Amazon storing classified US government documents improperly
from lemmyreader@lemmy.ml to security@lemmy.ml on 07 Apr 2024 18:10
https://lemmy.ml/post/14174523

wetdry.world/@ari/112230288896956003

#security

threaded - newest

AceFuzzLord@lemm.ee on 07 Apr 2024 18:46 next collapse

Okay, the question I have, is why any government from a developed country would ever use something like AWS or something that everyone can obtain access to rather than making their own private solutions to these problems?

hackerwacker@lemmy.ml on 07 Apr 2024 18:53 next collapse

It’s easier to hire someone who knows aws than to train someone on your custom thing. I don’t really agree, but that’s mostly the reasoning.

JDubbleu@programming.dev on 07 Apr 2024 23:31 collapse

Not to mention in house solutions are basically guaranteed to cost more than AWS to get something even close to as comparable. A basic service like Lambda is complex as fuck and has had billions of dollars poured into making it what it is today.

v_krishna@lemmy.ml on 07 Apr 2024 18:56 next collapse

Amazon has a government cloud offering aws.amazon.com/govcloud-us/

lemmyreader@lemmy.ml on 07 Apr 2024 19:02 next collapse

Another question could be : which developed country is not yet using the popular AWS already and why ?

For example : …aboutamazon.com/…/amazon-web-services-to-launch-…

Customers, AWS Partners, and regulators welcoming the new AWS European Sovereign Cloud include the German Federal Office for Information Security (BSI), German Federal Ministry of the Interior and Community (BMI), German Federal Ministry for Digital and Transport, Finland Ministry of Finance, National Cyber and Information Security Agency (NÚKIB) in the Czech Republic, National Cyber Security Directorate of Romania, SAP, Dedalus, Deutsche Telekom, O2 Telefónica in Germany, Heidelberger Druckmaschinen AG, Raisin, Scalable Capital, de Volksbank, Telia Company, Accenture, AlmavivA, Deloitte, Eviden, Materna, and msg group

driving_crooner@lemmy.eco.br on 07 Apr 2024 19:20 next collapse

In Portuguese: serpro.gov.br/…/serpro-lanca-nuvem-de-governo

Brazillian government launched its own cloud service to support the government agencies, everything stored and administer in Brazilian territory, making it independent from private companies and international governments.

lemmyreader@lemmy.ml on 07 Apr 2024 19:27 collapse

🎉 Hooray!

golden_zealot@lemmy.ml on 07 Apr 2024 19:42 next collapse

I expect the same reasons they’re mostly all using Microsoft Office, Windows, and Active Directory. Because it’s cheaper than doing it yourself.

[deleted] on 07 Apr 2024 18:53 next collapse
.
MotoAsh@lemmy.world on 07 Apr 2024 20:46 collapse

and circular things roll back down hill so easily it’s constantly amazing that anyone’s dumb enough to try it this day and age… buuut then I guess there’s always that child who’s satisfied shoving all shapes through the square hole…

psmgx@lemmy.world on 08 Apr 2024 02:29 next collapse

Cloud presents several advantages,and GovCloud is a thing.

Like, Amazon has SCIF cloud offerings. These leaks were cuz some dumbass contractor exposed a repo to the internet

capital@lemmy.world on 09 Apr 2024 02:23 collapse

This comment makes it clear you’ve never worked in government IT.

AceFuzzLord@lemm.ee on 09 Apr 2024 04:05 collapse

Hell, I’m still in college for an IT degree, so no I haven’t worked in government IT.

capital@lemmy.world on 09 Apr 2024 04:19 collapse

The US government fucking sucks at it.

I really wish it wasn’t the case.

shininghero@kbin.social on 07 Apr 2024 19:25 next collapse

Aaand that search query got me some files with the top secret flag. Fortunately, they seem to be internal memos on things that are already known to the public, so nothing too immediately dangerous.

My big question is, why in the ever-loving fuck are these files outside of SIPRNET?

wizardbeard@lemmy.dbzer0.com on 07 Apr 2024 21:08 next collapse

Contractors and third parties with security clearance. Did you really think any US government agency actually tightened things down properly after Snowden?

jkrtn@lemmy.ml on 07 Apr 2024 21:24 next collapse

Is it illegal to have these or just distribution is illegal? I’m worried about the implications of you downloading but it isn’t like anyone will care.

As for how they got there, perhaps via scan-to-email from the Mar-a-Lago copy- and bathroom.

wizardbeard@lemmy.dbzer0.com on 07 Apr 2024 23:12 next collapse

This shit has been happening for far far longer than cheeto. It’s bipartisan military organization incompetence, and the exact issue that allowed the Snowden leaks to occur.

Maggoty@lemmy.world on 08 Apr 2024 04:28 next collapse

Obligatory, I am not a lawyer.

If random citizen finds it on the street they can’t be punished for having it. But the government can repossess the document at any time.

PsychedSy@lemmy.dbzer0.com on 08 Apr 2024 13:22 collapse

The markings tell people with clearance how to handle the documents more than anything else. You have no way of knowing if it’s a legit marking.

GenderNeutralBro@lemmy.sdf.org on 07 Apr 2024 21:35 next collapse

Cloud cloud cloud, cloudy cloud, cloudy cloudy cloud cloud.

-Management

finkrat@lemmy.world on 07 Apr 2024 23:54 collapse

Cloudorporate is confused!

Cloudorporate hurt itself in its confusion!

psmgx@lemmy.world on 08 Apr 2024 02:06 collapse

“cloud first” is a mantra that not even the FedGov can refuse.

Mostly cuz the largest, data mining, and ad-driven companies in the world told them it was better.

echo@lemmings.world on 07 Apr 2024 19:38 next collapse

Amazon is only doing what someone told it to do. This is improper handling of documents and not a problem with Amazon itself.

cloud_herder@lemmy.world on 07 Apr 2024 18:42 next collapse

To be fair, it’s probably more about the IT contractors and consulting firms that didn’t implement security policies or configurations correctly on the S3 buckets for the governments they’re working for. The AWS products aren’t opening up things to the public internet without auth. Which I bet most of you knew.

Example: Accenture left a trove of highly sensitive data on public servers (2017)

AmbiguousProps@lemmy.today on 07 Apr 2024 20:23 next collapse

As much as I hate them, this is likey because a customer misconfigured their bucket and not on Amazon.

Lucien@hexbear.net on 07 Apr 2024 20:32 next collapse

Yeah, I work for a Federal agency, and I can confirm this is an extremely plausible situation. Was probably a contractor.

melpomenesclevage@lemm.ee on 08 Apr 2024 16:51 collapse

Good thing those are always necessary and efficient.

Tak@lemmy.ml on 07 Apr 2024 21:34 next collapse

Just like when users get “hacked” a lot of the time it was just their own lack of security practices and not the service provider. Obviously there are exceptions and I hate defending tech giants but end users are often to blame.

cybersandwich@lemmy.world on 08 Apr 2024 03:53 next collapse

I have never configure s3 buckets for an enterprise personally, but I have used AWS for some personal projects. The control panel pretty clearly warns you if you try to open the bucket to the public. “This is unsafe. Everyone can see everything you idiot!”

They must be doing it through the CLI.

pop@lemmy.ml on 08 Apr 2024 03:54 collapse

There’s no reason for amazonaws.com to be on search engine at all. Which is just as simple as placing a robots.txt with deny all declaration. Then no user would have to worry about shit like this.

Moonrise2473@feddit.it on 08 Apr 2024 08:08 next collapse

Who said that?

Many other customers instead want to get that, maybe they are hosting images for their website on S3, or other public files that are meant to be easily found

If the file isn’t meant to be public, then it’s the fault of the webmaster which placed it on a public bucket or linked somewhere in a public page

Also: hosting files on Amazon S3 is super expensive compared to normal hosting, only public files that are getting lots of downloads should be using that. A document that’s labeled for “internal use only” should reside on a normal server where you don’t need the high speed or high availability of AWS and in this way you can place some kind of web application firewall that restricts access from outside the company/government.

For comparison, it’s like taking a $5 toll road for just a quarter of mile at 2 am. There’s no traffic and you’re not in hurry, you can go local and save that $5

goferking0@lemmy.sdf.org on 08 Apr 2024 18:30 collapse

There’s also the question of what happens if they just ignore the robots.txt file

AmbiguousProps@lemmy.today on 08 Apr 2024 19:46 collapse

robots.txt doesn’t have to be followed. It doesn’t block crawling.

Septimaeus@infosec.pub on 07 Apr 2024 20:40 next collapse

Such examples of OpSec competence make it easy to dismiss the majority of government conspiracy theories IMHO.

TankieTanuki@hexbear.net on 07 Apr 2024 22:02 next collapse

rationalwiki.org/wiki/Toupee_fallacy

comfydecal@infosec.pub on 07 Apr 2024 22:47 next collapse

Cool resource, thanks for the share!

TheDoctor@hexbear.net on 08 Apr 2024 00:23 next collapse

Basically “I can always tell” as an actually fallacy. Neat

Septimaeus@infosec.pub on 08 Apr 2024 00:36 collapse

lol yes. But it’s not the regular evidence of shoestring infrastructure and lack of process that casts doubt on these grand conspiracies. It’s the diminishing conditional probability, over time, that they are somehow always the exception.

TankieTanuki@hexbear.net on 08 Apr 2024 01:16 collapse

always the exception

Can you explain?

Septimaeus@infosec.pub on 08 Apr 2024 02:11 collapse

If we flip a fair coin once, the odds of not getting tails is 50%. If we flip twice, the odds diminish to 25%. Flip 20 times, the odds diminish to 0.000001%.

This is the conditional probability that makes the concealment of large and/or longterm conspiracies implausible: we say that the odds of getting heads on the 100th toss, conditioned on the probability of having already gotten heads 99 times, is less than a billion billion billion to one.

And the grander the conspiracy, i.e. the more individuals involved, the more “coin flips” regularly occur, and the faster these infinitesimal odds are reached — hence the expression “too many minions spoil the plot.”

So while mistakes are indeed unsurprising, the fact that none have ever uncovered big old conspiracies (especially the likes of flat earth, fake moon landing, aliens, etc.) suggests the odds of their veracity are, at this point, vanishingly small.

TankieTanuki@hexbear.net on 08 Apr 2024 07:43 collapse

Gotcha.

I think it’s important to agree on a definition of “conspiracy theory” and also on what qualifies as spoiling or revealing the plot in these discussions. Otherwise we’re probably talking about different things.

nehal3m@sh.itjust.works on 07 Apr 2024 22:15 next collapse

They dropped this to make themselves look incompetent!

Septimaeus@infosec.pub on 07 Apr 2024 23:19 next collapse

4D chess by the deep state!

Gradually_Adjusting@lemmy.world on 07 Apr 2024 22:18 collapse

“No! This is not how the game is meant to be played.”

AcidLeaves@hexbear.net on 07 Apr 2024 23:43 next collapse

Right, because people never make simple mistakes 🙄

People who get paid half a mill to code mess up basic stuf like this by accident all the time

Septimaeus@infosec.pub on 08 Apr 2024 00:47 collapse

I mean, I agree with you. I’m not claiming “there are no good toupees.” I’m pointing to [the alopecia market] as evidence that [a pill to cure baldness] couldn’t be kept secret by the [shadowy cabal of elites with gorgeous hair] for very long.

TheDoctor@hexbear.net on 08 Apr 2024 02:03 next collapse

Legit, if you want to know if a conspiracy is true, just wait 20-50 years and the CIA will declassify the related documents. Most of them are open secrets that happen to be difficult to corroborate as they’re happening. Very few rely on outright secrecy. More just plausible deniability during the period where the public would be up in arms about it.

Maggoty@lemmy.world on 08 Apr 2024 04:22 next collapse

I go back to the veteran comedian every time.

We can’t even stop our privates from telling their stripper girlfriend about the mission they’re going on the next day, and people think there’s a giant conspiracy out there where nobody talks…

Then there’s the Warrantless Wiretap program under the Bush Administration. Cheney kept the authorization memo in his personal lawyer’s safe. Only 7 people knew it existed. Shit still leaked.

Septimaeus@infosec.pub on 08 Apr 2024 07:36 collapse

Only 7. That’s perfect. I forget who said “three may keep a secret if two are dead” but of all the mustache twirling pricks in that admin, Cheney should have known.

Edit: it’s Ben Franklin’s joke, apparently. I doubt he’d mind.

irmoz@reddthat.com on 08 Apr 2024 17:49 collapse

Compartmentalisation helps

If no one actually knows the plan other than the guy in charge, no one can leak the plan:

An example of compartmentalization was the Manhattan Project. Personnel at Oak Ridge constructed and operated centrifuges to isolate uranium-235 from naturally occurring uranium, but most did not know exactly what they were doing. Those that knew did not know why they were doing it. Parts of the weapon were separately designed by teams who did not know how the parts interacted.

Septimaeus@infosec.pub on 12 Apr 2024 18:05 collapse

True, and interesting since this can be used as a statistical lever to ignore the exponential scaling effect of conditional probability, with a minor catch.

Lemma: Compartmentalization can reduce, even eliminate, chance of exposure introduced by conspirators.

Proof: First, we fix a mean probability p of success (avoiding accidental/deliberate exposure) by any privy to the plot.

Next, we fix some frequency k~1~, k~2~, … , k~n~ of potential exposure events by each conspirators 1, …, n over time t and express the mean frequency as k.

Then for n conspirators we can express the overall probability of success as

1 ⋅ p^tk~1~^ ⋅ p^tk~2~^ ⋅ … ⋅ p^tk~n~^ = p^ntk^

Full compartmentalization reduces n to 1, leaving us with a function of time only p^tk^. ∎

Theorem: While it is possible that there exist past or present conspiracies w.h.p. of never being exposed:

  1. they involve a fairly high mortality rate of 100%, and
  2. they aren’t conspiracies in the first place.

Proof: The lemma holds with the following catch.

(P1) p^tk^ is still exponential over time t unless the sole conspirator, upon setting a plot in motion w.p. p^t~1~k^ = p^k^, is eliminated from the function such that p^k^ is the final (constant) probability.

(P2) For n = 1, this is really more a plot by an individual rather than a proper “conspiracy,” since no individual conspires with another. ∎

[deleted] on 07 Apr 2024 21:32 next collapse
.
nieminen@lemmy.world on 07 Apr 2024 20:53 next collapse

Second result for me was a document about Russian hackers and their demands that we enstate trump as president after he lost.

Cornelius_Wangenheim@lemmy.world on 07 Apr 2024 22:24 next collapse

Documents marked “not for public release” aren’t classified. They’re what’s called controlled unclassified information (CUI). It’s anything from PII, law enforcement victim records to sensitive (but unclassified) technical manuals. There’s dozens of categories if anyone cares to look at them: www.archives.gov/cui/…/category-marking-list

They shouldn’t be sitting out there, but it’s also not a crime.

Liz@midwest.social on 08 Apr 2024 03:29 collapse

The first result I got was labeled “classified: top secret - not for public release” so the label is more broadly applied than just CUI. my assumption that the document was legit was wrong.

Cornelius_Wangenheim@lemmy.world on 08 Apr 2024 05:09 next collapse

That’s pretty obviously fake. This is what the real markings look like: www.archives.gov/…/marking-booklet-revision.pdf

Liz@midwest.social on 08 Apr 2024 17:17 collapse

I mean, here’s the document. Unfortunately I am literally incapable of reading the dense material you provided, so you’ll have to be the judge. s3.amazonaws.com/…/Sunvite2021FinalsBriefing1.pdf

Socsa@sh.itjust.works on 08 Apr 2024 18:10 next collapse

100% fake.

Rivalarrival@lemmy.today on 08 Apr 2024 21:07 collapse

In a properly classified document, each paragraph will be preceded by a “portion marking” indicating the level of classification and possibly compartmentalization. For example, the “(U)” in this quote, indicating the paragraph is Unclassified.

(U) Lorem ipsum dolor sit amor consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

A Top Secret document would have one or more portions with a “(TS)”

(TS) Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Additionally, an “overall classification marking” is also required. This is a marking at the top and bottom of every page of the document, providing the overall classification (and compartmentalization) of the document, even if all the portions on that particular page are unclassified. “TOP SECRET” at the top and bottom of the page.

Finally, the document needs a classification authority block, indicating who classified the document, why it was classified, and when it should be declassified.

The absence of portion markings, overall markings, and classification block, or misuse of any (“Not for public release”) is a good indication that the document is fake.

Liz@midwest.social on 08 Apr 2024 22:17 collapse

Thanks for the rundown!

Rivalarrival@lemmy.today on 08 Apr 2024 20:51 collapse

Classified: top secret - not for public release

That’s not at all a valid classification marking.

AffineConnection@lemmy.world on 08 Apr 2024 05:23 next collapse

So many of the results I see are incredibly obvious fakes.

OrlandoDeCabron@hexbear.net on 08 Apr 2024 07:48 next collapse

Went and looked at the documents that show up, both are on “russian hacking”. 100% honey pot if I’ve ever seen one.

JonsJava@lemmy.world on 08 Apr 2024 16:35 next collapse

In their defense:

reverendsteveii@lemm.ee on 08 Apr 2024 16:50 next collapse

I work in a HIPAA-covered industry and if our AWS and GCP buckets are insecure that’s on us. Fuck Amazon, but a hammer isn’t responsible for someone throwing it through a window and a cloud storage bucket isn’t responsible for the owner putting secret shit in it and then enabling public access.

zalgotext@sh.itjust.works on 08 Apr 2024 19:21 next collapse

Yeah I hate Amazon as much as the next person, but this is a people/process problem, not an Amazon problem. Amazon doesn’t know or care what you put into an AWS bucket (within reason, data tracking, etc, blah blah blah). People taking classified documents and uploading it to an Internet-connected cloud service is procedurally wrong on so many levels.

AnUnusualRelic@lemmy.world on 08 Apr 2024 19:28 collapse

It could be both. In the absence of more data, I’m reserving my judgement.

nxdefiant@startrek.website on 08 Apr 2024 21:01 next collapse

The north east US is dotted with high (physical) security Amazon data centers . I promise those aren’t hosting files you can search Google for, if you know what I mean.

zalgotext@sh.itjust.works on 08 Apr 2024 21:02 collapse

No, it literally cannot be both, full stop. There should rigorous, well defined procedures and processes for handling classified data, and chiefly among those should be something along the lines of “don’t upload classified documents to a publicly-available internet-connected location/service/filestore/etc”. If it’s not, a security officer has not done their job.

dejected_warp_core@lemmy.world on 08 Apr 2024 21:34 collapse

What kills me about S3 is that the use cases for publicly accessing S3 contents over HTTP have got to be vanishingly small compared to every other use of the service. I appreciate there’s legacy baggage here but I seriously wonder why Amazon hasn’t retired public S3 and launched a distinct service or control for this that’s harder to screw up.

antimidas@sopuli.xyz on 08 Apr 2024 22:59 next collapse

Wouldn’t say so, loads of people and organisations use it as a pseudo-CDN of sorts AFAIK

capital@lemmy.world on 09 Apr 2024 01:28 collapse

Public access is disabled by default and it warns you when you enable it. How much more idiot proof does it need to be?

dejected_warp_core@lemmy.world on 09 Apr 2024 16:57 collapse

Honestly, I’m for removing the option and moving that “feature” somewhere else in AWS entirely. And those warnings aren’t really a thing when using IaC. Right now it’s still a “click here for self harm” button, even with the idiot proofing around it.

Finalsolo963@lemmy.blahaj.zone on 08 Apr 2024 20:23 next collapse

What’s the over-under on this being a honeypot?

MetaCubed@lemmy.world on 08 Apr 2024 22:43 collapse

My bets are on “cloud infrastructure is bad for highly secret information” rather than “public web honeypot with zero obfuscation” Edit: likely fake. The sensationalist in me would love it if this was real because it would confirm my “cloud storage bad” biases, but alas, the document markings dont appear to be consistent with my understanding of official US Government confidentiality/secrecy markings

capital@lemmy.world on 09 Apr 2024 01:26 collapse

If S3, it’s not cloud storage’s fault some dummies enable public access to buckets which is disabled by default.

MetaCubed@lemmy.world on 09 Apr 2024 01:46 collapse

Youre correct it’s not the provider’s fault, but it’s much harder in my very biased opinion to accidentally expose a secure 100% internal intranet than it is to accidentally put a top secret document in a public data bucket.

But it’s a moot argument in this case anyway. Fake documents means these are likely exposed just to troll folks like us.

BoisZoi@lemmy.ml on 08 Apr 2024 20:46 next collapse

I added more JPEG for OP:

<img alt="" src="https://lemmy.ml/pictrs/image/77c188bc-fa8f-48d5-ac60-e0a3c1e76305.jpeg">

KSPAtlas@sopuli.xyz on 08 Apr 2024 23:30 collapse

Yeah i saw this before