the Defense Department could initially announce a smaller deployment to the region and subsequently announce that more troops are headed downrange.
The Navy could deploy a second carrier to the Middle East if Trump orders an Iran surge, top admiral says
The Navy could send a second aircraft carrier to the Middle East if President Donald Trump orders a surge of forces to the region, Chief of Naval Operations Adm. Mike Gilday said on Thursday.
Gordon Lubold and Nancy Youssef of the Wall Street Journal first reported the United States is considering sending up to 14,000 troops to the Middle East to deter Iran from attacking U.S. forces and regional allies. The surge forces could include several ships.
I didn't think a movie about World War I would, or even could, remind me of Afghanistan.
Somehow 1917 did, and that's probably the highest praise I can give Sam Mendes' newest war drama: It took a century-old conflict and made it relatable.
An internal investigation spurred by a nude photo scandal shows just how deep sexism runs in the Marine Corps
"I will still have to work harder to get the perception away from peers and seniors that women can't do the job."
Some years ago, a 20-year-old female Marine, a military police officer, was working at a guard shack screening service members and civilians before they entered the base. As a lance corporal, she was new to the job and the duty station, her first in the Marine Corps.
At some point during her shift, a male sergeant on duty drove up. Get in the car, he said, the platoon sergeant needs to see you. She opened the door and got in, believing she was headed to see the enlisted supervisor of her platoon.
Instead, the sergeant drove her to a dark, wooded area on base. It was deserted, no other Marines were around. "Hey, I want a blowjob," the sergeant told her.
"What am I supposed, what do you do as a lance corporal?" she would later recall. "I'm 20 years old ... I'm new at this. You're the only leadership I've ever known, and this is what happens."
She looked at him, then got out of the car and walked away. The sergeant drove up next to her and tried to play it off as a prank. "I'm just fucking with you," he said. "It's not a big deal."
It was one story among hundreds of others shared by Marines for a study initiated in July 2017 by the Marine Corps Center for Advanced Operational Culture Learning (CAOCL). Finalized in March 2018, the center's report was quietly published to its website in September 2019 with little fanfare.
The culture of the Marine Corps is ripe for analysis. A 2015 Rand Corporation study found that women felt far more isolated among men in the Corps, while the Pentagon's Office of People Analytics noted in 2018 that female Marines rated hostility toward them as "significantly higher" than their male counterparts.
But the center's report, Marines' Perspectives on Various Aspects of Marine Corps Organizational Culture, offers a proverbial wakeup call to leaders, particularly when paired alongside previous studies, since it was commissioned by the Marine Corps itself in the wake of a nude photo sharing scandal that rocked the service in 2017.
The scandal, researchers found, was merely a symptom of a much larger problem.