Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
 

Sivart

(325 posts)
Tue Jul 26, 2016, 02:01 PM Jul 2016

This election and IT systems.....

It seems super freakin clear to me as an IT professional that our Democratic party does not have the right IT staff on hand to manage their systems and their data properly.

Obviously, without rehashing the Clinton email server thing, she messed up bad - which she admitted - and a properly qualified IT professional would have prevented that whole fiasco.

In addition, this latest thing with the Russian hackers.....Hello - the DNC email system was apparently hacked and they apparently had no idea.

in short, I hope the DNC and Democrats serving everywhere take notice and seek out and employ qualified, quality IT security professionals.

The current situation continues to make our party look like amateurs.

33 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
This election and IT systems..... (Original Post) Sivart Jul 2016 OP
In fairness to the DNC, Russia's state agencies geek tragedy Jul 2016 #1
Agree. Wellstone ruled Jul 2016 #2
This is definitely the case. NWCorona Jul 2016 #3
Even more so LoverOfLiberty Jul 2016 #17
Could you please elaborate on your knowledge of Russian hacking? Sivart Jul 2016 #6
The Russians have broke into the White House and Pentagon. geek tragedy Jul 2016 #9
So, you have no knowledge of russian hacking capabilities specifically.... Sivart Jul 2016 #11
here's some background material for you to help you learn geek tragedy Jul 2016 #13
You are the only one bringing up the Primaries.... Sivart Jul 2016 #15
I'm sure you know better than every data security geek tragedy Jul 2016 #16
Well, I am trying to bring actual real world perspective to the conversation while you.... Sivart Jul 2016 #21
Do you think the White House and Pentagon don't have IT people geek tragedy Jul 2016 #22
This gets exactly to my concern..... Sivart Jul 2016 #25
Well, aside from telling us that you're an IT professional, MineralMan Jul 2016 #26
MineralMan, please re-read.... Sivart Jul 2016 #27
And as much as this might make people's head explode Cosmocat Jul 2016 #8
Professional hackers, employed by a government, MineralMan Jul 2016 #4
Not sure where you are getting your information, but I do this for a living, and..... Sivart Jul 2016 #5
Same here. TheBlackAdder Jul 2016 #10
Those lovely NSA backdoors in routers, motherboards and OSes are such a wonderful thing. TheBlackAdder Jul 2016 #7
The thing is that the DNC's email system is mostly MineralMan Jul 2016 #12
Well, we cant have it both ways..... Sivart Jul 2016 #14
Well, see, the thing is that it's politics. MineralMan Jul 2016 #19
That's a good point. Mundane information is just that. TheBlackAdder Jul 2016 #20
According to the Sanders breach, they relied primarily on DNS/Firewall checking, which is infantile. TheBlackAdder Jul 2016 #18
Heck, I don't know. MineralMan Jul 2016 #23
It comes down to: How much to you want to spend and how much the IT contractor skims. TheBlackAdder Jul 2016 #28
This is the point i was trying to make.... Sivart Jul 2016 #24
Well the concern ymetca Jul 2016 #30
Hell, nixon's "plumbers" didn't even go after email. Brute force works, too. Cerridwen Jul 2016 #29
Why do you say they "apparently had no idea"? News that they were hacked came out over a month ago ContinentalOp Jul 2016 #31
Becasue if you read your own link...... Sivart Jul 2016 #33
I personally think they're fine, but that's just me. Tommy_Carcetti Jul 2016 #32
 

geek tragedy

(68,868 posts)
1. In fairness to the DNC, Russia's state agencies
Tue Jul 26, 2016, 02:03 PM
Jul 2016

have hacking capabilities far beyond a small-time operation like the DNC's ability to keep them out.

Should they have detected this or had better protocols in place? Probably.

Is there anything they could have done to keep a determined Vladimir Putin from getting his hands on their emails?

No.

NWCorona

(8,541 posts)
3. This is definitely the case.
Tue Jul 26, 2016, 02:08 PM
Jul 2016

Unfortunately in my experience IT security is usually a reactive thought.

That warning should have been heeded tho

LoverOfLiberty

(1,438 posts)
17. Even more so
Tue Jul 26, 2016, 02:59 PM
Jul 2016

the more layers of security you put in place, the more likely you are to create impediments to open communication.

 

Sivart

(325 posts)
6. Could you please elaborate on your knowledge of Russian hacking?
Tue Jul 26, 2016, 02:36 PM
Jul 2016

Can you be specific? What capabilities do the russians have that the DNC has no prevention for?

 

geek tragedy

(68,868 posts)
9. The Russians have broke into the White House and Pentagon.
Tue Jul 26, 2016, 02:40 PM
Jul 2016

The three most accomplished spy agencies are the US, China, and Russia.

 

Sivart

(325 posts)
11. So, you have no knowledge of russian hacking capabilities specifically....
Tue Jul 26, 2016, 02:43 PM
Jul 2016

but like to speak as if you do.


Gotcha.

 

geek tragedy

(68,868 posts)
13. here's some background material for you to help you learn
Tue Jul 26, 2016, 02:47 PM
Jul 2016
http://www.newsweek.com/2015/05/15/russias-greatest-weapon-may-be-its-hackers-328864.html

According to the U.S. Intelligence Community’s 2015 “Worldwide Threat Assessment” report, Russia and China are the "most sophisticated nation-state actors” in the new generation of cyberwarfare, and Russian hackers lead in terms of sophistication, programming power and inventiveness. “The threat from China is overinflated, while the threat from Russia is underestimated,” says Jeffrey Carr, head of Web security consultancy Taia Global and author of the book Inside Cyber Warfare. “The Russians are the most technically proficient. For instance, we believe that Russian hackers-for-hire were responsible for the Sony attack.”

Last year hackers gained access to thousands of Sony company emails and threatened further damage unless a film lampooning North Korean leader Kim Jong Un was withdrawn from cinemas. “We spoke to [one of the hackers] via an intermediary,” says Carr. “Even after Sony lost 80 percent of its network capability, the hackers were still operating. That shows an incredibly high level of technical ability.”


the primary is over, I suggest you move on

 

Sivart

(325 posts)
15. You are the only one bringing up the Primaries....
Tue Jul 26, 2016, 02:52 PM
Jul 2016

This link is more FUD. No actual information. All that is said about the Russian capabilities is that they are technically most proficient. How was this conclusion reached?????

 

geek tragedy

(68,868 posts)
16. I'm sure you know better than every data security
Tue Jul 26, 2016, 02:54 PM
Jul 2016

expert as well as the US Intelligence Community.

Sony has a lot of IT people dedicated to protecting its systems. Russia cracked their systems without breaking a sweat.

 

Sivart

(325 posts)
21. Well, I am trying to bring actual real world perspective to the conversation while you....
Tue Jul 26, 2016, 03:03 PM
Jul 2016

Are pretending to be an expert....but you are really just googling.

So, according to your google research, there is nothing that can be done about hackers because they are so good because google told you so.

 

geek tragedy

(68,868 posts)
22. Do you think the White House and Pentagon don't have IT people
Tue Jul 26, 2016, 03:06 PM
Jul 2016

on staff to protect their systems from hackers?

Or are you claiming that you're so good at your job that Russia and China couldn't hack your employer even though they were able to outfox the data protection systems at the White House and the Pentagon?

 

Sivart

(325 posts)
25. This gets exactly to my concern.....
Tue Jul 26, 2016, 03:10 PM
Jul 2016

I am not claiming to be the greatest IT security guy in the world.....but I do get paid for it.

My concern is not for the whitehose and the pentagon. it is for the DNC and the Democratic party. My concern is directly the result from seeing the many posts here on DU about concern over being hacked by russians.

MineralMan

(151,541 posts)
26. Well, aside from telling us that you're an IT professional,
Tue Jul 26, 2016, 03:15 PM
Jul 2016

we don't really know what your level of expertise actually is. But you're arguing that the Russians don't have advanced cyberwarfare capabilities?

Can you tell us why you believe that is the case?

 

Sivart

(325 posts)
27. MineralMan, please re-read....
Tue Jul 26, 2016, 03:17 PM
Jul 2016

I have not made any claims about the russian hackers' abilities. That was another poster. I was actually asking him to elaborate.

Cosmocat

(15,469 posts)
8. And as much as this might make people's head explode
Tue Jul 26, 2016, 02:39 PM
Jul 2016

the only e-mails they seemingly have not hacked were HRCs, just as that POS Comey who jobbed her (see, FBI getting hacked by them).

MineralMan

(151,541 posts)
4. Professional hackers, employed by a government,
Tue Jul 26, 2016, 02:13 PM
Jul 2016

are going to get access to whatever they want. A system they couldn't hack would be unusable by people working on a political campaign, frankly. While such a system could be created that would deflect even highly skilled Russian hackers, it wouldn't be a simple job that could be done by the typical IT person working for a political campaign.

In fact, systems at every level of government are routinely hacked. We just don't hear about it.

 

Sivart

(325 posts)
5. Not sure where you are getting your information, but I do this for a living, and.....
Tue Jul 26, 2016, 02:31 PM
Jul 2016

and I am 100 percent expected to keep my employer's systems and data safe. Period. Having been in this field for over 15 years, I do not ever recall being in the employ of anyone who thought, like you, that there is nothing that can be done about hackers.

And secure systems are completely usable.....not sure what the point would be if this were not the case.

So much misinformation.

This is exactly what I am talking about in my OP. There needs to be actual IT security professionals protecting the DNC systems. Currently, it appears that they are lacking in that department.

TheBlackAdder

(29,981 posts)
7. Those lovely NSA backdoors in routers, motherboards and OSes are such a wonderful thing.
Tue Jul 26, 2016, 02:37 PM
Jul 2016

.


Remember, you need at least 3 tiers to secure a system, with no backdoors, and the backend systems are nowhere near an internet connection. This includes your database, as one of the best hacks is picking data off of a cloud provider's system, where it's not if you data gets compromised but when and how often. Single session state tokens from end to end, right bown to the back-end database rows and record levels.

.

MineralMan

(151,541 posts)
12. The thing is that the DNC's email system is mostly
Tue Jul 26, 2016, 02:44 PM
Jul 2016

mundane messaging. Looking at what has been released, none of it is really all that sensitive. Bottom line, unbreakable security isn't really needed on such an email system. So the DNC emails have been compromised, but aren't actually going to result in any real disasters. There's nothing there that is really all that damning, frankly.

A week from now, nobody's even going to care about those emails. They're boring.

 

Sivart

(325 posts)
14. Well, we cant have it both ways.....
Tue Jul 26, 2016, 02:49 PM
Jul 2016

we can't say - we don't want to take the time and effort to secure this information, no matter how mundane, and then act like another government is trying to take over or influence our election when said information is hacked.

If its not important to secure that information then it should not be an issue that Russia or Wiki or Trump has it.

This just makes no sense to me.

MineralMan

(151,541 posts)
19. Well, see, the thing is that it's politics.
Tue Jul 26, 2016, 03:00 PM
Jul 2016

There's not really that much that is sensitive about the DNC's emails. Slightly embarrassing, perhaps, but hardly critical information. But, it has to do with a presidential election, so it's of high interest to some. Once breached, the data is there, but how to use it?

If the Russians did it, their easiest solution is to dump in on wikileaks and let them release the whole schlimazel and see what happens. Turns out that nothing really happened. It showed that some people at the DNC wanted Hillary to win and hoped Sanders would lose. No surprise there.

The hacked emails were essentially useless, but still somewhat embarrassing. Once the convention is over, nobody will give a damn about any of them, frankly

On the other hand, the FBI is interested in the hacking itself, as always. No doubt some other alphabetical agencies will also have an interest in the hackers and may learn something useful. The Russians will get blamed and they'll really be the only ones who really lose anything in all of this.

Assange and wikileaks? Who cares, really? I don't. Frankly I worry more about the 4Chan script kiddies than wikileaks. They're vandals, looking for ways to cause damage.

So, you're in IT, and responsible for security for some business network system. Cool. Does anyone have a serious reason to hack your employer, beyond the usual personal information data theft exploits? Are the Russian hackers working on the data at your company? Probably not. I'm sure your system is secure enough for what's necessary. But, if you think it's actually impenetrable, you're probably wrong.

TheBlackAdder

(29,981 posts)
18. According to the Sanders breach, they relied primarily on DNS/Firewall checking, which is infantile.
Tue Jul 26, 2016, 03:00 PM
Jul 2016

.


There were so many violations of security standards, verging on criminal negligence, at the DNC.

Shared userids and passwords.

Limited security on the back-end side.

No session state tokens to guarantee a session doesn't get hijacked.

No transactional security tokens from the workstation to database row levels.


===


Imagine being at a bank and their DNS or Firewall goes down, and everyone has access to everyone else's information.

Hard to imagine? That's because nobody ever freakin' does that!


===


But, supposedly, there was a DNS or Firewall outage and it somehow it opened up the keys to the kingdom.

I call complete bullshit or rank amateurs who should never be near a computer system.


===


The questions are:
Was everything released, were things held back for later or are there more surprises?
How many different systems were targeted and do they even know?


I bet that there were more breaches than they either know about or will admit.
Proper systems and policing detects these things immediately, or by the next day.


It's sort of like when some stores get a hit and release the credit card theft notice many months later.

When they know within a few days the scope of attack.


.

MineralMan

(151,541 posts)
23. Heck, I don't know.
Tue Jul 26, 2016, 03:07 PM
Jul 2016

As far as I'm concerned, most systems are vulnerable if someone really wants to exploit them. I imagine that the NSA's systems are pretty much imprenetrable, but then, that's the business that agency is in. Most other government networks, however, are vulnerable to exploits and most of them have already been exploited.

Just because there's no news doesn't mean things are secure. I'm not a data security expert. I don't much care about that stuff, since I'm not involved in any organizations that matter to anyone. I'm not a hacker, either, because there's nothing much I'm looking for. Still, I do follow network security issues pretty closely. I find it all very interesting.

But I don't care all that much.

Bottom line, the DNC's emails are pretty damned boring, really. Just not that interesting to anyone, I'd think, once the convention is over. Just another big ado about not much at all.

It's humorous to me.

TheBlackAdder

(29,981 posts)
28. It comes down to: How much to you want to spend and how much the IT contractor skims.
Tue Jul 26, 2016, 03:20 PM
Jul 2016

.


You can create immensely tight systems, but it needs at least 3 tiers and a skilled staff.

One person, one server cannot protect data--the result is a virtually open system.


It is a fallacy that a stand-alone system is secure, and can be breached by a teenager in minutes. And, most kids who do that know how to leave zero footprints. People who say they "checked the logs" are just bullshitters. Those logs can be edited, and rebuilt during, after, or when a post-mortem takes place to cover one's butt.

Copies of a drive tell you nothing, and most people know to perform a 7-pass sweep to clean a disk. So, with a day's notice, any drive can look legit.


===


At this point, I would say that everything in the custody of the DNC was exposed and is floating around somewhere.

Emails, membership, banking information, etc...


.

 

Sivart

(325 posts)
24. This is the point i was trying to make....
Tue Jul 26, 2016, 03:09 PM
Jul 2016

It appears like amateurs are in charge of our party's IT systems.

There are multiple threads about concern over hacking, and russians meddling in our election.

But I mention the security of our data, and apparently A) DU thinks there is nothing that can be done about hackers and B) the information is not really that sensitive anyway.

So, enjoy your amateur IT solutions, Democrats!!! Because apparently it is of no concern to anyone but me.

Thanks for the comments, folks.

ymetca

(1,182 posts)
30. Well the concern
Tue Jul 26, 2016, 03:58 PM
Jul 2016

... always seems to be about keeping "sensitive" (I.e. embarrassing) information from the general public. Which seems darn near impossible when all us IT folks are disgruntled outsourced contractors on a temp job working for bosses who act like we are interchangeable cogs in their money machines.

The worst thing you can do is point out that the CEO has his passwords sticky-noted to his monitor!

Cerridwen

(13,262 posts)
29. Hell, nixon's "plumbers" didn't even go after email. Brute force works, too.
Tue Jul 26, 2016, 03:40 PM
Jul 2016

Hell, nixon's "plumbers" didn't even go after email. Brute force works, too. As does phishing and social interaction and plain old fashioned con-men (note: con is short for confidence, i.e., you gain a person's confidence in order to...take advantage of their trusting, good nature); as well as managers who refuse to pay for or provide the time for, security or training of their employees.

If you've spent 15 years in IT security then you're familiar with passwords that are names of the family pet, a spouse or child, dates of birth, favorite sports teams, etc. and the ever present Post-It(tm) notes. You're also familiar with people who can't be bothered to log out or shut down their PCs or who think that their boss should have access to their workstation.

As long as humans can be conned, bossed, or flattered, IT security is using a "spoon to empty out the ocean."

About 20 years ago, I was Director of IT for a "small" business whose CEO wanted to know why I couldn't "just press a button and fix everything." The "everything" was the hardware and software they'd bought from their previous IT Dir who'd been selling them crap from his garage; no, I'm not kidding. He had managed to talk them into a phone system that was way over their needs and several pieces of hardware he "got a good deal on" from his friends. While trouble-shooting a system "outage," I discovered him in the server room with the cable from the data server unplugged and in his hand as he was tired of tripping over it in the mess of a server room he'd set up.

It took us 6 months to clean up that mess and get their data/voice systems up and running 24/7. We would have finished sooner except the "Operations Manager" thought that software and hardware updates should be performed during working hours so they wouldn't have to pay overtime; yep, hourly IT workers. Nice, huh? Oh, wait, are you of the generation who thinks that's the norm? If so, then nevermind.

Yes, you are correct, we do need people to take IT security seriously. However, we're only about 3 generations (real world time) from the PDP-11 on which I wrote my first "hello world" (followed by my first infinite loop; it was really cool :-D Somewhat zen-like watching "hello world" stack up on a CRT). It'll be a few more generations of just what you're talking about, before IT security is treated as vital as the fake numbers the salesmen and MBAs report to the CEO who doesn't have a clue about his/her business.

Welcome to the wonderful world of "new" technology. Buy stock in Tums(tm), save your money, invest wisely, retire early, and get the hell out to go write your novel, climb the highest mountain, or volunteer for your favorite cause.

Oh yeah, and go put your resume in at the DNC and see if you can get a job teaching them about and implementing IT security.















 

Sivart

(325 posts)
33. Becasue if you read your own link......
Tue Jul 26, 2016, 04:09 PM
Jul 2016

The hackers had access for a year or more before being discovered.

This is according to your link.

Kick in to the DU tip jar?

This week we're running a special pop-up mini fund drive. From Monday through Friday we're going ad-free for all registered members, and we're asking you to kick in to the DU tip jar to support the site and keep us financially healthy.

As a bonus, making a contribution will allow you to leave kudos for another DU member, and at the end of the week we'll recognize the DUers who you think make this community great.

Tell me more...

Latest Discussions»Retired Forums»2016 Postmortem»This election and IT syst...