Vendor website problems raises issues of oversight competence Legislation currently being considered by Congress would give the Department of Homeland Security a huge role in overseeing some private-sector IT security. Before giving DHS authority over anyone else you have to wonder how well it can do its own security. In at least one case the answer is, “Not at all.” The understandably anonymous Guy In A Computer Chair (GIACC) tells the story of one DHS website that doesn’t use encryption and displays passwords in plain text. The site is used to schedule appointments for Vendor Outreach Sessions with small businesses. It is run by a private contractor. This is just the sort of oversight DHS might be expected to do under the Cybersecurity Act of 2012. GIACC, being a good responsible American, tried to get the DHS to address this problem. In January 2012, I attended a vendor outreach session organized by DHS in Washington, D.C. During my scheduled meeting with Faye Jones, a small business specialist at DHS (see here for more), I brought screenshots like this to show her the vulnerability. Ms. Jones fully understood my concerns for displaying contractors’ (many of whom do classified work for DHS) passwords in plain text and for their transmission to occur over the internet unencrypted. I’ve personally never seen any site do this, whether it purported to be secure on insecure — and this is a site that is displaying the DHS logo. Ms. Jones understood the problem immediately. Unfortunately, the person she directed GIACC to was less than helpful, suggesting he contact the contractor directly. Nothing happened. I have verified that this problem still exists and I, too, have heard nothing back from DHS. While this is just one website, given the ongoing problems the government is having with vendors’ websites (see After first Anon hack, PR firm failed to update other .gov websites), this is clearly a weak spot that needs to be addressed. As Guy in the Computer Chair put it so well: Why is this a big deal, if this portal is only used for scheduling? Three reasons: 1. People reuse passwords, and this represents an easy way to steal passwords. 2. Network security professionals often (rightly, in my view) describe network security as a chain, in which the overall network is only as secure as each link. This website represents easy prey — an “attack vector” — for a hacker to launch a broader attack. 3. DHS already has a significant cyber security mandate and it appears that it will only be expanding. How can the American people trust that DHS will secure civilian cyberspace when they are paying a private contractor to transmit passwords unencrypted and show them in plain text? Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe