Monday, February 3, 2014

Obamacare network vulnerable to a Belarusian cyber attack ? Were any parts of the software written by programmers from Belarusia - if not , why did Valery Tsepkalo of Technology Park (HTP) in Minsk , indicate HHS was a client and identify where Belarusian programs were in place within the HHS systems ? Was there or was there not an Internet data “hijacking” last year involving Belarusian state-controlled networks ( the month-long diversion covertly rerouted massive amounts of U.S. Internet traffic to Belarus ) ?

Shut It Down

DNI, HHS urged to shut Obamacare website until security issues resolved
President Barack Obama and two senior aides are being urged to suspend all use of the Obamacare computer network until recent U.S. intelligence warnings of potential cyber attacks from Belarus are resolved.
Michele Bachmann (R., Minn.), a member of the House Permanent Select Committee on Intelligence, called for the suspension in letters to the president, Director of National Intelligence James Clapper, and Health and Human Services Secretary Kathleen Sebelius. She warned that “the American people’s personal information submitted to could be at risk from cyber attacks across the globe.”
“Intelligence officials reportedly briefed the administration that software potentially written by a state-owned firm in Belarus could contain malware and allow surreptitious access to Americans’ health and financial information,” she stated, adding that Belarus is a close ally of Russia.
Bachmann told Clapper that a report posted to the U.S. government’s Open Source Center website had been removed and that the report revealed that Belarusian software engineers were suspected of inserting malicious code in the Obamacare network.
The healthcare network is made up of seven computer hubs that link major federal agencies with some 300 health care providers and insurance firms and some 3 million people who have signed up for health care coverage.
Bachmann reminded Clapper that she had questioned him about the report during an intelligence committee hearing this week.
Clapper stated that he was unaware of the report or its recall.
“However, a DNI spokesman has since confirmed the existence of this report,” she stated in the Feb. 6 letter.
The lawmaker then requested a copy of the report, as well as an explanation of why it was produced and withdrawn from internal circulation.
She then urged Clapper to tell HHS to shut down the network until proper security testing is carried out in order to prevent the possible loss of personal data or violations of privacy rights of Americans who used the network.
“Intelligence is on the front lines of ensuring that the American people’s personal information is safe from international cyber threats, and too much is at stake to have so many unanswered questions about’s security,” she said.
The healthcare network, one of the president’s most important domestic policy items, has been plagued with problems since it debuted Oct. 1.
Obama told Fox News Channel on Sunday that the software problems, which he described as “glitches,” had been fixed. He made no mention of the potential implanting of malware from Belarus during the pre-Super Bowl interview.
Bachmann, in a separate letter to Sebelius, stated she was concerned that the HHS’ Centers for Medicare and Medicaid Services (CMS), the agency in charge of overseeing, could not confirm no malicious software from Belarus is hidden in the software.
“I am writing to respectfully request information on whether or not any code for was written in Belarus—or any other country outside the United States—and an explanation of why CMS did not know where all the code was written,” Bachmann said.
“Until these questions are answered and until has undergone a proper end-to-end stress test, I urge you to immediately shut down so no American’s personal data and privacy rights are jeopardized,” she said.
Copies of the letters were sent to Obama.
Former intelligence officials said the withdrawal of the cyber threat report was an indication of intelligence politicization, a practice barred by regulations for all U.S. intelligence agencies. Politicization occurs when intelligence is skewed or suppressed because it presents unwelcome views or conflicts with administration policies.
A DNI spokesman earlier this week denied the report was withdrawn for political reasons, insisting that it was not properly vetted.
CIA Director John Brennan told the House hearing this week that he was unaware of the report or its withdrawal. The Open Source Center is located at CIA headquarters in Virginia.
DNI spokesman Shawn Turner said Clapper received the letter and “looks forward to providing a timely response.”
The Open Source Center on Jan. 29 distributed a report titled, “United States’ Affordable Care Act Software – Cyber Attack Target.” The report was not coordinated with “subject matter experts, did not meet OSC tradecraft standards, and did not follow established procedures for pre-publication review,” he said.
“The document was recalled for these reasons and because evidence used in the report did not support the title or any conclusion that the software was compromised,” Turner said. “The report will not be reissued.”
The handling of the report was a “rare breakdown” in internal vetting, Turner added. “The cause of the breakdown has been identified and steps are being taken to prevent it from happening again.”
Spokesmen for Sebelius and the White House either had no immediate comment or did not respond to email requests for comment.
The Bachmann letters followed a report in the Washington Free Beacon published Monday revealing that U.S. intelligence agencies early last month discovered information indicating that software developers under Belarus state control had been involved in developing the Obamacare software.
The intelligence was based in part on comments by Belarusian official Valery Tsepkalo who is director of the government-backed High-Technology Park (HTP) in Minsk.
Tsepkalo stated last summer in an interview broadcast on Russian radio that HHS was among his clients and that “we are helping Obama complete his insurance reform.”
“Our programmers wrote the program that appears on the monitors in all hospitals and all insurance companies—they will see the full profile of the given patient,” Tsepkalo said June 25 on Voice of Russia Radio.
Efforts to reach Tsepkalo for comment were unsuccessful.
One U.S. official said: “The U.S. Affordable Care Act software was written in part in Belarus by software developers under state control, and that makes the software a potential target for cyber attacks.”
Concerns about malicious software in the network were compounded by an incident in February 2013 when large segments of U.S. Internet traffic were hijacked to Belarus. Security officials said it was likely the data was sifted for government and economic intelligence before being rerouted back to the United States.
Additionally, the potential for cyber attacks is increased because the Belarusian government is a Soviet-style dictatorship and U.S. adversary.
The potential of Belarus-origin malware, combined with the Internet hijacking of data to Belarus and the hostile Minsk regime, “makes the software written in Belarus a potential target of cyber attacks for identity theft and privacy violations” of Americans, the U.S. official familiar with the report said.
Officials urged HHS to launch security reviews of the network software for malicious code.
All medical facilities and insurance companies in the United States currently use the software.
White House spokeswoman Caitlin Hayden said the warning in the intelligence report prompted a review of Obamacare software but that no links to Belarus or malicious software had been found.
“So far HHS has found no indications that any software was developed in Belarus,” she said. “However, as a matter of due diligence, they will continue to review the supply chain. Supply chain risk is real and it is one of our top concerns in the area of cyber-security.”
Some 55 contractors at a cost of more than $400 million were involved in the development of’s software.

The Belarusian Connection

Obamacare network vulnerable to cyber attack

Belarusian President Alexander Lukashenko with Russian President Vladimir Putin / AP
Belarusian President Alexander Lukashenko with Russian President Vladimir Putin / AP
U.S. intelligence agencies last week urged the Obama administration to check its new healthcare network for malicious software after learning that developers linked to the Belarus government helped produce the website, raising fresh concerns that private data posted by millions of Americans will be compromised.
The intelligence agencies notified the Department of Health and Human Services, the agency in charge of the network, about their concerns last week. Specifically, officials warned that programmers in Belarus, a former Soviet republic closely allied with Russia, were suspected of inserting malicious code that could be used for cyber attacks, according to U.S. officials familiar with the concerns.
The software links the millions of Americans who signed up for Obamacare to the federal government and more than 300 medical institutions and healthcare providers.
“The U.S. Affordable Care Act software was written in part in Belarus by software developers under state control, and that makes the software a potential target for cyber attacks,” one official said.
Cyber security officials said the potential threat to the U.S. healthcare data is compounded by what they said was an Internet data “hijacking” last year involving Belarusian state-controlled networks. The month-long diversion covertly rerouted massive amounts of U.S. Internet traffic to Belarus—a repressive dictatorship located between Russia, Poland, and Ukraine.
“Belarusian President [Alexander] Lukashenko’s authoritarian regime is closely allied with Russia and is adversarial toward the United States,” the official added.
The combination of the Belarus-origin software, the Internet re-routing, and the anti-U.S. posture of the Belarusian government “makes the software written in Belarus a potential target of cyber attacks for identity theft and privacy violations” of Americans, the official said.
Security officials urged HHS to immediately conduct inspections of the network software for malicious code. The software currently is used in all medical facilities and insurance companies in the United States.
The officials also recommended that HHS use security specialists not related to software vendors for the inspections to reduce further risks.
Officials disclosed the software compromise last week after the discovery in early January of statements by Belarusian official Valery Tsepkalo, director of the government-backed High-Technology Park (HTP) in Minsk.
Tsepkalo told a Russian radio station in an interview broadcast last summer that HHS is “one of our clients,” and that “we are helping Obama complete his insurance reform.”
“Our programmers wrote the program that appears on the monitors in all hospitals and all insurance companies—they will see the full profile of the given patient,” Tsepkalo said June 25 on Voice of Russia Radio.
White House National Security Council spokeswoman Caitlin Hayden said an intelligence report on the Belarusian software was “recalled by the intelligence community shortly after it was issued.”
The report has prompted HHS to conduct a review to determine if software related to the Affordable Care Act “was written by Belarusian software developers,” she said.
“So far HHS has found no indications that any software was developed in Belarus,” Hayden said. “However, as a matter of due diligence, they will continue to review the supply chain. Supply chain risk is real and it is one of our top concerns in the area of cyber-security.”
A senior administration official questioned whether suspect software mentioned in the report would be valuable to a nation state.
“Nation states are generally not interested in [personal identification information] for its own sake,” the official said. “Given that, we would be surprised to see a nation-state capability applied in this matter. But we are doing a thorough review anyway.”
HSS spokeswoman Dori Salcido referred questions about the matter to Richard A. Olague, spokesman for the HHS’ Centers for Medicare and Medicaid Services (CMS). Olague declined to discuss the software vulnerability.
He also would not say if CMS is conducting a search for malicious software emanating from Belarus.
CMS said in a statement to the Washington Free Beacon that assessments by independent security contractors are conducted regularly by companies such as MITRE and Blue Canopy.
The website also is continuously monitored by CMS technicians and electronic sensors, and weekly penetration tests to check the security of the system are carried out.
A CMS security team in place also seeks to “identify anomalous activity, and to deter and prevent any unauthorized access,” the statement said.
“In addition, as new website functions continue to go live, CMS follows a rigorous and regular change management process with ongoing testing and mitigation strategies implemented in real time,” the statement said. “This occurs on a regular basis, in between the [source code analysis] testing periods.”
A spokeswoman for CGI Federal, the main federal contractor for the healthcare network, also had no immediate comment.

Intel chair calls for probe

House Permanent Select Committee on Intelligence Chairman Rep. Mike Rogers (R., Mich) said he was surprised by media reports from Belarus indicating “some parts of or systems connected to it may have in fact been written overseas.” He called for an independent security review of the Obamacare website.
Rogers said he was especially concerned by the potential software vulnerability because a CGI executive, Vice President Cheryl Campbell, testified to Congress that all software work for the network had been done in the United States.
“We need an independent, thorough security evaluation of this site, and we need the commitment from the administration that the findings will be acknowledged and promptly addressed,” Rogers told the Free Beacon.
“I continue to call on HHS to shut down and properly stress test the site to ensure that consumers are protected from potential security risks from across the globe.”
Details of the software work done by Belarusians could not be learned. Tsepkalo could not be reached for comment and did not respond to emails sent to his technology park website.
The company involved in the software was identified as EPAM, a Belarusian firm with U.S. offices and international clients that conducts programming work in Belarus. Spokesmen for the company did not respond to email or telephone inquiries about the company’s role in developing the Obamacare software.
The officials said there are serious concerns that the Belarusian software contains malicious code that could be used to covertly route data from the Obamacare website to foreign locations.
Additionally, they suspect the Belarusians planted secret “backdoor” openings to the software that will permit surreptitious entry to U.S. government networks by hackers or spies.
The malicious code could reroute Obamacare website data to Belarus, or possibly permit illegal backdoor access to the networks and other government and health industry networks, the officials said.
The security vulnerability could provide “access to all necessary personal information of U.S. residents for identity theft and privacy violations,” said one official.

Software security issue follows website problems

Disclosure of cyber attack vulnerabilities follows months of software problems with the rollout that began Oct. 1. The troublesome software cost the government more than $400 million. The government spent several months attempting to repair the software.
The software problems prevented hundreds of thousands of people from obtaining health coverage and undermined confidence in the government-run health care system.
President Barack Obama said on Sunday that “glitches” with the Obamacare website were expected but “I don’t think I anticipated or anybody anticipated the degree of the problems with the website.”
“The good news is that right away we decided how we were going to fix it. It got fixed,” Obama said.
Obama said three million people signed up through the website after delays of a month and half.
“Now it’s working the way it’s supposed to and we’ve signed up three million people,” the president said. “What we’re constantly figuring out is how do we continue to improve it?”
According to HHS, between Oct. 1 and the end of the year, 1. 9 million people signed up for healthcare through the federal website. Another 956,000 enrolled through state websites. More than 55 million people visited both the federal and state websites.
The threat of data diversion is compounded by the discovery last year that Belarus covertly diverted massive amounts of U.S. Internet traffic to Belarus.
According to the New Hampshire-based security firm Renesys, which discovered the data diversion, throughout February 2013, Internet traffic from the United States was sent to Belarus. The purpose likely was to allow hackers or government agencies to sift for data for financial, economic, or government intelligence.
The data also may have been modified for other purposes before being returned to the original U.S. and other foreign destinations.
The bulk diversion technique is called border gateway protocol hijacking. It involves using a series of network addresses to mask the data diversion through numerous Internet hubs around the world.
Renesys traced the data diversion from Washington to New York and Moscow and finally to Minsk, the Belarusian capital. It was returned to the United States via connections in Moscow, Frankfurt, and New York.

Internet diversion linked to state telecom

U.S. officials believe the Belarus state-controlled telecommunications provider Beltelecom took part in the Internet data hijacking last year. The company operates fiber optic networks and controls all Belarus Internet traffic and infrastructure. Technical evidence in the diversion revealed that the hijacking was intentional and not the result of mistakes by network operators.
“Beltelecom has a chance to examine the traffic, and then sends it back out on the ‘clean path’ through Russian provider ReTN,” Renesys’ Jim Cowie said in a report on the incident.
“Victims whose traffic was diverted varied by day, and included major financial institutions, governments, and network service providers,” the report said, noting that among the countries affected were the United States, South Korea, Germany, the Czech Republic, and Lithuania.
According to the officials, the diversion allowed American’s Internet activities to be viewed in Minsk.
U.S. officials said a future hijack of U.S. Internet traffic to Belarus combined with malicious software implanted in Belarus would increase the damage of a cyber attack.
Regarding the Belarusian official who disclosed his country’s involvement in the Obamacare software, U.S. officials said Tsepkalo is a former Belarusian ambassador to the United States and held several high-level posts in the Lukashenko government. He also was a former Soviet foreign ministry official.
Tsepkalo is said to maintain close ties to Russia and in May 2012 he signed a cooperation agreement with Novosibirsk Technopark, a Russian high-technology enclave located in the Far East north of Kazakhstan.
Rogers warned last year that security vulnerabilities in the healthcare website make it a “magnet” for hackers and foreign intelligence services.
Rogers stated in October that a component of the health insurance exchanges called the Federal Data Services Hub, created under Obamacare, is vulnerable to cyber attack and that the hub connects seven different agencies.
“Social Security numbers, employment information, birth dates, health records and tax returns are among the personal data that will be transmitted to this hub, consolidating an unprecedented amount of information,” Rogers stated in an op-ed in USA TodayOct. 10.
“Every shred of data one would need to steal your identity or access your confidential credit information would be available at the fingertips of a skilled hacker, producing a staggering security threat,” he said.
The hub “will be a magnet for hackers, creating inherent vulnerability and risk by connecting these seven interfaces,” he said, adding that security vulnerabilities are “a dream of faceless international hackers and hostile foreign intelligence services.”

Belarus software not raised during Hill probes

The website vulnerability to cyber attack from Belarus, a former Soviet republic, was not raised during several congressional hearings over the past several months on the problems with
Kevin Charest, chief information technology officers at HHS, told the House Oversight and Government Reform Committee earlier this month that numerous cyber attacks against the website were investigated. “To date, there have been no successful security attacks on and no person or group has maliciously accessed personally-identifiable information (PII) from the site,” he said Jan. 16.
Committee Chairman Rep. Darrell Issa (R., Calif.) said at the hearing that his committee obtained HHS documents revealing shortcomings in security testing of the website prior to the Oct. 1 launch.
“When Americans submit their sensitive personal information to—or, I might add, when government takes sensitive information, including your IRS information and makes it available through a Website to outsiders—they deserve to know that it is safe from hackers, bad actors, and security glitches,” Issa said before a closed hearing by the committee.
“The possibility of security breach is not some vague, distant concern. It is a real and tangible threat that could affect millions,” he added.
Issa said HHS officials repeatedly have said personal data submitted on the website is safe. “But because officials authorized the launch of the website full of functional errors, Americans have deep skepticism that the site was in fact secure,” he said.
The components the website, involving government agencies, hospitals and insurance firms, were put together by the federal Centers for Medicare and Medicaid Services.
In testimony before a House committee Oct. 24, Cheryl Campbell, the CGI Federal vice president, said developing the federal healthcare system, known as the exchange, involved 55 contractors, five government agencies, 36 states, and more than 300 insurance firms.
CGI calls its healthcare system software the Federally Facilitated Marketplace, or FFM. The application manages the web portal, a transaction processor and a business analytics functions. It links insurers to consumers.
The exchange has six complex systems, Campbell said.
David Kennedy, head of the security firm TrustedSec, said the Obamacare website was not designed well and has “a lot of security flaws.”
One major concern is that the system connects the healthcare network to other sensitive U.S. government networks, including the Internal Revenue Service and the Department of Homeland Security.
“That makes it a treasure trove for hackers,” Kennedy said in an interview, adding that a major concern would be cyber attacks from sophisticated state-sponsored adversaries.
The threat of “backdoor” access points is a particular worry. The Chinese military-linked Huawei Technologies is suspected of using that technique in its network equipment, Kennedy said.
HHS technology officials recently contacted him about the security vulnerabilities and indicated the department is interested in taking measures to mitigate the security flaws.
The human rights organization Freedom House describes Belarus as a dictatorship with few freedoms.
In a report last year on Internet freedom, Freedom House said the state-run Beltelecom and the National Center for Traffic Exchange are “the only entities with the ability to handle connections with [Internet service providers] outside of Belarus.”
“Beltelecom also holds a monopoly on fixed-line communications and internet services inside Belarus,” it said, adding, “all ISPs depend on the facilities of the state-owned Beltelecom, which allows the authorities to control access speeds for the entire country, if needed.”
Belarus’ Ministry of Communications and Information Technology and the presidential administration’s Operational and Analytical Center control ISPs, “conduct overseas online surveillance, and manage Belarus’ top-level domain.”

January 16, 2014 still not secure three months later

Rick Moran

A group of cyber-security experts scheduled to testify before congress on Thursday will tell lawmakers that holes in security at the site still haven't been plugged 3 months after the site went live.
A group of cyber security professionals is warning that the U.S. government has failed to implement fixes to protect the website from hackers, some three months after experts first pointed out the problem.
David Kennedy, head of computer security consulting firm TrustedSec LLC, told Reuters that the government has yet to plug more than 20 vulnerabilities that he and other security experts reported to the government shortly after went live on October 1.
Hackers could steal personal information, modify data or attack the personal computers of the website's users, he said. They could also damage the infrastructure of the site, according to Kennedy, who is scheduled to describe his security concerns in testimony on Thursday before the House Science, Space and Technology Committee.
"These issues are alarming," Kennedy said in an interview on Wednesday.
The Centers for Medicare & Medicaid Services, the federal agency that oversees the site's operations, provided Reuters with a statement saying it takes the concerns seriously.
"To date there have been no successful security attacks on and no person or group has maliciously accessed personally identifiable information from the site," the statement said.
"Security testing is conducted on an ongoing basis using industry best practices to appropriately safeguard consumers' personal information."
CMS continues to insist that all is well, that the security is within federal government standards. But the site went live without a complete security test of the system, and CMS IT director Henry Chao, in testimony befoire the House oversight committee in November, couldn't recall a memo that stated that security vulnerabilities were "limitless" at the site.
Kennedy said he last week presented technical details describing the vulnerabilities in the site to seven independent cyber security experts, who reviewed videos of potential attack methods as well as logs and other documentation.
They wrote notes to the House Committee saying they were concerned about the site's security, which Kennedy provided to Reuters and will be released on Thursday to the committee led by Republicans who oppose the Affordable Care Act.
Members of the security community have been publicly pointing out problems with the site and say they have been privately providing the government with technical details of those issues since early October.
At a November Science Committee hearing, Kennedy and three other expert witnesses said they believed the site was not secure and three of them said it should be shut down immediately.
Kennedy and his peers who reviewed his work ahead of Thursday's hearing said the site still has serious security vulnerabilities that can be viewed from the outside.
"The site is fundamentally flawed in ways that make it dangerous to people who use it," said Kevin Johnson, one of the experts who reviewed Kennedy's findings.
Johnson said that one of the most troubling issues was that a hacker could upload malicious code to the site, then attack other users.
"You can take control of their computers," said Johnson, chief executive of a firm known as Secure Ideas and a teacher at the non-profit SANS Institute, the world's biggest organization that trains and certifies cyber security professionals.
Who ya going to believe? Your government? Or non-partisan security experts?
The administration doesn't care about your personal info being secure. It is of secondary consideration next to enticing people to the website and getting them to sign up for insurance.
If CMS hasn't made this clear to us before, they have now.