Posted on 12/23/2013 4:22:31 AM PST by Cincinatus' Wife
Christmas shoppers were stunned to learn last Thursday that computer hackers had made off with the names and other personal info of some 40 million Target customers. Some of the pilfered information is reportedly being sold on the black market, prompting JP Morgan Chase to limit purchases and cash withdrawals on debit cards owned by recent Target shoppers.
But at least Target informed its customers of the security breach, as it is required by federal law to do. HealthCare.gov faces no such requirement; it need never notify customers that their personal information has been hacked or possibly compromised. The Department of Health and Human Services was specifically asked to include a notification requirement in the rules it designed for the health-care exchanges, but HHS declined.
The Federal Register tells the tale about what happened on March 27, 2012, at a meeting on the issue.
At that meeting, two commenters asked HHS to ensure the exchanges would promptly notify affected enrollees in the event of a data breach or unauthorized access to the exchanges databases. One commenter suggested that a full investigation be launched each time such a breach occurred, with the goal of holding hackers legally and financially accountable for breaking into the website.
According to a report by the group Watchdog.org, HHS responded: We do not plan to include the specific notification procedures in the final rule. Consistent with this approach, we do not include specific policies for investigation of data breaches in this final rule. In other words, the government doesnt have to tell you about a security breach unless it decides it wants to despite the fact that private companies are required to publicly disclose any incidents. State laws also require many of the 14 state-run insurance exchanges to disclose such information, but no such law exists for the federally run exchange, which 36 states rely upon.
The Watchdog report notes that its through state laws that weve learned the most about security problems in the exchanges. In September, the Minneapolis Star Tribune reported that an official at MNsure, the states new online health insurance exchange, acknowledged it had mishandled private data. A Minnesota insurance broker received an e-mail containing a trove of confidential information on more than 2,400 people, including their Social Security numbers and business addresses. A staffer at MNsure had accidentally sent the e-mail to him. The more I thought about it, the more troubled I was, Jim Koester, the recipient of the data, told the Star Tribune. What if this had fallen into the wrong hands? Its scary.
Last July, Dave Jones, Californias insurance commissioner and a Democrat, expressed his concerns about inadequate security processes on his states exchange, one of the better-run ones. If unscrupulous people get hold of Social Security numbers, health records, or other private information of consumers we can have a real disaster on our hands, Jones told the AP. He has declined further comment since then.
In Florida, GOP governor Rick Scott is troubled that privacy guidelines will be ignored in the rush to try to enroll his states 3.5 million uninsured residents. He wrote to Congress this fall expressing worry that the thousands of navigators hired by private groups posed a possible security threat, given that they undergo no federal background checks: As the push for navigators to sign up Floridians on the federal health insurance exchange becomes more frenzied, the need to safeguard the personal information Floridians submit to the navigators, and its use in a federal data hub, is taking on paramount importance. The workers the federal government hired to conduct the 2010 census were fingerprinted and underwent background checks. Not so the Obamacare navigators.
Its not as if the Obama administration wasnt notified of security concerns about its website. MITRE Corporation, an HHS contractor, alerted the agency that 19 unaddressed security vulnerabilities plagued the website before its launch on October 1. Last week, Teresa Fryer, the chief information-security officer for the Centers for Medicare and Medicaid Services (CMS), told the House Oversight Committee that she recommended that HealthCare.gov not launch on October 1 because of serious security concerns. My evaluation of this was a high risk, she told the committee in a private interview. Tony Trenkle, the project manager for the website, declined along with Fryer to sign the Authority to Operate (ATO) license needed to launch the site, which is why it had to be signed by Marilyn Tavenner, the political appointee in charge of CMS. Trenkle retired on November 13 and has declined to talk with reporters. But Fryer said her own concerns about security remain unaddressed because there have been two high findings of risk the most serious warning level in tests conducted in just the past few weeks. A CMS spokesman says both problems have been resolved.
Few cyber-security experts I spoke with for this article have much confidence that the government will quickly or competently reveal any security breaches on HealthCare.gov. On October 30, HHS Secretary Kathleen Sebelius testified under oath before Congress that no senior official reporting to me ever advised me that we should delay the launch of the website. But Fryer told the House committee that she had personally briefed Sebeliuss top aides on her findings on September 20, ten days before the site launched. While it may be true that Fryer and Trinkle dont report directly to Sebelius, they both declined to sign off on the ATO needed to launch the site. At best, Sebelius has demonstrated a complete inability to follow or manage the security crisis, though its her responsibility to do so.
According to Bruce Webster, a consultant who has advised companies for 40 years on IT issues, the administrations policy appears to be security through obscurity, a largely discredited approach. He told me:
They do not want to talk about their security measures; they do not want to talk about their security breaches; they do not want to inform affected citizens of compromised personal information. Their attitude reminds me of Lily Tomlins character Ernestine as an AT&T operator back when AT&T had a monopoly: We dont care. We dont have to. Were the phone company.
Congresswoman Diane Black, a Tennessee Republican, is fed up with the obfuscation and evasion surrounding HealthCare.gov. She has introduced the Federal Data Breach Notification Act, which would require that the Federal Trade Commission notify anyone whose personal information has been jeopardized. The federal government imposes these same rules on the private sector, yet they have gone out of their way to avoid imposing this basic diligence on their own Obamacare exchange, she told me.
If the House and Senate have any basic concern for the privacy rights of Americans, they will catapult her bill onto President Obamas desk ASAP. It is horrible news that Targets security vulnerabilities allowed hackers to filch the names and personal information of customers. But it will be even worse if the federal government can continue to keep people in the dark about its own security breaches, leaving many Americans with big, fat targets on their backs for identity thieves.
A plan to create the world's largest single civilian computer system linking all parts of the National Health Service is to be abandoned by the Government after running up billions of pounds in bills. Ministers are expected to announce next month that they are scrapping a central part of the much-delayed and hugely controversial 10-year National Programme for IT.We have not yet spent a billion so we have a ways to go.....basically the article is like looking into the future of Obummercare, but I didn't see much of this story on this side of the pond. This is published Aug 2011.
Pffft. There is always recourse. God Himself designed that way. Just sometimes its not as easy as we’d like it to be. The founders handed off a great system to us, and despite the damage, much of it is still working. It’s not our job to just give up and go home. There’s no future in that. Our best bet is to keep on fighting with the tools we still have. Don’t ever get tired of doing the right thing.
Not necessarily. IRS would be in a different domain and will be behind it’s own firewall. Depending on the structure that is in place (and I expect there is PRECIOUS LITTLE) and the security on that transfer, I bet not a lot can happen to get into the IRS. From what I understand, the IRS actually DOES have good security IT people.
May you be correct Laz. Have to wonder why, if is a link at the healthcare site, why was put there at the healthcare site. I may go to email later to talk with you. Have been noticing something else along the lines of what is going on. Maybe is nothing and will make a decision later, if I have your permission to go to email with additional thoughts.
Not to worry - at some point when they need money you will be "deemed enrolled" and the Social Security Administration will transfer your info directly to the hackers. :)
Laz, am going to go ahead and mention something here, in the open. Have been noticing certain things regarding some virus protections going off. Don’t know how good security is at the IRS but if they do not have alarm bells when this happens where virus protection and firewalls go off, then we are had.
But they won't be the average 'hooligans'. They'll be tech savvy, they will know what they are looking for, and they'll know how to use it when they get it. Just another phase of The Looting of America, up close and personal...
You always ‘have permission’ to mail me. LOL!
Another point Laz. If the protection does go offline or is taken offline, it is too late, they are in. The reason I say this is ... once in for even a brief second ... the seed is planted and then all is done and the downloads begin even if rebooted, from as best as I understand ... Have any reassurances?
Too late Laz ... LOL ... went public.
Their website design is so incompetent that it probably cannot detect the number and scope of intrusions.
I cannot go into it, because I’d be compromising (by association) the place where I *DO* work, but I promise ya, the security is a LOT deeper than ‘alarm bells’ going off when a virus hits. (smile)
You gotta trust me here. Us guys are good. REAL good.
No way should Healthcare.gov hacking incidents be disclosed.
The Feds have to keep stuff like this secret in the interests of national security.
I trust you Laz. Don’t trust anyone else in government though.
Laz, I said you were in the government. Technically that is correct but, I think I just insulted you because you are not in the present government that is attempting to harm Americans. My apology Laz, my fellow government person against the government people in charge.
and btw ... Merry Christmas Laz! If you are up my way, come to dinner around 5 p.m. Wednesday. Would love to have you here. Will give you directions or look me up on maps.
oh and if you get lost ... I hope you still have my number. If not just email me again for the number.
I am committed to the mission of the group I am affiliated with, and it is one of the VERY few Federal Agencies that actually commands respect and has an honorable mission. It has a 75% positive rating as lately as October of 2013. There is a reason for that: They stick to the SCIENCE and (mostly) avoid the politics. If that changes, I leave.
I wouldn’t work in most of the government. This one is damned honorable. I’ll send you private freepmail on which one it is and why I respect them.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.