ARRA News Service
News Blog for social, fiscal & national security conservatives who believe in God, family & the USA. Upholding the rights granted by God & guaranteed by the U.S. Constitution, traditional family values, "republican" principles / ideals, transparent & limited "smaller" government, free markets, lower taxes, due process of law, liberty & individual freedom. Content approval rests with the ARRA News Service Editor. Opinions are those of the authors. While varied positions are reported, beliefs & principles remain fixed. No revenue is generated for or by this "Blog" - no paid ads - no payments for articles. Fair Use Doctrine is posted & used.
Blogger/Editor/Founder: Bill Smith, Ph.D. [aka: OzarkGuru & 2010 AFP National Blogger of the Year]
Contact: editor@arranewsservice.com (Pub. Since July, 2006)
    Home Page
   

One of the penalties for refusing to participate in politics is that you end up being governed by your inferiors. -- Plato (429-347 BC)

Wednesday, September 17, 2014

More Smoking Gun Documents Detail “High Risk” Obamacare Internet Site Security Problems

Less than one month before Healthcare.gov rollout, top Obama administration official highlights risks of malicious code being uploaded into the system through Excel macros; other “high risk” findings
Judicial Watch, Washington, D.C. - released 94 pages of documents obtained from the U.S. Department of Health and Human Services (HHS) revealing that in the days leading up to the rollout of Obamacare, top Centers for Medicare and Medicaid Services (CMS) officials knew of massive security risks with Healthcare.gov and chose to roll out the website without resolving the problems. Detailed information regarding the security flaws, previously withheld from public disclosure, was released to Judicial Watch.  Also released to Judicial Watch were “Sensitive Information – Special Handling” memos sent from CMS to Mitre Corporation, the Healthcare.gov security testing company, in which CMS rated “political … damage” and “public embarrassment to CMS” as factors in defining “Risk Rating” priorities.

The HHS documents were released as a result of a Freedom of Information Act (FOIA) lawsuit filed by Judicial Watch on March 18, 2014, Judicial Watch v. U.S. Department of Health and Human Services (No. 1:14-cv-00430), after HHS failed to respond to a December 20, 2013, FOIA request seeking the following information:Any and all records related to, regarding or in connection with the security of the healthcare.gov web portal including, but not limited to, studies, memoranda, correspondence, electronic communications (e-mails), and slide presentations from January 1, 2012 to the present. The existence of a security flaw in the Healthcare.gov web portal, in which “[T]he threat and risk potential is limitless,” had been previously revealed in a redacted version of a September 3, 2013, memo published by the House Government Oversight Committee.  However, the details of that flaw and others found in the Healthcare.gov website were omitted from the House-issued memo “for security reasons,” according to a CBS News report by Sharyl Attkisson. Judicial Watch can now reveal exactly what those security flaws entailed.

These details are especially significant in light of the revelation by federal officials that the Healthcare.gov web portal was hacked last July, as reported on September 4, 2014. The documents obtained by Judicial Watch also show that top CMS officials, including CMS Chief Information Officer Tony Trenkle and CMS Director Marilynn Tavenner, were aware of the gaping security flaws, yet Tavenner chose to launch the website anyway. Trenkle himself resigned before the site’s launch date.

In a September 3, 2013, “Authorization Decision” memo, Trenkle reveals a flaw involving Excel macros that could risk malicious code being uploaded into the system. According to a “Finding” in the just released unredacted memo, “FFM [Federally Facilitated Marketplaces] has an open high finding: Macros enabled on uploaded files allow code to execute automatically.”

In the “Finding Description” alongside that finding, the memo continues: “An excel file with a macro which executes when the spreadsheet is opened was uploaded for  review by another user. The macro only opened up a command prompt window on the local user’s machine; however, the threat and risk potential is limitless. Keeping macros enabled relies on the local machine of the user who downloads to detect and stop malicious activity.”

Among the “Recommended Corrective Actions” to fix this problem, the memo says, “Implement a method for scanning uploaded documents for malicious macros.”  Remarkably, the due date provided for the corrective actions to remedy this “limitless” risk problem is May 31, 2014 – eight months after the launch of Healthcare.gov.

The above revelation about the potential for malicious code being uploaded into Healthcare.gov is especially noteworthy, in light of the September 4, 2014, Wall Street Journal article, which reported, “A hacker broke into part of the Healthcare.gov insurance enrollment website in July and uploaded malicious software, according to federal officials.”

In the same September 3, 2013 memo, details of another “high risk” finding were disclosed: “FFM has an open high finding: No evidence of functional testing processes and procedures being adequate to identify functional problems resulting in non-functional code being deployed.”

The “Finding Description” for this flaw elaborates: “Software is being deployed into implementation and production that contains functional errors. Untested software may produce functional errors that cause unintentional Denial of Service and information errors.” The due date provided to correct this high risk flaw was listed as February 26, 2015, nearly a year and a half following Obamacare’s launch.

Another security flaw identified in the September 3 memoSeptember 3 memo also reveals that “FFM appears to have selected an inappropriate E-Authentication level.” The risk significance of this problem is described as: “The E-Authentication level of a system determines the security controls and means when connecting to a system over or from an untrusted network. Use of inappropriate controls exposes the enterprise to additional risk.” The due date to correct this issue was also provided as February 7, 2014.

In a September 6, 2013, “Authorization Decision” memo from CMS’ Chief Information Officer Tony Trenkle to CMS Director of Consumer Information and Insurance Systems Group, James Kerr, Trenkle advised, “There are no findings in CFACTS for the FY13 Security Control Assessment (SCA) or the recent penetration testing.”  This meant that security problems found in testing the website had not even been entered into the database set up to keep track of security problems. Despite his findings, Trenkle gave his “Authorization to Operate,” concluding, “The current risk is deemed acceptable.”

Judicial Watch was also provided with the August 20, 2013, and December 6, 2013, Security Controls Assessment Test Plans sent by CMS to Mitre Corporation, the vendor tasked with testing the security of the Healthcare.gov portal.  CMS advised Mitre that the highest “Risk Rating” should be given to flaws that could cause “political” damage to CMS.  Moderate and low “Risk Ratings” were to include those resulting in potential “public embarrassment” to the agency. Specifically, the Assessment Test Plan provides the following Risk Ratings:“High: Exploitation of the technical or procedural vulnerability will cause substantial harm to CMS business processes. Significant political, financial and legal damage is likely to result.

“Moderate: Exploitation of the technical or procedural vulnerability will significantly impact the confidentiality, integrity and/or availability of the system or data. Exploitation of the vulnerability may cause moderate financial loss or public embarrassment to CMS.

“Low: Exploitation of the technical or procedural vulnerability will cause minimal impact to CMS operations. The confidentiality, integrity and availability of sensitive information are not at risk of compromise. Exploitation of the vulnerability may cause slight financial loss or public embarrassment.” 
“These are more smoking gun documents that the Obama administration knowingly put the privacy of millions of Americans at risk through Obamacare’s healthcare.gov ‘marketplace,’” said Judicial Watch President Tom Fitton.  “And these documents show that this administration was concerned about the political problems of the security flaws but couldn’t care less about the threat to privacy of millions of innocent Americans.  Given what we now know about Obamacare’s security, I have little doubt that Healthcare.gov is in danger of being in violation of federal privacy laws.  If you share private information on Healthcare.gov or a related Obamacare site, you should assume that your private information is unsecure and at risk at being hacked.”

Tags: HHS, Healthcare.gov. Obamacare, Internet Site, security problems, smoking gun, documents, Judicial Watch, Tom Fitton,  To share or post to your site, click on "Post Link". Please mention / link to the ARRA News Service. and "Like" Facebook Page - Thanks!
Posted by Bill Smith at 11:58 AM - Post Link

0 Comments:

Post a Comment

<< Home


View U.S. National Debt

Don't miss anything!
Subscribe to the
ARRA News Service
It's FREE & No Ads!

You will receive a verification email
& must validate you subscribed!

You Then Receive One Email Each AM
With Prior Days Articles / Toons / More


Also, Join & leave conservative posts & comments on
Facebook.com/ARRANewsService


Recent Posts:
Personal Tweets by the editor:
Dr. Bill - OzarkGuru - @arra
#Christian Conservative; Retired USAF & Grad Professor. Constitution NRA ProLife schoolchoice fairtax - Editor ARRA NEWS SERVICE. THANKS FOR FOLLOWING!

Action Links!
State Upper & Lower House Members
State Attorney Generals
State Governors
The White House
US House of Representatives
US Senators
GrassFire
NumbersUSA
Ballotpedia

Facebook Accts - Dr. Bill Smith
Pages:
ARRA News Service
Arkansans Against Big Government
Alley-White Am. Legion #52
Catholics & Protestants United Against Discrimination
End Taxpayer Funding of NPR
Overturn Roe V. Wade
Prolife Soldiers
Project Wildfire 4 Life
Republican Liberty Caucus of Arkansas
The Gold Standard
US Atty Gen Loretta Lynch, aka Eric Holder, Must Go
Veterans for Sarah Palin
Why Vote for Hillary (Satire)
FB Groups:
Arkansas For Sarah Palin
Arkansas Conservative Caucus
Arkansas County Tea Party
Arkansans' Discussion Group on National Issues
Blogs for Borders
Conservative Solutions
Conservative Voices
Defend Marriage -- Arkansas
FairTax
FairTax Nation
Arkansas for FairTax
Friends of the TEA Party in Arkansas
Freedom Roundtable
Pro-Life Rocks - Arkansas
Republican Network
Republican Liberty Caucus of AR
Reject the U.N.

Patriots
Exchange
Links

Request Via
Article Comment

Links to ARRA News
A Patriotic Nurse
Agora Associates
a12iggymom's Blog
America, You Asked For It!
America's Best Choice
ARRA News Twitter
As The Crackerhead Crumbles
Blogs For Borders
Blogs for Palin
Blow the Trumpet Ministry
Boot Berryism
Cap'n Bob & the Damsel
Chicago Ray Report - Obama Regime Report
Chuck Baldwin - links
Common Cents
Conservative Voices
Diana's Corner
Greater Fitchburg For Life
Lasting Liberty Blog
Liberal Isn't Amy
Marathon Pundit
Patriot's Corner
Right on Issues that Matter
Right Reason
Rocking on the Right Side
Saber Point
Saline Watchdog
Sultan Knish
The Blue Eye View
The Born Again Americans
TEA Party Cartoons
The Foxhole | Unapologetic Patriot
The Liberty Republican
The O Word
The Path to Tyranny Blog
The Real Polichick
The War on Guns
TOTUS
Twitter @ARRA
Underground Notes
Warning Signs
Women's Prayer & Action
WyBlog

Editor's Managed Twitter Accounts
Twitter Dr. Bill Smith @arra
Twitter Arkansas @GOPNetwork
Twitter @BootBerryism
Twitter @SovereignAllies
Twitter @FairTaxNation

Editor's Recommended Orgs
Accuracy in Media (AIM)
American Action Forum (AAF)
American Committment
American Culture & Faith Institute
American Enterprise Institute
American Family Business Institute
Americans for Limited Government
Americans for Prosperity
Americans for Tax Reform
American Security Council Fdn
AR Faith & Ethics Council
Arkansas Policy Foundation
Ayn Rand Institute
Bill of Rights Institute
Campaign for Working Families
CATO Institute
Center for Individual Freedom
Center for Immigration Studies
Center for Just Society
Center for Freedom & Prosperity
Citizens Against Gov't Waste
Citizens in Charge Foundstion
Coalition for the Future American Worker
Competitive Enterprise Institute
Concerned Veterans for America
Concerned Women for America
Declaration of Am. Renewal
Eagle Forum
FairTax
Family Research Council
Family Security Matters
Franklin Center for Gov't & Public Integrity
Freedom Works
Gingrich Productions
Global Incident Map
Great Americans
Gold Standard 2012 Project
Gun Owners of America (GOA)
Heritage Action for America
David Horowitz Freedom Center
Institute For Justice
Institute for Truth in Accounting
Intercollegiate Studies Institute
Judicial Watch
Less Government
Media Reseach Center
National Center for Policy Analysis
National Right To Work Foundation
National Rifle Association (NRA)
National Rifle Association (NRA-ILA)
News Busters
O'Bluejacket's Patriotic Flicks
OathKeepers
Open Secrets
Presidential Prayer Team
Religious Freedom Coalition
Renew America
Ron Paul Institute
State Policy Network
Tax Foundation
Tax Policy Center
The Club for Growth
The Federalist
The Gold Standard Now
The Heritage Foundation
The Leadership Institute
Truth in Accounting
Union Facts



Blogs For Borders

Reject the United Nations

Presidential Prayer Team

Thousands of Deadly Islamic Terror Attacks Since 9/11


FairTax Nation on FaceBook
Friends of Israel - Stand with Israel
Blog Feeds
Syndicated - Get the ARRA News Service feed Syndicated!
ARRA Blog Feed

Add to Google Reader or Homepage

Add to The Free Dictionary

Powered by Blogger


  • To Exchange Links - Email: editor@arranewsservice.com!
  • Comments by contributing authors or other sources do not necessarily reflect the position the editor, other contributing authors, sources, readers, or commenters. No contributors, or editors are paid for articles, images, cartoons, etc. While having reported on and promoting principles & beleifs beliefs of other organizations, this blog/site is soley controlled and supported by the editor. This site/blog does not advertise for money or services nor does it solicit funding for its support.
  • Fair Use: This site/blog may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. Such material is made available to advance understanding of political, human rights, economic, democracy, and social justice issues, etc. This constitutes a 'fair use' of such copyrighted material as provided for in section Title 17 U.S.C. Section 107 of the US Copyright Law. Per said section, the material on this site/blog is distributed without profit to readers to view for the expressed purpose of viewing the included information for research, educational, or satirical purposes. Any person/entity seeking to use copyrighted material shared on this site/blog for purposes that go beyond "fair use," must obtain permission from the copyright owner.
  • © 2006 - 2020 ARRA News Service
Creative Commons License
Creative Commons Attribution Noncommercial Share Alike 3.0 Unported License.