Attacks/Breaches
12/6/2012
11:17 AM
50%
50%

Swiss Spooks Warn Of Counter-Terrorism Intelligence Breach

Swiss government suspects insider may have stolen counter-terrorism information that had been shared with Switzerland by foreign governments, including Britain and the United States.

Who Is Hacking U.S. Banks? 8 Facts
Who Is Hacking U.S. Banks? 8 Facts
(click image for larger view and for slideshow)
Authorities in Switzerland have warned U.S. intelligence officials that a senior IT technician working for a Swiss intelligence service may have compromised U.S. and British counter-terrorism operations.

In September, Swiss attorney general Michael Lauber and a senior prosecutor, Carolo Bulletti, held a press conference to disclose the alleged data theft, and said that they had a suspect in custody. "The intention was to sell the data to other countries," said Bulletti, but authorities didn't know whether that had happened.

Earlier this week, Reuters reported that unnamed European intelligence sources with knowledge of the investigation said that Swiss authorities still haven't ascertained whether the suspect sold the data. That led Swiss authorities to warn all intelligence agencies that share counter-terrorism information with Switzerland -- including the CIA and Britain's Secret Intelligence Service, or MI6 -- that the information may have been sold to foreign intelligence agencies or commercial buyers.

[ The downfall of CIA director David Patraeus has lawmakers focusing on email and online privacy protection. Read more at The Petraeus Affair: Surveillance State Stopper? ]

The suspect worked for the NDB, Switzerland's federal intelligence service, which is part of its defense ministry, for eight years. He reportedly had administrator-level rights to most of the spy agency's networks, including ones storing highly secret information, and became disgruntled after feeling that higher-level managers were ignoring his recommendations.

Reportedly, the quantity of breached data involves terabytes of secret information and was stolen when the suspect copied it onto a portable hard drive and walked out of government premises with the drive stored in a backpack. Swiss authorities arrested the suspect -- who under Swiss laws can't be named -- in May, and said they recovered numerous portable devices containing the surreptitiously copied intelligence data. Authorities were tipped off by Swiss bank UBS, which had traced an attempt to open a new, numbered bank account to the IT technician. The suspect has been released on bail while the related investigation continues.

According to the European intelligence sources, the employee began displaying some of the classic warning signs that precede insider attacks, such as manifesting a disgruntled attitude and regularly failing to show up for work. The signs, however, were apparently ignored.

The Swiss case is far from the first time that a disgruntled IT-savvy employee with access to sensitive information has been accused of stealing it. In 2009, for example, MI6 caught Daniel Houghton, one of its computer programmers, trying to sell cutting-edge email interception technology, as well as staff lists containing cell phone numbers and home addresses for MI6 and Britain's MI5 domestic intelligence service. Houghton had downloaded at least 7,000 files onto a secure digital memory card and offered it for sale to the Dutch intelligence service, or AIVD. Dutch officials tipped off MI6, who busted Houghton in a sting operation.

Arguably, that data breach could have been prevented if proper controls been in place to monitor for unusual network behavior, such as copying 7,000 files to a removable memory card. The same, of course, could be said for the NDB in Switzerland, or for that matter, the Department of Defense, which saw 251,000 sensitive diplomatic cables get leaked to WikiLeaks. The alleged perpetrator, Private First Class Bradley Manning, an intelligence analyst, allegedly copied the data onto rewritable CDs, which he stored in a Lady Gaga CD case. According to psychologists, Manning's superiors ignored obvious insider-attack warning signs indicated in his emotional and mental state.

Benchmarking normal activity and then monitoring for users who stray from that norm is an essential strategy for getting ahead of potential data and system breaches. But choosing the right tools is only part of the effort. Without sufficient training, efficient deployment and a good response plan, attackers could gain the upper hand. Download our Fundamentals Of User Activity Monitoring report. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
12/17/2012 | 4:00:17 PM
re: Swiss Spooks Warn Of Counter-Terrorism Intelligence Breach
That was a great article to read. Did HR take an responsibility for not noting the signs of a disgruntled employee, because if they had this operation could have never been jeopardized , at least not by that IT technician. The people mentioned in the article for past attacks all had access to sensitive data, and judging form how they caught this was obviously not there area of focus.

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1421
Published: 2014-11-25
mountall 1.54, as used in Ubuntu 14.10, does not properly handle the umask when using the mount utility, which allows local users to bypass intended access restrictions via unspecified vectors.

CVE-2014-3605
Published: 2014-11-25
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6407. Reason: This candidate is a reservation duplicate of CVE-2014-6407. Notes: All CVE users should reference CVE-2014-6407 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-6093
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 7.0.x before 7.0.0.2 CF29, 8.0.x through 8.0.0.1 CF14, and 8.5.x before 8.5.0 CF02 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-6196
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM Web Experience Factory (WEF) 6.1.5 through 8.5.0.1, as used in WebSphere Dashboard Framework (WDF) and Lotus Widget Factory (LWF), allows remote attackers to inject arbitrary web script or HTML by leveraging a Dojo builder error in an unspecified WebSp...

CVE-2014-7247
Published: 2014-11-25
Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?