{"id":15546,"date":"2019-06-11T10:45:05","date_gmt":"2019-06-11T18:45:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/06\/11\/news-9295\/"},"modified":"2019-06-11T10:45:05","modified_gmt":"2019-06-11T18:45:05","slug":"news-9295","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/06\/11\/news-9295\/","title":{"rendered":"Hackers Stole a Border Agency Database of Traveler Photos"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cfec76203b458960e696669\/master\/pass\/GettyImages-1028263338.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Mon, 10 Jun 2019 22:43:38 +0000<\/strong><\/p>\n<p><span class=\"lede\">In its rush <\/span>to gather biometric data from travelers in the US, Customs and Border Protection has apparently neglected basic safeguards to protect it. One of its subcontractors was recently breached, leaving photos of travelers and license plates in the hands of hackers.<\/p>\n<p><em>The Washington Post<\/em> <a href=\"https:\/\/www.washingtonpost.com\/technology\/2019\/06\/10\/us-customs-border-protection-says-photos-travelers-into-out-country-were-recently-taken-data-breach\/\" target=\"_blank\">first reported<\/a> the incident, whose full scope remains unclear. But the hack has raised sharp questions about the agency\u2019s already controversial push for biometrics. Facial recognition scans have <a href=\"https:\/\/www.wired.com\/story\/airport-security-biometrics-face-scanning\/\">become more routine at airports<\/a>; CBP <a href=\"https:\/\/www.buzzfeednews.com\/article\/daveyalba\/these-documents-reveal-the-governments-detailed-plan-for\" target=\"_blank\">wants it<\/a> in the top 20 US airports by 2021.<\/p>\n<p class=\"paywall\">\u201cThe CBP program should be suspended pending an investigation,\u201d says Jeramie Scott, senior counsel at the Electronic Privacy Information Center. \u201cThe agency simply should not collect this sensitive personal information if it cannot safeguard it.\u201d<\/p>\n<p class=\"paywall\">CBP declined to name the breached subcontractor <a href=\"https:\/\/www.washingtonpost.com\/technology\/2019\/06\/10\/us-customs-border-protection-says-photos-travelers-into-out-country-were-recently-taken-data-breach\" target=\"_blank\">to the <em>Post<\/em><\/a>, but apparently sent the news outlet a Microsoft Word document titled \u201cCBP Perceptics Public Statement.\u201d The Word file strongly suggests that Tennessee-based Perceptics, which makes license plate readers and has a <a href=\"https:\/\/bstc.ati.org\/wp-content\/uploads\/2019\/01\/Perceptics-Capabilities-Statement.pdf\" target=\"_blank\">decades-long<\/a> relationship with CBP, is the vendor in question.<\/p>\n<p class=\"paywall\">That makes even more sense when you consider that a hacker calling themselves \u201cBoris Bullet-Dodger\u201d dumped hundreds of gigabytes of data stolen from Perceptics on the dark web in May. It\u2019s unclear if that breach, first reported by <em><a href=\"https:\/\/www.theregister.co.uk\/2019\/05\/23\/perceptics_hacked_license_plate_recognition\/\" target=\"_blank\">The Register<\/a><\/em>, is the same as the one CBP copped to Monday. The former became public on May 23; CBP says it found out that its database had been compromised over a week later.<\/p>\n<p class=\"paywall\">\u201cOn May 31, 2019, CBP learned that a subcontractor, in violation of CBP policies and without CBP\u2019s authorization or knowledge, had transferred copies of license plate images and traveler images collected by CBP to the subcontractor\u2019s company network,\u201d the agency said in a statement. \u201cThe subcontractor\u2019s network was subsequently compromised by a malicious cyberattack. No CBP systems were compromised.\u201d<\/p>\n<p class=\"paywall\">Perceptics did not respond to a request for comment. But regardless of which specific vendor the breach stems from, the upshot is the same.<\/p>\n<p class=\"paywall\">CBP has given precious little information about how many people were impacted, a troubling lack of disclosure. It\u2019s not even clear exactly what type of data\u2014and whether it extends to biometrics beyond photos\u2014the database contained. While CBP says &quot;none of the image data has been identified on the Dark Web or internet,\u201d the dump of hacked Perceptics data just a few short weeks ago doesn\u2019t give much confidence that this breach is contained, or will stay that way.<\/p>\n<p class=\"paywall\">In short, the only people who know the full scope of this breach are CBP, an unnamed subcontractor, and whoever pulled off the hack.<\/p>\n<p class=\"paywall\">Without more clarity on the contents of the database in question, it\u2019s hard to say for sure in terms of the impact on an individual level. Probably pretty bad, though! And on principle, it\u2019s close to a worst-case scenario.<\/p>\n<p class=\"paywall\">That CBP itself wasn\u2019t directly hacked doesn\u2019t make the situation any better. In fact, it arguably makes things worse; the agency let a third party access incredibly sensitive data, and didn\u2019t ensure that appropriate security measures were in place. That it treats an image database of private citizens with the same lack of care that it does a Microsoft Word doc should set off very loud alarm bells.<\/p>\n<p class=\"paywall\">\u201cCBP requires that all contractors and service providers maintain appropriate data integrity and cybersecurity controls and follow all incident response notification and remediation procedures,\u201d the agency said in its statement. \u201cCBP takes its privacy and cybersecurity responsibilities very seriously and demands all contractors to do the same.\u201d It\u2019s a fine sentiment; the facts of the case belie it.<\/p>\n<p class=\"paywall\">The breach also comes at a time when <a href=\"https:\/\/www.wired.com\/story\/facial-recognition-regulation\/\">facial recognition regulation has garnered<\/a> bipartisan support, after years of going relatively unchecked in both the public and private sectors.<\/p>\n<p class=\"paywall\">\u201cThis incident further underscores the need to put the brakes on these efforts and for Congress to investigate the agency\u2019s data practices,\u201d said Neema Singh Guliani, senior legislative counsel at the American Civil Liberties Union, in a statement. \u201cThe best way to avoid breaches of sensitive personal data is not to collect and retain such data in the first place.\u201d<\/p>\n<p class=\"paywall\">It may be too late for the victims of this data breach, but it\u2019s past time to help limit the damage before the next hack comes along.<\/p>\n<p class=\"related-cne-video-component__dek\">It seems like every time you turn around there&#39;s a new breach of personal information. Follow these steps to minimize the damage.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/hackers-stole-traveler-photos-border-agency-database\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cfec76203b458960e696669\/master\/pass\/GettyImages-1028263338.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Mon, 10 Jun 2019 22:43:38 +0000<\/strong><\/p>\n<p>In compromising a Customs and Border Protection subcontractor, hackers make off with photos of travelers and license plates.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-15546","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15546"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15546\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}