Consultant hacks into sensitive files of FBI

by Eric M. Weiss Friday, Jul. 07, 2006 at 2:57 PM

Trust the government. The government can protect you from EVERYTHING!!!!!

WASHINGTON - A government consultant, using computer programs easily found on the Internet, managed to crack the FBI's classified computer system and gain the passwords of 38,000 employees, including that of FBI Director Robert Mueller.

The break-ins, which took place four times in 2004, gave the consultant access to records in the Witness Protection program and details on counterespionage activity, according to documents filed in U.S. District Court in Washington. As a direct result, the bureau said it was forced to temporarily shut down its network and commit thousands of man-hours and millions of dollars to ensure no sensitive information was lost or misused.

The government does not allege that the consultant, Joseph Thomas Colon, intended to harm national security. But prosecutors said Colon's "curiosity hacks" nonetheless exposed sensitive information.

Colon, 28, an employee of BAE Systems who was assigned to the FBI field office in Springfield, Ill., said in court filings that he used the passwords and other information to bypass bureaucratic obstacles and better help the FBI install its new computer system. He said agents in the Springfield office approved his actions.

The incident is only the latest in a long string of foul-ups, delays and embarrassments that have plagued the FBI as it tries to update its computer systems to better share tips and information. Its computer technology is frequently identified as one of the key obstacles to the bureau's attempt to sharpen its focus on intelligence and terrorism.

An FBI spokesman declined to discuss the specifics of the Colon case. But the spokesman, Paul Bresson, said the FBI has recently implemented a "comprehensive and proactive security program" that includes layered access controls and threat and vulnerability assessments. Beginning last year, all FBI employees and contractors have to undergo annual information security awareness training.

Colon pleaded guilty in March to four counts of intentionally accessing a computer while exceeding authorized access and obtaining information from any department of the United States. He could face up to 18 months in prison, according to the government's sentencing guidelines. He has lost his job with BAE Systems, and his top-secret clearance has also been revoked.

Colon was scheduled for sentencing Wednesday, but it was postponed until next week.

According to Colon's plea, he entered the system using the identity of an FBI special agent and used two computer hacking programs found on the Internet to get into one of the nation's most secret databases.

Colon used a program downloaded from the Internet to extract "hashes" - user names, encrypted passwords and other information - from the FBI's database. Then he used another program to "crack" the passwords by using dictionary word comparisons, lists of common passwords and character substitutions to figure out the plain text passwords. Both programs are widely available for free on the Internet.

What Colon did was hardly cutting-edge, said Joe Stewart, a senior researcher with Chicago-based security company LURHQ Corp. "It was pretty run-of-the-mill stuff five years ago," he said.