« Greetings, New Readers? | Main | Left Deploys the Googlebomb »

Hacking Hatch

It appears that a Republican staffer hacked into the files of Democratic committee members in order to leak confidential documents on the Democrat's judicial confirmation strategies.

The majority of my training in systems administration came from the time I spent working in the U.S. Senate, so I'm watching this with interest. None of the stories I've found so far have the technical details of how this was done, so I can't sensibly comment. All I can say is that the sysadmins in the Senate were normally working hard at a difficult job, and I'd not be surprised if someone made a network share accessible that they shouldn't have.

(Yes, that wouldn't excuse a staffer who leaked the memos instead of alerting the SA that security was compromised. And it might have been deliberate 'hacking,' in the sense of an actual stolen password or trojan horse or something. I don't see it as likely, and my immediate if uninformed guess would be that someone took advantage of a barn door left open.)

If this happened because some non-partisan SA was negligent, my heart really goes out to him...

UPDATE: An astute commentator pointed me to this Opinion Journal article.

A statement put out last week by Mr. Hatch's office says that the accused staffer "improperly accessed at least some of the documents referenced in the media reports." That accusation bears scrutiny in light of how the committee's computer system is organized: Until Nov. 16, all Judiciary staffers used the same computer server and had access to a shared drive, a system put in place when Sen. Leahy took over as chairman in 2001 and hired his own IT staff.

The Leahy techies neglected to put up a firewall between the GOP and Democratic staff, making it possible for all staffers to read everything posted on the shared drive. No one hacked into anyone's private files. These are, in effect, Leahy leaks.

So why is the hapless staffer being hounded? And why is no one reporting the much bigger story of the memos?

Now this I buy. I don't know much about Senate committee IT staffing, but it sounds a lot more plausible. The term 'firewall' seems rather odd there, implying it might have been one server and two networks, but this sounds a lot more like a garden variety leak: someone left information in a ludicrous place, and someone else (acting unethically) gave it to a third party to publish. And I'm betting some poor SA takes the blame at some point.

As for the Opinion Journalist's question about why no one is paying attention to the 'bigger question' of the memos? It's not that big a deal. The fact that a Democratic staffer might have stated "most of Bush's nominees are nazis" is not great news, though it's tacky. (One does wonder if the staffer who wrote that will get similar castigation to Trent Lott.) The memos themselves are a pretty damning indication that Washington politics are crass, and delaying a nomination in order to specifically affect the outcome of a court case doesn't pass the stink test. But I don't think there's anything in the memos that surprises me. (For what it's worth, you can find the memos here.)

But then again, if the 'hacking' amounts to someone cutting and pasting files off a badly-secured server, I doubt this goes down in the annals of the great leaks of the Senate, either.


TrackBack URL for this entry:


check out http://www.opinionjournal.com/editorial/feature.html?id=110004370
First off, my guess is that 'firewall' should actually be read as permissions, and that the writer simply does not understand the finer distinctions of computer terminology Secondly, I don't really have time to do actual research (and shame on you A. for blogging when you should be studying, although since we are in the same class, feel free to keep doing it :-), but, this does seem illegal to me. This statute seems like one that might apply. Whoever (2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains-- (B) information from any department or agency of the United States; and (e)(6) the term "exceeds authorized access" means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter; So it seems to come down to what the definition of 'entitled' is.
It might be a crime (indeed, I think it is): but it's not hacking. ;) All I was saying. And yeah, I think you're likely right that she means 'permissions,' but I figured I ought to point out the possibility.
A. Rickey, you're more of a dork than i am, and i'm in the engineering school
how do i hack msn display pictures?

Post a comment

NOTICE TO SPAMMERS, COMMENT ROBOTS, TRACKBACK SPAMMERS AND OTHER NON-HUMAN VISITORS: No comment or trackback left via a robot is ever welcome at Three Years of Hell. Your interference imposes significant costs upon me and my legitimate users. The owner, user or affiliate who advertises using non-human visitors and leaves a comment or trackback on this site therefore agrees to the following: (a) they will pay fifty cents (US$0.50) to Anthony Rickey (hereinafter, the "Host") for every spam trackback or comment processed through any blogs hosted on threeyearsofhell.com, morgrave.com or housevirgo.com, irrespective of whether that comment or trackback is actually posted on the publicly-accessible site, such fees to cover Host's costs of hosting and bandwidth, time in tending to your comment or trackback and costs of enforcement; (b) if such comment or trackback is published on the publicly-accessible site, an additional fee of one dollar (US$1.00) per day per URL included in the comment or trackback for every day the comment or trackback remains publicly available, such fee to represent the value of publicity and search-engine placement advantages.

Giving The Devil His Due

Choose Stylesheet

What I'm Reading

D.C. Noir

My city. But darker.
A Clockwork Orange

About time I read this...


Projects I've Been Involved With

A Round-the-World Travel Blog: Devil May Care (A new round-the-world travel blog, co-written with my wife)
Parents for Inclusive Education (From my Clinic)

Syndicated from other sites

The Columbia Continuum
Other Blogs by CLS students

De Novo
Theory and Practice
Liberal Federalism?
Good News, No Foolin'

Nancy Pelosi covers her head and visits the head of John the Baptist.
Vlogging in from Austin.
Omikase/"American Idol"

Jeremy Blachman's Weblog: 2007
Happy Passover
Looking for Advice re: LA
Google Books

Stay of Execution
What I've Learned From This Blog, or My Yellow Underpants
The End
Mid Thirties

Legal Theory Blog
Program Announcement: Summer Programs on the Constitution at George Washington
Book Announement: Political Foundations of Judicial Supremacy by Whittington
Entry Level Hiring Report

The Volokh Conspiracy
Making the Daily Show:
Civil unions pass New Hampshire House:
Profile of Yale Law Dean Harold Koh:

Crescat Sententia
Hillary II
Politics and Principal/Agents

Law Dork
Election Approaches
Following Lewis
New Jersey High Court: 'Same Rights and Benefits'

Surveying the revival
Birds of paradise

Half the Sins of Mankind
Cheney Has Spoken Religious conservatives who may ...
Does Ahmadinejad Know Christianity Better Than MSN...
Borders as Genocide In discussions of climate chan...

For lovers of garden gnomes...and any China-freaks out there
We Interrupt Your Regularly Scheduled Programming

Does SOX explain the flight from NY?
More Litvak on SOX effect on cross-listed firms
What did the market learn from internal controls reporting?

The Yin Blog
Iowa City = Riyadh
Jeffrey Rosen's "The Supreme Court"
Geek alert -- who would win between Battlestar Galactica and the U.S.S. Enterprise?

Letters of Marque
And there we are

Signing Off

Dark Bilious Vapors
Jim (The Waco Kid): Where you headed, cowboy?
Bart: Nowhere special.
Jim: Nowhere special. I always wanted to go there.
Bart: Come on.
--"Blazing Saddles"

Technical Difficulties... please stand by....
The Onion should have gotten a patent first....

Legal Ethics Forum
Interesting new Expert DQ case
Decency, Due Care, and The Yoo-Delahunty Memorandum
Thinking About the Fired U.S. Attorneys

Ex Post
Student Symposium- Chicago!
More Hmong - Now at Law School
Good Samaritan Laws: Good For America?

Appellate Law & Practice
Those turned over documents
CA1: courts can’t help people acquitted of crimes purge the taint of acquitted conduct
CA1: restrictions on chain liquor stores in Rhode Island are STILL okay

the imbroglio
High schoolers turn in plagiarism screeners for copyright infringement
Paris to offer 20,600 bikes at 1,450 stations to rent by the end of the year

The Republic of T.
The Secret of the Snack Attack
links for 2007-04-04
Where You Link is What You Get

Distractions for stressed law students

The Other Side: Twisted AnimationsSomething Positive, a truly good webcomic

Syndicate This Site



Stop Spam Harvesters, Join Project Honey Pot