Ex-TSA Employee Indicted For Tampering With Database Of Terrorist SuspectsEx-TSA Employee Indicted For Tampering With Database Of Terrorist Suspects
Case serves as a wake-up call about the potential dangers of malicious insider access to sensitive data
March 12, 2010
A federal grand jury has indicted a former employee of the Transportation Security Administration (TSA) for trying to corrupt a database of terrorism suspects in an inside job that many within the information security industry say is a stark reminder of how important it is to track insider access to sensitive data stores.
Douglas James Duchack, 46, faced charges on Wednesday that he attempted to tamper with TSA's Colorado Springs Operations Center (CSOC) systems just after he was terminated from his job as a data analyst in October.
Duchack had been in charge of processing new information from the Terrorist Screening Database and U.S. Marshal's Service Warrant Information Network database to update TSA's systems.
During the two-week period after being informed of his termination, Duchack allegedly placed malcode into the CSOC server containing data from the former database he was charged with in an intentional attempt to cause damage to the computer and database. The U.S. Department of Justice reports that he faces up to 10 years in federal prison and up to $500,000 in fines if he's convicted.
According to Slavik Markovich, chief technology officer at Sentrigo, this episode is a good example of why it is so important to monitor user activities, especially among IT users with elevated privileges. "Knowledgeable insiders -- especially those with privileged access like systems administrators, developers, or DBAs -- can easily bypass many of the standard security tools that exist in most organizations," Markovich says.
He says that in a lot of cases, network monitoring tools can be thwarted by encrypting transactions with the database hosts, while developers have the ability to plant logic bombs and backdoors within the code they have access to. Without real-time monitoring of what these users actually are doing within a database, organizations are blind to suspicious activities once the user is logged into the system.
"If you're just relying on username and password credentials to protect your systems, you're making a big mistake," says Phil Neray, vice president of security strategy of Guardium, an IBM company. "You need to find other protection mechanisms. If you're monitoring a database, for example, and someone is executing a command on that database that is not consistent with that role, you can have a policy that will alert the organization or block it."
In Duchack's case, the TSA's Office of Inspection and IT Security did manage to detect Duchack's illicit behavior, though details of how the detection was made were not released. However, Markovich says for every Duchack there are countless others within government agencies and the corporate world who manage to get away with similar database abuse due to lack of oversight.
"The analyst had access to the databases because of his job and probably tried to plant some destructive code in the database," Markovich says. "In this case they were caught, but more often than not, this will only be detected after the fact."
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks