Why a 2nd Class Air National Guardsman Could Read the Pentagon’s Briefings on Ukraine’s War Plan

Written by

Geoff Halstead

Published on

Reading time

3 min.

Hacking data

Most people by now have heard of Jack Teixeira, or if not at least the infamous story of how a 2nd class Massachusetts Air National Guardsman was able to access and share the Pentagon’s briefings on Ukraine’s War Plans with a Discord group of his gaming buddies. Much of mainstream media seemed to frame it as more of a general problem with classification of information.

Perhaps the U.S. government classifies too much information. Paradoxically, though, it then grants overly broad access within the government to the information that it has classified. Despite Teixeira’s junior position, The Washington Post reported, he had access to the Joint Worldwide Intelligence Communications System, a computer network for top-secret Defense Department information. Investigations after the 9/11 attacks revealed a siloing of information within separate agencies and led to efforts to promote more sharing, but the Pentagon might have overcorrected.

The Atlantic: I Oversaw the National Guard. I cannot fathom how this happened.

We would point to a deeper root cause, however:

We can all be pretty sure that the Pentagon has invested in and put in place some of the best security architectures and processes available: control of secrets and information is a core mission. But the system of control is top down, centralized. So once a user gets elevated to a level of privileged access – such as a network sys admin – all kinds of pathways open up to far and wide across any particular system. It is pretty clear that something along those lines is what happened here.

Airman Teixeira was trained as a cyber transport systems specialist, a job that could entail a variety of duties, such as keeping his unit’s communication networks running. He was assigned to the 102nd Intelligence Wing at Otis Air National Guard Base, part of Joint Base Cape Cod, according to an Air Force spokeswoman. The 102nd Intelligence Wing’s official Facebook page congratulated Airman Teixeira and colleagues on their promotion to airmen first class in July.

Officials would not answer questions about what in Airman Teixeira’s duties would necessitate his having access to daily slides about the Ukraine war, much less the daily deluge of intelligence reports from the C.I.A., the National Security Agency and the Office of the Director of National Intelligence. There are units at the base that process intelligence collected from drones and U-2 spy planes, though it is doubtful that work alone would require the sort of access to the broad array of classified information that has been leaked on the Discord server.

But he could also have gained access to the documents in other ways. U.S. government officials with security clearance often receive such documents through daily emails on a classified computer network, one official told The Times, and those emails might then be automatically forwarded to other people.

New York Times: F.B.I. Arrests National Guardsman in Leak of Classified Documents

So once Airman Teixeira got into an elevated level of access, he was able to tap into other networks and systems where data – perhaps emails, perhaps file servers – was lying around unclassified.

Now let’s imagine what would happen if these emails – or the file folders for these reports had been secured by Faction instead.

  1. A Faction Group is created for the users that are authorized to read these reports (Faction Groups can be of unlimited size BTW).
  2. When users are authenticated into the Faction Group, they receive the keys to decrypt the data – email, communications, files in Cloud folders, etc. – that are circulated in it.
  3. NOBODY else can read these, because they don’t have the keys.
  4. So, if our Airman Teixeira works his way up and into a drive of folders or an email list he isn’t supposed to be in, it doesn’t do him any good. Yes, as a network admin he can access these things, but he can’t decrypt them! And it it was a Faction Network, he would not be able to see or attempt to join the network carrying this email or hosting the folders in the first place.

So what’s the moral of this story?

Any system of privacy and security is always subject to human fallibility. People make mistakes and do bad things. But when the system is centralized, the mistakes are compounded and can rapidly become catastrophic. When you decentralize and put the control of the keys to a network and its data in the actual end users that create and manage it, you eliminate this whole category of centralized hacks that are so prevalent today.

Related Blogs

WiFi

Alert: Two major flaws expose WiFi networks to attack, affects billions of users

Reading Time: 5 min.

Summary Two major flaws in open-source software could enable bad actors to break into password-protected home and enterprise WiFi networks. The…

Read more

The Internet Cannot be Defended from the PRC

Reading Time: 4 min.

The NSA release this week a comprehensive report with explicit details of the extent of the activity and ‘Tradecraft” of…

Read more
Keep It Simple

KISS: Keep It Simple Security

Reading Time: 7 min.

Faction Networks changes the paradigm and enables K.I.S.S. by going back to the foundation of actually securing networking, and then…

Read more
Linux XYZ Utils Back Door

The System is Blinking Red

Reading Time: 6 min.

The “Good Enough” strategy in Cyber Security is not going to cut it any more. The time frame here is…

Read more

How Could This Happen?! A Deep Dive into the Change Healthcare Attack

Reading Time: 11 min.

It’s not an aberration – it WILL happen again As many of you have no doubt heard or read about,…

Read more
Food Manufacturing

Not Just ‘Factories’ – 40% of Food & Beverage Manufacturers Impacted by Ransomware Attack

Reading Time: 1 min.

JSB Foods ransomware incident just a prominent example According to Claroty, more than 40% of food and beverage-sector respondents had…

Read more
Hacking data

Why a 2nd Class Air National Guardsman Could Read the Pentagon’s Briefings on Ukraine’s War Plan

Reading Time: 3 min.

Most people by now have heard of Jack Teixeira, or if not at least the infamous story of how a…

Read more
Smart UPS Devices

Uninterruptible Power Supply (UPS) Devices In the Bullseye for Hackers

Reading Time: 2 min.

Weak Protocols and Built-in Back Doors Make These Inviting Targets The Cybersecurity and Infrastructure Security Agency (CISA) and the Department…

Read more

Nobody Would Have Agreed to This

Reading Time: 9 min.

Even George Orwell Could Not Have Imagined the World We Live in Today Let’s Start with a Thought Experiment If…

Read more

5 Easy Cybersecurity Steps to Radically Reduce Your Risk NOW

Reading Time: 9 min.

For most small to mid-sized business owners, just keeping business and operations running is the primary concern. When one looks…

Read more

Warning: Undefined array key 0 in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 19

Warning: Attempt to read property "cat_ID" on null in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 19

Warning: Undefined array key 0 in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 20

Warning: Attempt to read property "cat_name" on null in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 20

Why a 2nd Class Air National Guardsman Could Read the Pentagon’s Briefings on Ukraine’s War Plan

Most people by now have heard of Jack Teixeira, or if not at least the infamous story of how a 2nd class Massachusetts Air National Guardsman was able to access and share the Pentagon’s briefings on Ukraine’s War Plans with a Discord group of his gaming buddies. Much of mainstream media…

Reading Time: 3 min.

Hacking data

Most people by now have heard of Jack Teixeira, or if not at least the infamous story of how a 2nd class Massachusetts Air National Guardsman was able to access and share the Pentagon’s briefings on Ukraine’s War Plans with a Discord group of his gaming buddies. Much of mainstream media seemed to frame it as more of a general problem with classification of information.

Perhaps the U.S. government classifies too much information. Paradoxically, though, it then grants overly broad access within the government to the information that it has classified. Despite Teixeira’s junior position, The Washington Post reported, he had access to the Joint Worldwide Intelligence Communications System, a computer network for top-secret Defense Department information. Investigations after the 9/11 attacks revealed a siloing of information within separate agencies and led to efforts to promote more sharing, but the Pentagon might have overcorrected.

The Atlantic: I Oversaw the National Guard. I cannot fathom how this happened.

We would point to a deeper root cause, however:

We can all be pretty sure that the Pentagon has invested in and put in place some of the best security architectures and processes available: control of secrets and information is a core mission. But the system of control is top down, centralized. So once a user gets elevated to a level of privileged access – such as a network sys admin – all kinds of pathways open up to far and wide across any particular system. It is pretty clear that something along those lines is what happened here.

Airman Teixeira was trained as a cyber transport systems specialist, a job that could entail a variety of duties, such as keeping his unit’s communication networks running. He was assigned to the 102nd Intelligence Wing at Otis Air National Guard Base, part of Joint Base Cape Cod, according to an Air Force spokeswoman. The 102nd Intelligence Wing’s official Facebook page congratulated Airman Teixeira and colleagues on their promotion to airmen first class in July.

Officials would not answer questions about what in Airman Teixeira’s duties would necessitate his having access to daily slides about the Ukraine war, much less the daily deluge of intelligence reports from the C.I.A., the National Security Agency and the Office of the Director of National Intelligence. There are units at the base that process intelligence collected from drones and U-2 spy planes, though it is doubtful that work alone would require the sort of access to the broad array of classified information that has been leaked on the Discord server.

But he could also have gained access to the documents in other ways. U.S. government officials with security clearance often receive such documents through daily emails on a classified computer network, one official told The Times, and those emails might then be automatically forwarded to other people.

New York Times: F.B.I. Arrests National Guardsman in Leak of Classified Documents

So once Airman Teixeira got into an elevated level of access, he was able to tap into other networks and systems where data – perhaps emails, perhaps file servers – was lying around unclassified.

Now let’s imagine what would happen if these emails – or the file folders for these reports had been secured by Faction instead.

  1. A Faction Group is created for the users that are authorized to read these reports (Faction Groups can be of unlimited size BTW).
  2. When users are authenticated into the Faction Group, they receive the keys to decrypt the data – email, communications, files in Cloud folders, etc. – that are circulated in it.
  3. NOBODY else can read these, because they don’t have the keys.
  4. So, if our Airman Teixeira works his way up and into a drive of folders or an email list he isn’t supposed to be in, it doesn’t do him any good. Yes, as a network admin he can access these things, but he can’t decrypt them! And it it was a Faction Network, he would not be able to see or attempt to join the network carrying this email or hosting the folders in the first place.

So what’s the moral of this story?

Any system of privacy and security is always subject to human fallibility. People make mistakes and do bad things. But when the system is centralized, the mistakes are compounded and can rapidly become catastrophic. When you decentralize and put the control of the keys to a network and its data in the actual end users that create and manage it, you eliminate this whole category of centralized hacks that are so prevalent today.

If you liked this post, Share it on: