SAIC Loses Data of 4.9 Million Patients 182
An anonymous reader writes "Government contractor SAIC just can't seem to get a break. Still fresh off of the Citytime scandal, they've now had a data breach in which backup tapes holding 4.9 million personal health records were stolen from an employee's car. To add insult to injury, evidently the tapes were not encrypted either: 'Tricare did not indicate whether SAIC encrypted the information on the stolen tapes, but Raley said, "It's very hard to encrypt a backup tape."'"
LOL (Score:5, Informative)
And they all support rot256 (Score:2)
rot256 is for arbitrary 8-bit binary data.
"rot256 - like rot13 but 19-20 times as much rot!"
- rejected slogan, rot256 working group
Re: (Score:2)
Maybe there's a patent for encrypting patents.
Re: (Score:2)
Bingo. For basic encryption, I logged onto the tape silo, typed in a passphrase, enabled encryption, and called it done. Transferring the key via SPIN/SPOUT to the drives does the rest.
If I wanted better encryption, I can use a key management system, changing out keys for written tapes, but yet keeping them on the appliance for reading. Of course, a backup of the keys are made and stored.
Even without LTO's built in encryption, every modern backup program supports some type of AES level software encryptio
Quote not attributed to SAIC (Score:2)
From TFA:
Raley is "director of healthcare solutions at IT integration and security company Axway" and the quote "very hard to encrypt tape" is attributed to him, not SAIC.
SAIC has not said if the data was encrypted on the tapes or not.
If you use Axway as a vendor, you should fire them.
Re: (Score:2)
Hard to encrypt tape?!? Every LTO5 and most LTO4 drives support hardware AES encryption!
I think he may have meant one of two things...
1) He was thinking about encrypting tapes when they are already outside of the system. If an employee wanted to remove them from the secured facility, then how would he encrypt them in place without disrupting the production system?
2) He may be looking at it from their internal point of view. They probably have a large, old, proprietary, expensive system (what else in a government operation?) that doesn't support encryption and is not easily upgraded without a
Re: (Score:2)
Never mind that was stated in the first link.
Re: (Score:3)
No, its not. Under the HIPAA Security Rule, Encryption and Decryption is an "addressable" rather than a "required" specification of the Access Control standard mandated under HIPAA (see, 45 CFR Sec. 164.312(a).)
So, in fact, entities holding PHI are required to either implement encryption or document why it isn't "reasonable and appropriate" for them to do so. (see 45 CFR Sec. 164.306(d)(3).)
Encrypting data, whether at rest or in motion,is necessa
Very hard to encrypt a backup tape? (Score:2)
Seriously?
What kind of knuckle dragging moron can't figure out how to encrypt the data stream they're backing up?
Re: (Score:3)
Re: (Score:2)
Lol, this guy took the tapes out to his CAR, would you feel ok walking around with your companies database in your briefcase?
I wouldn't, I'd VPN in to grab it, not carry it, and I'd make sure I'm using a hardened windows to do it too. That kind of liability can really put a kink in somebody's day.
This fine gentleman though, not only removed the tapes, he put them in his car.
Now with that thought pattern do you REALLY expect him to know about encrypting tapes?
Some people just shouldn't be allowed to be arou
Re: (Score:2)
Lol, this guy took the tapes out to his CAR, would you feel ok walking around with your companies database in your briefcase?
I have to take drives to and from the data center with confidential and sensitive data on them. They are TrueCrypted with strong pass phrases, but just having the data in my possession makes me hesitant to go anywhere other than directly to/from the data center and office. Stop at Starbucks? No way! What if someone steals the drive during the 5 minutes it takes me to get my coffee
Re:Very hard to encrypt a backup tape? (Score:4, Informative)
When was the last time we read a story, "Iron Mountain lost backup tapes uber confidential data."??
Every time that happens they kill all the witnesses. So no one ever knows...
Re: (Score:2)
When was the last time we read a story, "Iron Mountain lost backup tapes uber confidential data."??
Every time that happens they kill all the witnesses. So no one ever knows...
Taking security through obscurity to a new level.
Re: (Score:3)
Re: (Score:2)
Based on a quick search, at least as recently as 2009. And then 2008 before that. And 2007, 2006, and 2005 (twice) before that.
http://datalossdb.org/organizations/128-iron-mountain [datalossdb.org]
We use Iron Mountain and they're generally good (and the local warehouse is only a couple of miles away), but it's still a good idea to encrypt any tape that leaves the facility, whether or not it contains personal data. A system
Re: (Score:2)
it's still a good idea to encrypt any tape that leaves the facility, whether or not it contains personal data.
Agreed. Encrypting the backup is standard practice. Or at least it should be if the admins are competent at what they do.
Re: (Score:2)
Unfortunately there are id10ts out there (typically upper management) who once heard the phrase offsite backup from one of their golf buddies, and thought it meant "have the IT staff take the backup home with them, in case there's a fire". Continuing with some variation of: "Besides, if we need something restored they can get it back faster than iron mountain"
The hours I've argued...
Re: (Score:2)
Re: (Score:2)
Not claiming they are perfect, just saying the not-so-well-thought-out "additional measures" are less than helpful, as a rule. :)
Re: (Score:2)
you'd VPN a few LTO5 tapes, wow, I would like to have such a nice internet connection....
Re: (Score:2)
Never understimate the bandwidth of a briefcase full of LTO tape. If it's encrypted, it should be absolutely no problem physically transporting the backups off site yourself.
Don't get me wrong, this guy is an idiot. But the fact that he had backup tapes on his person, in his car, is not evidence for that.
Transporting the key (Score:2)
If it's encrypted, it should be absolutely no problem physically transporting the backups off site yourself.
Which reduces it to a problem of securely transporting the key.
LTO can do it on the drive (Score:2)
And most of the big vendors and even many free software systems support key management. So no, it isn't very difficult. You just have to give a shit.
very hard to encrypt (Score:3)
Yeah, encrypting a backup tape might take another hour or two to configure... not at all reasonable overhead for 4.9 million patient records
Espionage? (Score:2)
What's the probability that someone breaks into your car and steals computer tapes?
Re:Espionage? (Score:4, Insightful)
What's the probability that someone breaks into your car and steals computer tapes?
Maybe not as high as an employee selling the tapes and claiming that they were stolen.
Re: (Score:2)
I had a similar thought. Highly suspicious.
Re: (Score:2)
Why would an employee that has access to the data steal the tapes and not make copies.Esp with all the attention even saying the tapes were stolen would cause. "Never attribute to malice that which is adequately explained by stupidity"
Re: (Score:3)
Re: (Score:3)
Depending on the environment, it is very easy to detect a copy operation. Due to the sensitive of the data we deal with, we have controls in place. Every time a drive is attached / detached from the server it is recorded. Internet connectivity is prohibited. ACLs on the servers prevent mounting remote file systems, and even if they could be mounted, the mount would be logged.
In my environment, it would be much easier to "lose" a backup tape than to simply copy the records. Of course, that is not entire
Re: (Score:2)
Any firm that doesn't have a chain of custody of tapes is failing ITIL 101.
For example, on premises, tapes should be either sitting in the silo, inserted in a tape safe [1], or in the blue containers with a seal on them waiting for the IM van.
Not rocket science here. It is disappointing seeing organizations not follow this.
[1]: Businesses need an on premise tape safe. This is less for security (since the safe should be located fairly near the data center, and behind locked doors), but for protection in c
Re: (Score:2)
maybe theirs do too. via... a car.
Re: (Score:2)
The only car that this kind of backup tapes belong in is an armoured one.
Re: (Score:2)
Who leaves their backup tapes in a car anyways?
People who work for niggardly companies or government agencies?
Re: (Score:2)
Re: (Score:2)
I'd say there's 99.9% chance that the thief didn't know what they were grabbing. Break a window, grab any bags or boxes you see and get out of there is how most operate. Of course, there's a 0.01% chance that the thief knows exactly what they were going after and has been casing the mark for weeks waiting for the right opportunity. And then there's a the overlap of maybe 10% that didn't know when they grabbed it but are completely away of it by now, either through media reports (not that the media should
Re: (Score:2)
I suppose, but who's going to steal tapes without knowing what's on them? Without more information it's hard to say, but it's a lot less likely that a smash and grab is going to be triggered by seeing tapes, unless the thief has some idea what's on them.
Laptops OTOH, I totally see how those would be stolen by somebody not knowing what's on them.
Re: (Score:2)
What's the probability that someone breaks into your car and steals computer tapes?
If they're sitting in plain view? Somebody busted my window to steal less than a dollar in change that was sitting in the center console. And that was in a car that was already missing the radio because of a previous break-in.
My professional opinion (Score:5, Informative)
It's very hard to encrypt a backup tape.
I think I speak for everyone when I say: Fuck you, no it's not. I don't have any problems encrypting my personal backups even though I have nothing more private to protect than porn. You people are supposed to be professionals. Telling people their data is safe because it would require "special hardware and software" to read the tapes is pathetic. Get your shit together, sir.
Re: (Score:2)
I worked on a networked backup and recovery system and in the 1.1 version of our product, we integrated encryption both of the data streams from remote systems, and of the data on the tape itself.
This was 10 years ago. If you bought recovery software from a competent vendor, it's not hard at all.
Re:My professional opinion (Score:5, Insightful)
Nail. Head. Hit.
"special hardware and software" gets me...
A LTO-5 drive and access to GNU tar or cpio is an alt-tab away for a number of IT people.
Re: (Score:2)
Sledgehammer. Head. Hit.
At least, that's how I'd like to react to an organization whom I'm paying (indirectly via my taxes) failing in their legal requirements to keep this data absolutely secret. And in a way that is obviously stupid: They had no business storing things unencrypted on a backup tape, and no business having their offsite backup solution be "stick it in the back of somebody's car". I'll put it this way - my organization deals with information far less important than that, and we treat our bac
Re: (Score:2)
require "special hardware and software" to read the tapes
Eh, technically it does. You could also say that a CD requires special hardware and software to read. It's just that the hardware and software in question is fairly easy to obtain...
Re: (Score:2)
HIPPA
Rule #1 of HIPAA: If you misspell it, you can't speak authoritatively about it.
/facepalm (Score:3)
Re: (Score:2)
After their competitor, CSC, walked off with a few billion from the UK in exchange for vapourware, saying that with a straight face would have been almost easy.
Encryption (Score:2)
Simplest process would be to just zip them up with 7-zip, split into archives the size of the tape and apply a password to it.
May not be the strongest security, but still better than nothing
Re: (Score:2)
Offsite backup (Score:3)
When we stored tapes at an offsite backup, they were picked up in a locked metal box by uniformed security guards who delivered them to their protected site. These days it has shifted to VPN. Never heard of just having tapes sitting in an employee's car. What was the offsite backup? A shoebox in his closet?
Re: (Score:2, Funny)
I used to work at a firm that sent the backup tapes home with the tech.
She stored them under her bed.
I told her that was a great place because if her husband ever came home early and found a strange man in the bedroom she could say he was just there to get a backup.
Re: (Score:2)
Raises hand. That's exactly what I did (offsite backup into shoebox in my closet). Of course the tapes were encrypted, it was 1987 and we were a small business with little sensitive data (still our customer DB was valuable, if only to competitors).
I interviewed with SAIC about 10 years ago. Let me say that the place reeked of stupid. I told them I had already found a job when they called back for second round.
Re: (Score:2)
I imagine SAIC has more then one location.
I chose unemployment over SAIC. Having sense met a number of former SAIC employees I am confident I made the correct choice.
really? (Score:2)
"It's very hard to encrypt a backup tape."'
Then encrypt the data, nimrod. These people actually get paid? Since when do they store HIPAA-related data and NOT encrypt it in the tables or wherever.
Exporting data to a nonencrypted anything is wrong. And backup tapes need not have raw data on them. Probably they shouldn't.
Re: (Score:2)
Since when do they store HIPAA-related data and NOT encrypt it in the tables or wherever.
When it is profitable to do so.
Criminal charges for HIPAA violations? (Score:2)
Who was responsible for transporting and losing unencrypted data with PHI in an unsecured environment? Should be jail time for the boss who approved this.
HIPPA Consequences? (Score:3)
So is SAIC going to be fined for their illegal (if unintentional) disclosure of patient medical records?
Ha ha! Almost got ya there, didn't I? Of course I know the answer already!
Re: (Score:2)
I doubt they will, but there have been recent fines handed out for HIPAA violations, so hopefully.
The only way that businesses will take this sort of thing seriously is if there are real fines and preferably prison time for the executives in charge of this mess.
Re: (Score:2)
Of course they can, there are plenty of ways of being compliant with the privacy regulations without having to be a huge organisation. The reason why we need actual enforcement and possible jail time is that without a pretty freaking huge stick, these companies aren't going to comply.
My information has been lost by at least a half dozen different companies in the last decades, nearly all of whom are required to take some pretty significant PII in order to do business with me. One of whom was a former employ
Really??? (Score:2)
The risk of harm to patients is judged to be low despite the data elements involved since retrieving the data on the tapes would require knowledge of and access to specific hardware and software and knowledge of the system and data structure.
I've worked with some weird systems before, but none so weird that I'd consider it that hard to get something off the tape. Even if the data structures are too strange to find everything, you might be able to link names with SSNs.
A few facts distilled from TFA (Score:2)
and a couple of questions.
For those who don't know, Tricare is the "health insurance" that pays for providing health care for members of the military and for those retired military members that pay premiums. However, I don't remember SAIC having any contractual role in administering the Tricare system. Perhaps they were contracted by DoD to perform some kind of historical data analysis, and authorized access on that basis... but the reports make Tricare out to be the party at fault, so that would imply that
Re: (Score:2)
It's gauche, but I'm gonna follow up to myself to ask the questions that came to mind.
Re:A few facts distilled from TFA (Score:4, Insightful)
Well if it's a strictly Government program HIPAA isn't its regulatory framework. They'd still have a requirement to protect Personally Identifiable Information under FISMA act of 2002 and OMB Memorandum 06-16 which came out after the VA lost their records. Among other things M06-16 requires you to encrypt senstivie data on mobile media and data in transit.
Re: (Score:2)
That's only 2
Ohio Plans To Encrypt After Data Breach (Score:2)
when something like this happen a few years ago!
http://it.slashdot.org/story/07/12/11/2144255/ohio-plans-to-encrypt-after-data-breach [slashdot.org]
Re: (Score:2)
Great. We just need to have it happen 49 more times and then the entire country might have gotten a clue and implemented something vaguely resembling proper security.
Hard to encrypt backup tapes? (Score:2)
Jail (Score:2)
Can you spell HIPAA? (Score:2)
For such important data, why not a bonded courier? (Score:2)
Geez!
Absolute BS on hard to encrypt the backup (Score:2)
Again? (Score:2)
Re: (Score:2)
consultant / contracts / sub contracts buck passin (Score:2)
consultant / contracts / sub contracts seem like buck passing. But let the new guy, intern handle holding the off site back up?
Why not at least give them to a permanent or more long term worker or where they to smart to take responsibility for the back ups. But the intern will do just about any thing to try to get a perm job.
Now just having some keep the off site in there home and or car is a poor place to cheap out. Now if you want them to take it to a safe off site place have them do as part of the work d
Oh shit, I RTFA! (Score:2)
the tapes were stolen from an SAIC employee's car during a burglary the night before.
What kind of idiot leaves tapes containing confidential data in a car, OVERNIGHT ? I wouldn't even leave a half-eaten sandwich in there overnight...
Gotta love government, contracting out to the biggest crooks and morons they can find.
I've worked with SAIC, I wasn't impressed (Score:2)
I had the misfortune of working with a consulting company who worked for a large oil and gas company doing water quality work. We were supposed to integrate with their EMIS application. First off it was only a month before the rollout that they contacted us to get some real life data. They had mindless inheirted off of air testing data and knew nothing about water testing. This is a marker of OOP newbies. They also didn't understand that the regulatory requirements changed with the seasons due to high flow/
Woohoo! (Score:2)
4.3 Million patents gone! Sayonara you innovation starving sunsabitches!
Wait, what?
Jesus.... (Score:2)
Tape backups are trivial to encrypt - the tape just stores data after all and doesn't care if you encrypted it before the tape sees it. Or turn on the encryption option and hope the vendor didn't screw it up.
Now of course once you have encrypted backups the encryption keys become very important. Losing them at the same time as you lose data you need restored (because you lost the machine where you kept them for one simple retarded scenario) puts you in a world of hurt - so there's some costs/benefits to con
They've obviously obfusticated the data, obviously (Score:2)
Retrieving the data on the tapes would require knowledge of and access to specific hardware and software and knowledge of the system and data structure
-Who wants to bet that all you need to pull the data out is something like: dd if=/dev/tape | strings, perhaps with conv=ascii given to dd... and maybe gunzip or bunzip2. Sigh. Specific hardware: tape drive and a scsi card. Software: any recent unix would do. Knowledge of data structure: they obviously Huffman-coded all their SQL dumps, right? Haha.
Re: (Score:2)
The fact that it's VMS is irrelevant I'd think. The fact that MUMPS is involved -- well, everything depends on whether they are taking some sort of a database snapshot, or a dump. If it's a dump, it'll be human readable. If it's a snapshot, I'd still expect it to use some sort of records with strings stored without further ado. Most uncompressed databases I've seen are readable once passed through strings, though data from each row is not necessarily contiguous. All in all, I don't doubt that anyone who car
Very Hard to Encrypt A Backup Tape? (Score:2)
And what the fuck were they doing in an employee's car, to begin with?
How many HIPAA violations does this incident constitute. At what point does SAIC lose their ability to do business with the US Government?
Re: (Score:3)
You really shouldn't insult Geek Squad like that.
that what they get hireing based on degrees (Score:2)
people who do stuff like this must of not done alot of tech work or did not go to a tech school.
CS will teach you theory and may some hands on stuff but a tech school will tech you about the right way to do safe back ups and the basic of data safety.
have back up tapes employee's car why? there has to be a better way to have a off site back up plan? if you want a employee to take it to off site place pay them (Time + miles) to do at the end of the day of a fixed time with NO OTHER WORK LOAD AT the same time.
Re:!surprised (Score:4, Informative)
SAIC's greatest FAILs:
Wow. The hits just keep coming...
Re: (Score:2)
Yeah, but they usually go to places like Iron Mountain via more or less secure transport for offsite storage. Why this guy actually had those tapes in his car is an entirely different issue, and probably one where convenience won out over proper procedure. Which is assuming that SAIC actually had a procedure, of course.
This does look like legitimate grounds for potential lawsuits: the fact that patient data needs to be secure is hardly an obscure set of laws and requirements.
As for the "require knowledge
Re: (Score:2)
I'm a SAIC employee and I manage the servers in our office. Corporate policies are that backups are to never leave the server room, much less the office. This policy was put into place a few years ago (along with desktop encryption) after some 401k data was taken from a stolen HR computer.
Re: (Score:2)
Corporate policies are that backups are to never leave the server room, much less the office.
And if there's some physical disaster (fire, flood, etc, etc)?
Re: (Score:2)
Although, even with my defending them above I have to ask... WTF was going on with tapes left alone in an employee's car? Most places use a data storage company to transfer and store tapes.
Also, Axway's Raley was either misquoted or she's an idiot. What is Tricare
Re: (Score:3)
I didn't see any mention of encryption in the PDF linked off of that quote either. Wonder where it came from?
Re: (Score:3)
Ah ha, it came from the second link rather than the PDF it appeared to be linked to. Come on guys, at least link silly quotes like that to the right article.
---- http://www.informationweek.com/news/healthcare/security-privacy/231700161 [informationweek.com]
Tricare did not indicate whether SAIC encrypted the information on the stolen tapes, but Raley said, "It's very hard to encrypt a backup tape." Tricare did not respond to a request for comment on the HIPAA issues.
---
Brilliant :(
Re: (Score:2)
Paper doesn't get lost en masse and it's harder to mine and manipulate on wholesale levels.
Right, it would be impossible for idiotic companies to make a photocopy of records for backup purposes, then lose them due to braindead handling.
Re: (Score:2)
Well, no. But 4.9 million at once? Stretching credence for paper.
Lookup 'dumpster diving'. (Score:2)
It was common. Likely before your time.
PHB's used to demand regular hard copies of detail that they would never read. Pulling them out of dumpsters was standard corporate espionage. I bet it still is.
Re: (Score:2)
Never underestimate the bandwidth of a station wagon full of tapes hurtling down the highway. [wikiquote.org]
and off into the sunset...
Re: (Score:2)
Especially if it's one of these [0-60mag.com].
I saw one of these on a business trip not long ago ... 500+ HP of performance station wagon. The mind reels.
There might not even be all that much latency at those speeds. ;-)
Re: (Score:2)
Europe has some pretty sweet wagons. Superior vehicle class for soccer moms vs. minivans and SUVs, I'd think.
Too bad the big 3 left a horrible fake wood-panelled taste in america's mouths.
Re: (Score:2)
So they catch fire if you feed them already encrypted data I take it?
Re: (Score:2)
Taking twice as long to do a backup is hardly catching fire.
Re: (Score:2)
Sure, if they're old Tandberg drive tapes, but LTO tapes are extremely reliable. Where I work we wouldn't dream of writing backups to anything else (not least because it would be expensive to match the 1.2TB capacity of each tape).
Re: (Score:2)
Upgrade? There's nothing to upgrade to... for backups, LTO tapes (1.2TB capacity per tape) are virtually the be all and end all. Magnetic platter disks are far too unreliable long term (or hell, even medium term) to trust this sort of data to, and sending the backup over the wire to an offsite location would be both prohibitively expensive and take too long (working in a hospital that handles this many records, our backups run to approximately 7TB per day).
The "wow" is in just how clueless you are as to a