NPR has this story:
The hacktivist group Anonymous is at it again. This time, it has humiliated an Internet security firm that threatened to out the group's hierarchy.
If you remember, Anonymous has been in the news, first, because in support of WikiLeaks, it undertook cyberattacks that brought down the websites of Visa and Mastercard. Second, because it brought down the sites of some government entities in Egypt and helped the anti-government protesters with technical help. Third, because as NPR's Martin Kaste reported, the FBI is hot on the group's heels.
Today, the website ArsTechnica ran a piece that details how Anonymous methodically went after HBGary Federal's digital infrastructure. Earlier this month, HBGary Federal's CEO Aaron Barr said the company, which specializes in analyzing vulnerabilities in computer security for companies and even some government agencies, had undertaken an investigation of Anonymous and had used social media to unmask the group's most important people.
Barr said an HBGary representative was set to give a presentation at a security conference in San Francisco, but as soon as Anonymous got wind of their plans, it hacked into HBGary's servers, rifled through their e-mails and published them to the web. The group defaced HBGary's website and published the user registration database of another site owned by Greg Hoglund, owner of HBGary.
Amazingly, reports ArsTechnica, Anonymous managed all this by exploiting, easy and everyday security flaws. ...
If even professional security firms are this vulnerable, I hate to think what will happen when the cyber war really starts.
Clearly, except for a tiny minority of super-conscientious experts, humans aren't capable of maintaining the level of knowledge and especially discipline necessary to keep the computers they operate reliably secure. On several occasions, I've seen hilarious instances of super-smart people with advanced degrees in computing, some of them even security experts, leaving their machines or data wide open to intrusion by some petty accidental oversight.
This isn't limited to computers, of course. For example, Richard Feynman's stories of his hobbyist safe-cracking provide some amusing examples from a previous era. The only way to force people to maintain discipline in security are the old-fashioned military methods, but this requires draconian penalties (up to and including death penalty) for petty negligence.
On the other hand, it can be argued that most people's negligence in computer security is quite rational, in that additional marginal benefit from added security effort wouldn't be worth the (internalized) cost. See e.g. C. Herley, "So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users." (Ungated link here.)
My father used to do work for a company that made him change his password every two weeks and wouldn't let him reuse any of the last ten passwords he used. As a result, he resorted to writing down the password and taping it to his laptop so he could remember what the current password was - and made a point of it to the IT department.