Were alleged Russian spies undone by technology problems?

Password security needed improvement, too

What's Russian for "geek?" The recently busted alleged Russian spy ring apparently was in serious need of tech support, according to published reports.

Their problems included misconfigured wireless networks, users writing passwords on slips of paper and laptop help desk issues, wrote reporter Tim Greene in Network World.

"One of the most glaring errors made by one of the spy defendants was leaving an imposing 27-character password written on a piece of paper that law enforcement officers found while searching a suspect's home," Greene reported. "They used the password to crack open a treasure trove of more than 100 text files containing covert messages used to further the investigation."

The password gave investigators access to the alleged spies' steganography program, a sophisticated technology used to hide messages in digital files and retrieve them over the Web. Using steganography, for example, a spy could embed classified information in the digital code of a .jpg and post it on a blog. Any changes to the image that the hidden code caused would be nearly unnoticeable, and someone with the right decoder could download the picture and extract it.

The suspected spies also apparently had recurring problems with laptops that froze during file transfer, and wireless networks they could never get configured correctly, Greene reported.

The steganography software the spies used was apparently outdated, and that, even aside from the written-down password, might have led to their exposure, according to Sally Adee, writing in DiscoveryNews.

The alleged spies used older software that leaves detectable traces, Adee wrote. "Instead of leaving behind an artifact of your wrong-doing for the Justice Department to download, new stego programs use ephemeral channels that disappear when the communication has been completed," she reported. "It's called network steganography. You can do it in real time, you can transmit huge amounts of data, and you can do it without leaving behind any artifacts to implicate you."

About the Author

Technology journalist Michael Hardy is a former FCW editor.

Featured

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

  • FCW Illustration.  Original Images: Shutterstock, Airbnb

    Should federal contracting be more like Airbnb?

    Steve Kelman believes a lighter touch and a bit more trust could transform today's compliance culture.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.