Scroll down to read this post.

 

Please consider supporting my work here at Behind the Black. I keep the website clean from pop-ups and annoying demands. Instead, I depend entirely on my readers to support me. Though this means I am sacrificing some income, it also means that I remain entirely independent from outside pressure. By depending solely on donations and subscriptions from my readers, no one can threaten me with censorship. You don't like what I write, you can simply go elsewhere.

 

You can support me either by giving a one-time contribution or a regular subscription. There are five ways of doing so:

 

1. Zelle: This is the only internet method that charges no fees. All you have to do is use the Zelle link at your internet bank and give my name and email address (zimmerman at nasw dot org). What you donate is what I get.

 

2. Patreon: Go to my website there and pick one of five monthly subscription amounts, or by making a one-time donation.
 

3. A Paypal Donation:

4. A Paypal subscription:


5. Donate by check, payable to Robert Zimmerman and mailed to
 
Behind The Black
c/o Robert Zimmerman
P.O.Box 1262
Cortaro, AZ 85652

 

You can also support me by buying one of my books, as noted in the boxes interspersed throughout the webpage or shown in the menu above. And if you buy the books through the ebookit links, I get a larger cut and I get it sooner.


OPM ignored warnings last year its computers were insecure

An inspector general report last year had advised OPM to shut down many of its computer systems because they were running without sufficient security. The agency ignored that recommendation.

In the audit report published November 12, 2014, OIG found that 11 out of 47 computer systems operated by OPM did not have current security authorizations. Furthermore, the affected systems were “amongst the most critical and sensitive applications owned by the agency.” Two of the unauthorized systems are described in the report as “general support systems” which contained over 65 percent of all OPM computer applications. Two other unauthorized systems were owned by Federal Investigative Services, the organization which handles background investigations in connection with government security clearances. OIG warned bluntly, “any weaknesses in the information systems supporting this program office could potentially have national security implications.”

Because of the volume and sensitivity of the information involved, OIG recommended OPM “consider shutting down systems that do not have a current and valid Authorization.” But OPM declined, saying, “We agree that it is important to maintain up-to-date and valid ATOs for all systems but do not believe that this condition rises to the level of a Material Weakness.”

The head of OPM also claimed in House hearings yesterday that their failure to close these systems down was justified since the hackers were already in the system when the recommendation was made.

In other words, we didn’t do anything to make the system secure, and when hackers broke in it was further justification for not doing anything.

Yeah, let’s put our healthcare under their control also!

Genesis cover

On Christmas Eve 1968 three Americans became the first humans to visit another world. What they did to celebrate was unexpected and profound, and will be remembered throughout all human history. Genesis: the Story of Apollo 8, Robert Zimmerman's classic history of humanity's first journey to another world, tells that story, and it is now available as both an ebook and an audiobook, both with a foreword by Valerie Anders and a new introduction by Robert Zimmerman.

 
The ebook is available everywhere for $5.99 (before discount) at amazon, or direct from my ebook publisher, ebookit. If you buy it from ebookit you don't support the big tech companies and the author gets a bigger cut much sooner.


The audiobook is also available at all these vendors, and is also free with a 30-day trial membership to Audible.
 

"Not simply about one mission, [Genesis] is also the history of America's quest for the moon... Zimmerman has done a masterful job of tying disparate events together into a solid account of one of America's greatest human triumphs."--San Antonio Express-News

4 comments

  • schwit

    http://arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/

    Some of the contractors that have helped OPM with managing internal data have had security issues of their own—including potentially giving foreign governments direct access to data long before the recent reported breaches. A consultant who did some work with a company contracted by OPM to manage personnel records for a number of agencies told Ars that he found the Unix systems administrator for the project “was in Argentina and his co-worker was physically located in the [People’s Republic of China]. Both had direct access to every row of data in every database: they were root. Another team that worked with these databases had at its head two team members with PRC passports. I know that because I challenged them personally and revoked their privileges. From my perspective, OPM compromised this information more than three years ago and my take on the current breach is ‘so what’s new?'”

  • Brian H

    Oh this was left un-secured for a reason… so that data could be taken…

  • pzatchok

    Just remember.

    The vast majority of government workers are people who could not get jobs in the private sector.
    They are mindless drones interested in only putting in their 8 hours and getting home as fast as possible.
    They have little to no security on their own personal computers and blame other people when their crap goes tits up.
    Do you really think they are going to care more for the computers or systems they have at work?
    Hell no.
    They think computer security is turning off the monitor at night and locking the doors. Sorry, locking the doors is the custodial staffs business, not theirs.

    The weakest link to any security system is the human element. And in a computer environment the first, fastest, and best security for a office network is the IT guy. Next time you go into any office look at the IT guy, does he really look like he is up to a top security task? Or does he look like some young collage geek who it doing the IT work just for a little cash until classes start again? Does he really look like he belongs on a serious security team? Mine has trouble installing a printer the right way. If windows doesn’t do it automatically it can not be done.

  • Edward

    Also from the Congressional hearing:
    https://www.youtube.com/watch?v=A9Y6IefNq2Q (4 minutes)
    “I wish that you were as strenuous and hard working at keeping information out of the hands of hackers as you are at keeping information out of the hands of Congress.”

    Who was it that said the government wasn’t the solution but was the problem? That’s right: Ronald Reagan. Still right, after all these years.

Readers: the rules for commenting!

 

No registration is required. I welcome all opinions, even those that strongly criticize my commentary.

 

However, name-calling and obscenities will not be tolerated. First time offenders who are new to the site will be warned. Second time offenders or first time offenders who have been here awhile will be suspended for a week. After that, I will ban you. Period.

 

Note also that first time commenters as well as any comment with more than one link will be placed in moderation for my approval. Be patient, I will get to it.

Leave a Reply

Your email address will not be published. Required fields are marked *