Incident: Data Breach at U.S. Customs and Border Protection Subcontractor

Published Date: 2019-06-10

Postmortem Analysis
Timeline 1. The software failure incident involving the compromise of photos of travelers happened in May 2019 as per the article published on June 10, 2019 [Article 85795].
System 1. Perceptics' company network security system [85795]
Responsible Organization 1. Perceptics [85795]
Impacted Organization 1. U.S. Customs and Border Protection officials were impacted by the software failure incident [85795].
Software Causes 1. The software cause of the failure incident was a "malicious cyberattack" that compromised photos of travelers, including faces and license plates, as part of an attack on a federal subcontractor [85795].
Non-software Causes 1. Lack of proper security measures in place to protect sensitive information like photos of travelers [85795] 2. Violation of security and privacy rules by transferring license plate and traveler images to the subcontractor's company network [85795]
Impacts 1. Photos of travelers, including faces and license plates, were compromised in a malicious cyberattack, impacting fewer than 100,000 people who crossed a single land border entry port over a month and a half [Article 85795]. 2. The stolen information did not include other identifying information, and no passport or other travel document photos were compromised [Article 85795]. 3. The breach raised concerns over the government's expanded surveillance measures potentially threatening constitutional rights and opening innocent people to identity theft [Article 85795]. 4. The breach highlighted the vulnerability of the government's database of identifying imagery, making it an attractive target for hackers and cybercriminals [Article 85795]. 5. The breach led to a violation of CBP's security and privacy rules as copies of license plate images and traveler images collected by CBP were transferred to the subcontractor's company network, which was then attacked and breached [Article 85795].
Preventions 1. Implementing stricter security measures and protocols to protect sensitive data such as facial images and license plate information [85795]. 2. Conducting regular security audits and assessments of subcontractors and third-party vendors to ensure compliance with security and privacy regulations [85795]. 3. Limiting access to sensitive data only to authorized personnel and ensuring that data is not transferred to external networks without proper encryption and security measures in place [85795]. 4. Enhancing employee training and awareness on cybersecurity best practices to prevent data breaches and unauthorized access to critical information [85795]. 5. Implementing a zero-trust security model where all users and devices are treated as potential threats and require verification before accessing any data or systems [85795].
Fixes 1. Implement stricter security measures to protect sensitive data, such as encrypting images and implementing multi-factor authentication [85795]. 2. Conduct a thorough investigation to identify the root cause of the breach and take corrective actions to prevent similar incidents in the future [85795]. 3. Enhance oversight and monitoring of subcontractors handling sensitive information to ensure compliance with security and privacy regulations [85795]. 4. Review and potentially revise the scope and purpose of data collection practices to minimize the risk of breaches and unauthorized access [85795].
References 1. U.S. Customs and Border Protection officials 2. The Register, a British technology news site 3. Perceptics representatives 4. CBP spokeswoman Jackie Wren 5. A U.S. official who spoke on condition of anonymity 6. Sen. Ron Wyden (D-Ore.) 7. Neema Singh Guliani, senior legislative counsel at the American Civil Liberties Union 8. The Washington Post's reporters 9. Rep. Bennie Thompson (D-Miss.) 10. The Government Accountability Office 11. Nick Miroff, Ellen Nakashima, and Tony Romm (contributors to the report)

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the breach of traveler photos at U.S. Customs and Border Protection (CBP) involved a subcontractor named Perceptics. The breach occurred when copies of "license plate images and traveler images collected by CBP" were transferred to the subcontractor's company network, violating CBP's security and privacy rules. The subcontractor's network was then attacked and breached [85795]. (b) The incident involving the breach of traveler photos at CBP raises concerns about the security and privacy of sensitive information collected by government agencies and their contractors. This incident highlights the risks associated with the government's expanding database of identifying imagery, making it an alluring target for hackers and cybercriminals. The breach at CBP comes at a time when the government is seeking to expand its face recognition apparatus and collection of sensitive information from travelers, including license plate information and social media identifiers [85795].
Phase (Design/Operation) design, operation (a) The software failure incident in the article is related to the design phase. The breach of traveler photos and license plates was a result of a "malicious cyberattack" on a federal subcontractor, Perceptics, which was involved in refining algorithms to match license plates with the faces of car occupants. This activity was outside of CBP's sanctioned use, indicating a failure due to contributing factors introduced by system development and procedures to operate the system [85795]. (b) The software failure incident is also related to the operation phase. The breach occurred because copies of license plate images and traveler images collected by CBP were transferred to the subcontractor's company network, violating the agency's security and privacy rules. This breach was a result of the operation or misuse of the system, where the subcontractor's network was attacked and breached, leading to the compromise of sensitive information [85795].
Boundary (Internal/External) within_system, outside_system The software failure incident reported in the articles can be categorized as both within_system and outside_system: (a) within_system: The breach involving the compromise of photos of travelers' faces and license plates was a result of a "malicious cyberattack" on a federal subcontractor, which led to the theft of image data transferred to the subcontractor's company network, violating CBP's security and privacy rules [85795]. (b) outside_system: The breach was facilitated by the subcontractor, Perceptics, attempting to use the stolen data to refine its algorithms to match license plates with the faces of a car's occupants, which was outside of CBP's sanctioned use. This indicates that the breach was also influenced by factors originating from outside the system, involving the actions of the subcontractor [85795].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case was primarily due to non-human actions, specifically a "malicious cyberattack" on a federal subcontractor that compromised photos of travelers, including faces and license plates, used by the U.S. Customs and Border Protection (CBP) for their facial recognition program [85795]. (b) Human actions also played a role in the incident as it was mentioned that the subcontractor's network was attacked and breached after copies of license plate and traveler images collected by CBP were transferred to the subcontractor's company network, violating the agency's security and privacy rules [85795]. Additionally, there were concerns raised about the subcontractor, Perceptics, attempting to use the stolen data to refine its algorithms for matching license plates with faces, which was outside of CBP's sanctioned use [85795].
Dimension (Hardware/Software) software (a) The software failure incident reported in the articles is primarily related to a breach in security and privacy due to a cyberattack on a federal subcontractor, leading to the compromise of photos of travelers, including their faces and license plates [85795]. This breach was a result of a malicious cyberattack on the subcontractor's network, violating the agency's security and privacy rules [85795]. (b) The incident also involves software-related factors as the breach occurred through the transfer of "license plate images and traveler images collected by CBP" to the subcontractor's company network, which violated the agency's security and privacy rules [85795]. Additionally, the breach involved the misuse of data by the subcontractor to refine algorithms for matching license plates with the faces of car occupants, which was outside of CBP's sanctioned use [85795].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident reported in Article 85795 was malicious in nature. The incident involved a "malicious cyberattack" on a federal subcontractor that compromised photos of travelers, including their faces and license plates. The breach was described as a "major incident" and involved the theft of data by a third party with the intent to refine algorithms for unauthorized purposes, such as matching license plates with the faces of car occupants. The breach was not attributed to a foreign nation but was a deliberate attack on the system [85795].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions The intent of the software failure incident can be categorized as both poor_decisions and accidental_decisions based on the information provided in the articles. 1. Poor Decisions: The incident involved a breach of photos of travelers due to a "malicious cyberattack" on a federal subcontractor, leading to the compromise of images including faces and license plates [85795]. The breach occurred as the subcontractor's network was attacked and breached after copies of license plate and traveler images collected by CBP were transferred to the subcontractor's company network, violating security and privacy rules [85795]. Additionally, there were concerns that the subcontractor, Perceptics, was attempting to use the stolen data to refine its algorithms to match license plates with the faces of a car's occupants, which was outside of CBP's sanctioned use [85795]. 2. Accidental Decisions: The breach was not intentional but resulted from the subcontractor's network being attacked after the transfer of images, violating security and privacy rules [85795]. The breach was described as a "major incident" within CBP, indicating that it was not a planned event [85795]. Additionally, the breach did not involve a foreign nation but was a result of the subcontractor's actions [85795]. Therefore, the software failure incident involved poor decisions in terms of data handling and potential misuse of the stolen data by the subcontractor, as well as accidental decisions leading to the breach due to inadequate security measures and violations of privacy rules.
Capability (Incompetence/Accidental) accidental (a) The software failure incident in the article was not directly attributed to development incompetence. The breach of traveler photos and license plates was a result of a malicious cyberattack on a federal subcontractor, leading to the compromise of sensitive information. The incident involved the transfer of "license plate images and traveler images collected by CBP" to the subcontractor's company network, which violated the agency's security and privacy rules [85795]. (b) The software failure incident in the article was accidental in nature. The breach of traveler photos and license plates occurred as a result of a cyberattack on a federal subcontractor's network, which was not intended or caused by the development incompetence of individuals or organizations. The breach was described as a "major incident" within CBP, and the stolen information was not identified on the Dark Web or Internet initially [85795].
Duration temporary The software failure incident reported in the articles is temporary. The breach of photos of travelers, including faces and license plates, was a result of a "malicious cyberattack" on a federal subcontractor [85795]. The breach was discovered on May 31, and the stolen information did not include other identifying information beyond the compromised photos. Additionally, the breach did not involve a foreign nation and was not a permanent failure but rather a specific incident caused by the cyberattack on the subcontractor's network.
Behaviour crash, omission, other (a) crash: The software failure incident in the article can be categorized as a crash. The breach involved the compromise of photos of travelers due to a "malicious cyberattack" on a federal subcontractor's network, resulting in the system losing its state and not performing its intended function of securely storing and protecting the images [Article 85795]. (b) omission: The incident can also be categorized as an omission. The breach occurred because copies of "license plate images and traveler images collected by CBP" were transferred to the subcontractor's company network, violating security and privacy rules, which led to the system omitting its intended function of safeguarding the sensitive data [Article 85795]. (c) timing: There is no indication in the article that the software failure incident was related to timing issues. (d) value: The incident does not align with a failure due to the system performing its intended functions incorrectly. (e) byzantine: The incident does not align with a failure due to the system behaving erroneously with inconsistent responses and interactions. (f) other: The behavior of the software failure incident in the article can be further described as a breach of security protocols leading to unauthorized access and compromise of sensitive data, which is a critical aspect of the incident not covered by the options provided.

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving the breach of photos of travelers' faces and license plates resulted in the compromise of sensitive information. The breach led to the theft of images collected by CBP, including license plate images and traveler images, which were transferred to the subcontractor's company network, violating security and privacy rules. This breach impacted the property of individuals as their personal data was compromised [85795].
Domain government The software failure incident reported in the news article [85795] is related to the government industry. The incident involved a breach of photos of travelers by a federal subcontractor working with the U.S. Customs and Border Protection (CBP). The compromised images included photos of people's faces and license plates, which were part of the CBP's surveillance efforts at airports and land border crossings for their facial recognition program. The breach raised concerns over privacy and surveillance measures by federal agencies, highlighting the importance of protecting sensitive information collected by the government. The breach also led to discussions in Congress about the potential threats to constitutional rights and the need for stricter data protection measures in government contracts with private companies.

Sources

Back to List