{"id":16679,"date":"2019-10-24T10:45:06","date_gmt":"2019-10-24T18:45:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/24\/news-10418\/"},"modified":"2019-10-24T10:45:06","modified_gmt":"2019-10-24T18:45:06","slug":"news-10418","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/24\/news-10418\/","title":{"rendered":"Why Republicans Storming a SCIF Puts National Security at Risk"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5db0962ac96358000859e5bb\/master\/pass\/Sec-SCIF-1177742784.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Wed, 23 Oct 2019 20:47:51 +0000<\/strong><\/p>\n<p class=\"content-header__row content-header__dek\">House Republicans barged into a secure facility uninvited Wednesday, creating a host of problems in the process.<\/p>\n<p>It should go without saying: Don\u2019t round up a bunch of your buddies and jostle your way into a highly secured government facility uninvited. But that&#x27;s exactly what a group of Republican congressmen proudly did Wednesday morning.<\/p>\n<p>\u201cBREAKING,\u201d representative Matt Gaetz (R\u2013Florida) tweeted at 11:32 am, \u201cI led over 30 of my colleagues into the SCIF where Adam Schiff is holding secret impeachment depositions.\u201d Schiff is the head of the House Intelligence Committee, who has led the recent inquiry into President Trump\u2019s <a href=\"https:\/\/www.wired.com\/story\/whistle-blower-did-it-right\/\">Ukraine imbroglio<\/a>. (Deputy assistant secretary of defense Laura Cooper was scheduled to give a deposition this morning.) But while Gaetz and his cohorts may have fancied themselves Parisians storming the Bastille of cloak-and-dagger bureaucracy, all they\u2019ve really accomplished is the violation of some extremely basic tenets of national security.<\/p>\n<p>Meet the gaggle of Republicans who violated security protocols Wednesday.<\/p>\n<p>Let\u2019s start with the SCIF (pronounced <em>skiff<\/em>), since it\u2019s an unfamiliar acronym for many. It stands for Sensitive Compartmented Information Facility. These are rooms that are outfitted to be effectively spyproof by conforming to a stringent list of security standards. There\u2019s a <a href=\"https:\/\/www.wired.com\/2017\/02\/trump-north-korea-scif\/\">SCIF at Mar-a-Lago<\/a>, for instance, kitted out to accommodate briefings for Trump during his <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nbcnews.com\/politics\/donald-trump\/how-much-time-trump-spending-trump-properties-n753366&quot;}\" href=\"https:\/\/www.nbcnews.com\/politics\/donald-trump\/how-much-time-trump-spending-trump-properties-n753366\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">frequent<\/a> southerly sojourns. Barack Obama traveled with a SCIF tent during his presidency that could be set up on short notice inside, say, <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bbc.com\/news\/world-us-canada-12810675&quot;}\" href=\"https:\/\/www.bbc.com\/news\/world-us-canada-12810675\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">a hotel room<\/a>.<\/p>\n<p>The requirements of a SCIF will also vary depending on its specific use case; whether sensitive materials will be stored there or simply discussed, for instance, makes a difference. But some standards apply universally, as you can see in these <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.dni.gov\/files\/NCSC\/documents\/Regulations\/Technical-Specifications-SCIF-Construction.pdf&quot;}\" href=\"https:\/\/www.dni.gov\/files\/NCSC\/documents\/Regulations\/Technical-Specifications-SCIF-Construction.pdf\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">hefty guidelines<\/a> produced by the Office of the Director of National Intelligence. They need radio frequency shielding, to prevent those signals going in or out. Their walls should be stuffed with sound-attenuation material and topped off with acoustic sealant. And any electronics inside a SCIF need to conform to the NSA\u2019s TEMPEST specification, which details how to keep them safe from surveillance. This is just a sampling! But you get it by now. It\u2019s a lot.<\/p>\n<p>The reason to lock down a SCIF is intuitive. They\u2019re the rooms where the most sensitive conversations related to US national security take place\u2014or, at least, <a href=\"https:\/\/www.wired.com\/2017\/02\/trump-north-korea-scif\/\">they\u2019re supposed to be<\/a>. That includes the current impeachment inquiry, which relates directly to high-level interactions between the US and foreign countries, at least some of which is presumably classified, and all of which a hacking-happy country like, say, Russia would love an inside read on.<\/p>\n<p>So when Gaetz and House minority whip Steve Scalise and their merry band of lawmakers literally barge into a SCIF\u2014they finally left after a five-hour standoff\u2014they\u2019re not just causing a fuss. They\u2019re making a mockery of national security and to a lesser extent putting it at risk. Especially the congressmen who, as numerous outlets have <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.politico.com\/news\/2019\/10\/23\/impeachment-republicans-trump-055688&quot;}\" href=\"https:\/\/www.politico.com\/news\/2019\/10\/23\/impeachment-republicans-trump-055688\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">reported<\/a>, brought their smartphones into the room.<\/p>\n<p>\u201cA SCIF is designed and regulated to be a secure space\u2014and that means keeping out electronic devices that malicious actors can exploit to conduct surveillance,\u201d says Joshua Geltzer, a former senior director for counterterrorism at the National Security Council. \u201cBringing those into such a space can cause real national security vulnerabilities. Doing so for a political stunt potentially sacrifices security for partisan points.\u201d<\/p>\n<p>You don\u2019t need a vibrant imagination to see how. The SCIF guidelines from ODNI list three categories of \u201chigh-risk\u201d devices: multifunction cellular telephones, electronic devices with RF transmitting (e.g., Bluetooth), and photographic, video, and audio recording devices. Smartphones are all three. They can <a href=\"https:\/\/www.wired.com\/2017\/01\/trump-android-phone-security-threat\/\">have malware<\/a>, and malware can take over microphones and cameras. Making matters worse, the very people storming the SCIF are the among the most at risk of compromise from a sophisticated adversary. Who wouldn\u2019t want to hack a congressperson?<\/p>\n<p>\u201cThey\u2019re definitely appealing targets,\u201d says Mieke Eoyang, who worked as a staffer on the House Intelligence Committee and currently heads up the national security program at Third Way, a nonprofit think tank. \u201cForeign adversaries have been trying to collect on some of these people from the moment they announced. These are high-value intelligence targets, and well-known.\u201d<\/p>\n<p>It\u2019s hard to overstate the extent to which the GOP members involved in the ruckus either didn\u2019t know or didn&#x27;t care about the kinds of risks they were inviting. Several of them not only brought their phones into the SCIF, they proudly tweeted that they had done so. Representative Alex Mooney (R-West Virginia) appears to have <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/nedprice\/status\/1187074213603151873&quot;}\" href=\"https:\/\/twitter.com\/nedprice\/status\/1187074213603151873\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">tried to livestream<\/a> the affair, but settled for <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/RepAlexMooney\/status\/1187063885372841989&quot;}\" href=\"https:\/\/twitter.com\/RepAlexMooney\/status\/1187063885372841989\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">an audio dispatch<\/a>.<\/p>\n<p><a href=\"https:\/\/twitter.com\/RepMattGaetz\/status\/1187028992295161858\">https:\/\/twitter.com\/RepMattGaetz\/status\/1187028992295161858<\/a><\/p>\n<p><a href=\"https:\/\/twitter.com\/RepMarkWalker\/status\/1187033883411398656\">https:\/\/twitter.com\/RepMarkWalker\/status\/1187033883411398656<\/a><\/p>\n<p>Several of the representatives later appended \u201csent by staff\u201d or some variation to their missives, in an attempt to indicate that they themselves had not tweeted from inside the SCIF. Apparently not everyone felt the same retroactive rationality; according to a House Intelligence Committee official, some GOP members refused to give up their devices even at the request of the Sergeant at Arms and security personnel.<\/p>\n<p>\u201cThey engage in this circus-like behavior because they can\u2019t defend the president\u2019s egregious misconduct,\u201d the official added, noting that the House Parliamentarian found the SCIF-stormers in violation of House deposition rules. It\u2019s unclear what kind of repercussions, if any, await.<\/p>\n<p>The attempt to disrupt the impeachment inquiry\u2014<a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bloomberg.com\/news\/articles\/2019-10-23\/poll-finds-highest-support-for-inquiry-yet-impeachment-update&quot;}\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-10-23\/poll-finds-highest-support-for-inquiry-yet-impeachment-update\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">reportedly endorsed by Trump himself<\/a>\u2014seems almost farcical. But it\u2019s also at the very least dismissive of foundational principles of national security, and at worst creates a legitimate threat. The only saving grace may be that any compromised devices wouldn\u2019t have overheard much of substance in that room so far today. The Republican invaders delayed proceedings for hours.<\/p>\n<p>Then again, who knows what kind of damage has already been caused? \u201cThe reason people talk about why it\u2019s such a violation on the principles is because we cannot have a conversation about what the technical compromise might be,\u201d says Eoyang, \u201cwithout further compromising those issues.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/republicans-storm-scif-national-security-nightmare\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5db0962ac96358000859e5bb\/master\/pass\/Sec-SCIF-1177742784.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Wed, 23 Oct 2019 20:47:51 +0000<\/strong><\/p>\n<p>House Republicans barged into a secure facility uninvited Wednesday, creating a host of problems in the process.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21465],"class_list":["post-16679","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-national-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16679"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16679\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16679"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}