Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:30 AM
Sharon Gaudin
Sharon Gaudin

If An FBI Analyst Can Steal National Secrets, What Are Your Workers Lifting?

Looking back on the story about the former Marine and FBI analyst who stole classified information from both the White House and the FBI's own database, I think there are some important lessons to be learned from this one.

Looking back on the story about the former Marine and FBI analyst who stole classified information from both the White House and the FBI's own database, I think there are some important lessons to be learned from this one.In what was nearly a four-year conspiracy, the man who pleaded guilty to pirating national secrets and attempting to foster a political coup in the Philippines wasn't the savviest spy this country has ever seen. Oh, don't get me wrong. Leandro Aragoncillo wasn't a stupid man, but he was a fairly sloppy spy. And if he can get away with stealing sensitive national defense information, think about what a savvy worker could lift from your own company.

Aragoncillo managed to steal classified documents from the Office of the Vice President of the United States, as well as from the FBI, an intelligence bastion known around the world. In both of these government positions, Aragoncillo had top secret security clearance. Yes, he was allowed to view classified documents. However, that high-level access only covered information related to cases he was actually supposed to be working on. He did not have the full run of government databases, yet he ran queries outside his authorization limits for nearly four years.

Aragoncillo was a major cog in a multinational conspiracy to oust a Philippine president and her administration. Court documents showed that he stole information about the Philippine economy, confidential U.S. intelligence sources, and even terrorist threats against U.S. military personnel stationed in the Philippines. While he was with the FBI, he accessed, downloaded, and printed classified documents that belonged to the FBI, the Department of Defense, the CIA, and the U.S. Department of State. Court papers noted that many of the stolen documents held national defense information.

This government insider didn't do much to cover his tracks, though.

Court documents showed that he actually had the nerve to transmit classified information to a co-conspirator from a fax machine inside the White House. When he sent information online, he generally did it from a home computer. And while he used an alias and some code words, he sent the e-mails using Hotmail and Yahoo accounts. Nothing was encrypted. When he queried databases for information to steal, he did it at his desk -- possibly sipping a cup of coffee or waving to a colleague passing by.

Now, I found this part pretty startling. When the FBI began to investigate Aragoncillo, they told him they were investigating him. And he continued to steal information anyway. He knew he was being watched and it didn't deter him. Conspirators told him to back off, but he didn't.

What I'm getting at here is that this guy was no James Bond-type with high-tech gadgets, elaborate disguises, and inside-government cohorts helping him sidestep an ever-watchful security presence. He sat at his desk, ran queries, downloaded information onto a disc, put it in his bag, and walked right out the door with it. No one checked to see what he was querying for. He was an FBI intelligence analyst. He was one of them. His coworkers and administrators simply saw him as the trusted insider.

The problem is that the trusted insider often is the most dangerous threat there is, whether it's to the U.S. government or to a Fortune 500 company or a medium-sized local business. And we hate to think that way. None of us want to be thought of as the mistrustful jerk. Who wants to have to keep an eye on the people we talk to while we wait for the coffee machine to brew another pot, or who play on the same company bocce team or even just pass in the hallway?

A recent study showed that nearly half of professionals from across a wide range of industries admit they have taken data with them -- everything from documents and lists to sales proposals and contracts -- when they've changed jobs. According to the international Information Security Survey, users polled said they don't see their companies' IT security practices as obstacles to accessing data from outside company walls or to walking out the door with it in their bag or thumb drive.

That needs to change.

Are you sure no one is rooting around in databases where they have no business? Are you sure no one is accessing sensitive financial or personnel information? Are you sure company data isn't walking out the building on a disc or thumb drive or MP3 player in some worker's gym bag. I bet you're not sure at all.

Trust, but verify.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-15
Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It...
PUBLISHED: 2021-04-15
Lotus is an Implementation of the Filecoin protocol written in Go. BLS signature validation in lotus uses blst library method VerifyCompressed. This method accepts signatures in 2 forms: "serialized", and "compressed", meaning that BLS signatures can be provided as either of 2 un...
PUBLISHED: 2021-04-15
Sydent is a reference Matrix identity server. Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to memory exhaustion and denial of service. Sydent also does not limit response size for requests it mak...
PUBLISHED: 2021-04-15
Sydent is a reference Matrix identity server. Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting. It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform a...
PUBLISHED: 2021-04-15
Sydent is a reference matrix identity server. A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example. This issue has been fixed in 4469d1d.