Skip to main content

State Department refugee database vulnerable to hacking, watchdog found

As the debate over President Trump’s order suspending refugee admissions intensifies, Fox News has learned of another potential vulnerability in the system: the State Department refugee database has been susceptible to hacking for years.


The State Department internal watchdog, back in December 2016, sent a "classified management alert" regarding ongoing IT security vulnerabilities in the system. Two months later, the inspector general  released a related unclassified report, "Inspection of the Bureau of Population, Refugees, and Migration."

"It's very unusual for action to be taken by the inspector general before the final report is reviewed by the bureau that's under investigation," former U.N. ambassador and Fox News contributor John Bolton explained. "The fact that an alert was sent before that was completed indicates that they believed it was very serious."

In the wake of the alert, the inspector general reported that the worldwide refugee admissions processing system, or "WRAPS," had been running -- for years -- without a clean bill of health for IT security, so there were no guarantees the data was reliable.

"This has been operating since 2011 without what's called an authority to operate," cyber security specialist Morgan Wright said. "That's like somebody driving not just without a license, but with a revoked suspended license."
A government source told Fox News investigators flagged security incidents in 2016 where a third party installed software, potentially exposing the refugee database to malware. A second 2013 incident is still under investigation. The database's security matters because it handles applications and shares vetting information with other government agencies.
This week on Capitol Hill, Homeland Security Secretary John Kelly said he's working closely with Secretary of State Rex Tillerson and CIA Director Mike Pompeo to get a handle on the refugee vetting system and its weaknesses. "Hope is not a course of action for people like me," he said.

Asked about the database vulnerabilities, the State Department did not dispute Fox News' reporting.  Acting Spokesperson Mark Toner said "The Department recently completed two independent forensic audits of WRAPS to verify the integrity of the data over time.  Those audits confirmed there is absolutely no evidence that WRAPS data has ever been manipulated or compromised."
Toner added, "We appreciate and respect the work of the Inspector General. We are working diligently to resolve the concerns that were raised in the OIG report, and have already implemented several of the recommendations...The refugee screening process has always included multiple, independent and redundant procedures and systems.  These overlapping safeguards allow refugee admissions applications to be processed securely."
While there was no data breach, supporters of the president's strategy say State Department investigators found an IT security mess, and taking a pause on refugee applications still makes sense.  

In a letter published by the Chicago Tribune February 7, former State Department employee Mary Doetsch wrote, “I have seen first-hand the abuses and fraud that permeate the refugee program and know about the entrenched interests that fight every effort to implement much-needed reform.

"Despite claims of enhanced vetting, the reality is that it is virtually impossible to vet an individual who has no type of an official record, particularly in countries compromised by terrorism. U.S. immigration officials simply rely on the person’s often rehearsed and fabricated “testimony.” I have personally seen this on hundreds of occasions.”
Critics of the executive order say there is no hard evidence terror suspects have successfully infiltrated the refugee stream in recent years to gain entry to the US.

Catherine Herridge is an award-winning Chief Intelligence correspondent for FOX News Channel (FNC) based in Washington, D.C. She covers intelligence, the Justice Department and the Department of Homeland Security. Herridge joined FNC in 1996 as a London-based correspondent.

Comments

Popular posts from this blog

Python cheatsheet for beginner

View on Github Recommended Tutorials Learn Python | CodeAcademy Progate Python Classes Video Tutorial for absolute beginners | YouTube Intro to Python | Udacity Python For Everybody Write Better Python Functions Learning Python: From Zero to Hero Automate the Boring Stuff with Python  - Recommended The New Boston Python | Youtube Think Python 2e - Green Tea Press A Byte of Python Project Euler A Whirlwind Tour of Python Python Data Science Handbook Python Class By Google  - Recommended Intro to Python for Data Science Python 3 for humans that want practical project exposure Learn Python the Hard Way Django - Python Try Django | YouTube Django Docs Django Girls MDN Web Docs SimpleIsBetterThanComplex Blog Tango With Django Book Django Class-Based Views The Algorithms Python Flask - Python The Flask Mega Tutorial Writing shorthand statements in python Python is having shorthand statements and shorthand operators. These thin...

Pretty JSON Output

Bạn cảm thấy khó chịu khi JSON output trên cùng 1 dòng, điều đó sẽ chấm dứt với JSON.stringify giúp output ngắn gọn hơn và dễ nhìn hơn. Chỉ cần truyền vào tham số thứ 3 là khoảng cách (space) BOOM ! Tab Spacing Để sử dụng Tab bạn chỉ cần truyền vào tham số "\t" . Ví dụ: Understanding the “Space” argument Tham số thứ 3 của JSON.stringify sử dụng khoảng cách. Nó sẽ giúp cho string output của bạn gọn gàng và dễ nhìn hơn. Nó có 2 loại tham số truyền vào: Number và String . a. Number Bạn có thể dùng bất kì các số từ 0 tới 10. b. String Bạn có thể dùng string thay cho khoảng trống của JSON.stringify. Tối đa bạn chỉ được dùng 10 kí tự. Nếu lớn hơn nó sẽ chỉ lấy 10 kí tự đầu tiên. Hãy thử nó: What is the 2nd parameter ? Tham số thứ 2 dùng để replace. Nó sẽ có 2 loại: Array và Function. a. Array Tôi sẽ demo thử cho bạn với array để thấy sự thú vị của nó: Bạn có thể chọn các cặp key-value bạn muốn output ra...

Google Hacking - Kiến thức cơ bản mà Pentester thường bỏ qua!

Mình để ý thấy có nhiều bạn đang bị lu mờ giữa 2 khái niệm Pentest và Hacking. Thực sự thì cũng sẽ khó có thể phân biệt rõ ràng nhưng "Hacking" là cụ từ bạn sẽ sử dụng khi bạn tìm thấy lổ hổng ( cả về lổ hổng logic và lổ hổng đến từ tech ) và khai thác được lổ hổng đó. Còn Pentest theo mình thì chỉ là kiểm tra đánh giá tính bảo mật của một hệ thống hoặc một server nào đó thôi. OK! Bắt đầu với chủ đề mà mình đề cập tới sau đây. Có nhiều bạn trẻ hỏi mình: "Làm sao để có thể nhanh chóng tìm được lỗi từ ứng dụng web?". Câu trả lời của mình là:"Hãy bắt đầu với Google Hacking." Google Hacking là một thuật ngữ mà gói gọn một loạt các kĩ thuật cho phép truy vấn trên công cụ tìm kiếm Google.com, đôi khi được dùng để xác định các lổ hổng trong các ứng dụng web cụ thể.(Cụ thể như thế nào thì mình sẽ cố gắng giải thích tiếp trong giới hạn kiến thức mà mình biết). Bên cạnh việc truy vấn từ google có thể tiết lộ các lỗ hổng trong các ứng dụng web, Go...