TJX Fires Employee For Disclosing Vulnerability 217
I Don't Believe in Imaginary Property writes "A TJX employee was fired for an online post mentioning that TJX hasn't beefed up security after the recent, massive data breach that saw 94 million credit card numbers copied by criminals and money from their accounts stolen. The employee mentioned that, at first, their usernames were the same as their passwords. After they required stronger passwords, some managers complained, so they 'compromised' by allowing blank passwords. The whistleblower said he discussed his concerns with management, but that it was like talking to a brick wall. In spite of the weak internal security, TJX now has a firm that scours the internet to find bad things posted about them, which is how they found the message and fired him for it. Too bad they don't appear to have hired anyone to beef up operational security or to convince people to use strong passwords."
um duh (Score:3, Insightful)
RTFA (Score:5, Informative)
Re:RTFA (Score:5, Informative)
http://ha.ckers.org/blog/20080522/tjx-whistle-blower/ [ckers.org]
At least it'll be harder to get your IP from a foreign company.
Re:RTFA (Score:5, Interesting)
He should fixate on this and sue them.
Re:RTFA (Score:5, Insightful)
Re:RTFA (Score:5, Insightful)
Trouble is, due to their own well-documented incompetence in security, they'd have a pretty good chance to claim they simply didn't know it was illegal.
Re:RTFA (Score:5, Insightful)
Re:RTFA (Score:5, Insightful)
Re:RTFA (Score:4, Interesting)
P.S. I am not an attorney. Do not take this as valid legal advice.
Re: (Score:3, Interesting)
Re:RTFA (Score:5, Interesting)
I concede that IANAL, so of course, I could be wrong, however the courts have already ruled that blogs and other web based news sites qualify under protections provided to the media.
Re: (Score:2, Interesting)
Re:RTFA (Score:5, Informative)
Re: (Score:3, Insightful)
It also makes me wonder what laws TJX may have broken trying to get that information.
Re:um duh (Score:5, Insightful)
Anyone remember Nixon... and a few others.
-- sig.com not found post halted
I think there are laws. . . (Score:5, Insightful)
The thing I'm puzzled about is, I thought that the electronic payment networks (MasterCard, Visa, Discover, Amex, etc) had very specific requirements for data security, including audits, which filter down to merchants (I realize that merchants don't generally do business directly with the networks [unless, maybe, they're Walmart or Sears], and instead go through intermediate companies that 'resell' the network services, but I thought the security requirements, and audit regimen, bubble down through the whole hierarchy?)
Re:I think there are laws. . . (Score:5, Informative)
Re:I think there are laws. . . (Score:5, Insightful)
Apparently PCI Compliance doesn't allow for input from the "little people" -- or would someone care to post a link that allows for submitting information to them?
Re: (Score:3, Interesting)
And who would the "proper authority" be in this case? His management doesn't care.
That would be the point. There isn't a "proper authority" because the company isn't doing anything illegal. If, on the other hand, the company is doing something illegal, surely the "proper authority" would be fairly clear? I'm not sure why everyone seems to be defending this guy and jumping on the "whistleblower" bandwagon. How can you expect to post sensitive security details about your company to an internet forum and not lose your job? Regardless of how dumb the company is, this employee isn't the
Re:I think there are laws. . . (Score:4, Insightful)
Neither set of laws will keep you from getting fired for coming back from lunch 3 minutes late.
If your company wants a reason to fire you, unless you're perfect, they'll find one.
Re:I think there are laws. . . (Score:4, Interesting)
Has anyone else been 3 minutes late and not fired? what does your policy say?
The courts are suspicious of those kind of amazing coincidence.
Even if you are 'perfect' they can find one, no doubt. That doesn't mean you don't have recourse.
Re: (Score:3, Insightful)
Shoddy security may be stupid but I don't know if it's illegal or not.
It probably is illegal, because it's probably fraudulent, not least if you make any kind of claims to being at all concerned about security and then knowingly put into place bad policies like allowing blank passwords. I mean, even if you're a total idiot you can see how that's a bad thing. You've got a secret club, right? And someone comes up and your bouncer says "what's da passwoid?" and he says nothing, and the bouncer says "okay come in den". I mean that makes no sense to anyone, right? So blank passw
Re:I think there are laws. . . (Score:4, Informative)
I think you've pretty much got to the root of the problem there: if this behaviour isn't criminally negligent, it should be. In a world where identity theft is one of the fastest growing (and most damaging) crimes in town, dealing with a business that has previously shown itself to be incompetent in handling personal data and is actively avoiding improving the situation, it's time to start throwing the directors in jail.
Re: (Score:3, Insightful)
Re:I think there are laws. . . (Score:5, Insightful)
As a Public Company, TJX is subject to Sarbanes Oaxley.
Section 302 demands the certification of Internal Control on Financial data. With such shoddy password system I fail to see how they can comply with it.
Section 404 demands management to assess risk and solve it
Section 802 accrues criminal penalties for violations to Sarbanes Oaxley and (TADAM!!!)
Section 1107 accrues criminal penalties for retaliations against whistleblowers.
I think this guy should get hold of Section 1107 and run it for all it is worth!!!!
From Wikipedia:
http://en.wikipedia.org/wiki/Sarbanes-Oxley_Act [wikipedia.org]
" Whoever knowingly, with the intent to retaliate, takes any action harmful to any person, including interference with the lawful employment or livelihood of any person, for providing to a law enforcement officer any truthful information relating to the commission or possible commission of any federal offence, shall be fined under this title, imprisoned not more than 10 years, or both.
My 2 cents
Re: (Score:3, Informative)
Ask me how I know... ClamAV and I have become more familiar than I ever thought possible.
Re: (Score:3, Informative)
https://www.pcisecuritystandards.org/tech/ [pcisecuritystandards.org]
which is funny, I used to work upgrading old credit card systems for the pci dss, the scuttlebut at the time was that TJX was the REASON for implementing the DSS in the first place. TJX ought to have the Credit Co.s run a train on 'em for this shit.
I was about to say... (Score:5, Informative)
Re:I was about to say... (Score:5, Informative)
Re:I was about to say... (Score:4, Funny)
Re: (Score:3, Insightful)
The problem is when they take the third dollar from your two-dollar account, you default on the "bad debt", and then you can't get a mortgage for several years because you're a "credit risk".
Re:I was about to say... (Score:5, Funny)
My wife once had her credit card stolen (physically stolen). We got the CC bill a week later.
"Honey, look! The bill's $700 cheaper than last month!"
Now I go out with her when she decides to buy something.
Re: (Score:3, Funny)
Yea, everyone around here agrees that she's a pretty good lay.
Re:I was about to say... (Score:4, Interesting)
Sad State of Affairs (Score:3, Insightful)
Re: (Score:3, Interesting)
Re: (Score:3, Insightful)
Re:Sad State of Affairs (Score:5, Insightful)
Good managers understand this and realize that spending that much money on protecting something that's really not very important to the company (customer identities) is just not good business. Until people start hearing on the nightly news that "TJMaxx gave your credit information to terrorists who used it to buy nuclear weapons and assassinate Jesus," the negative publicity they'll suffer is negligible.
Re: (Score:3, Insightful)
It might be easier to convince an alligator to voluntarily become a vegetarian.
Re:Sad State of Affairs (Score:5, Interesting)
What if your bank decided that those pesky safe deposit boxes would be a whole lot cheaper if only they could use unlocked filing cabinets instead. Would you still want to do business with them?
The sad state of affairs here is that the problem doesn't become apparent until someone gets hacked.
I think a firm that has a security breech ought to be forced to make restitution to the customers. Managers may not understand security, but they will understand lawsuits and damages.
Only once you've rubbed a manager's nose in the problem can you expect a solution. We don't HAVE to address everything, but managers should at least be aware of the risks they're taking.
It's a telling point that they've chosen to persecute instead of promote the person who exposed the flaws. These idiots would rather hide in the corner than address the risks up front.
Re:Sad State of Affairs (Score:5, Funny)
Engineer: "I don't care what you read in 'Feudal Lords Monthly', if you want this castle to be secure, we need 2000 foot tall walls, 700 feet thick with a moat of pure acid that's 200 feet deep."
Lord: "But I read that this spell of invisibility and Norton(tm) balsa wood framework is just as good. It leads the industry!"
Re: (Score:3, Insightful)
The cost to TJX (Score:3, Informative)
Re:Sad State of Affairs (Score:4, Insightful)
Good security can be expensive. But adequate security is fairly cheap. "password == username" and "blank password" are essentially equal to "no password". Having any password at all, even if it's weak from the POV of a security expert (say, a word from the dictionary) is still a whole lot better than having no password. And it's not very expensive. A billion people in millions of companies manage to remember their login password from monday through friday, and sometimes even over the weekend. I'm sure with just a little training, TJX managers would be able to do that, too.
Re:Sad State of Affairs (Score:4, Interesting)
Re: (Score:3, Insightful)
Sadly this is business as a whole. They would rather spend a little after the fact to defend rather than spend just a few dollars to beef up security before a problem occurs. Management is completely inept most times when it comes to security concerns.
Not just security concerns, but any issue. Since their inception, companies have developed policies of less customer service, less security, and an overall goal to screw over the customer. The internet is a means to cure all of those issues because if provides the medium for consumers to organize and retaliate against this tyranny. Unfortunately, instead of improving the overall performance of the company, management chooses to troll forums in attempts to suppress any unfavorable comments about them.
C
Re: (Score:2)
Not that they are overly effective. Also, in my experience, "going out of their way" consists of choosing random -- rather than the most effective -- methods to secure networks and data.
ah well (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
There is only a problem here if TJX isn't punished for mis-appropriating the trust of their customers, and for attempting to cover-up their misdeeds.
Re:ah well (Score:4, Funny)
McDonalds is always hiring. It'll be a step up for him.
One store (Score:4, Informative)
Re:One store (Score:5, Informative)
The original loss of data was caused by weak passwords on wireless routers. War dialers parked outside a store (or stores) captured data that was then used to collect millions of credit card numbers from the HQ servers. One of the problems was that TJX kept CC numbers on file long after they had any use for the information. This is a case where bad security at one store compromised the whole corporation. Sounds like nothing has changed
Re:One store (Score:5, Informative)
Re:One store (Score:4, Insightful)
Um, isn't this what the US government wants done with the new regulations? As well as sharing this info with the gov, of course...
Re: (Score:2, Interesting)
As a full-time security professional and penetration tester that deals with companies in this situation everyday I can almost guarantee you that given their history and apparent mind-set towards security, almost anyone at a "script kiddie" level would b
Re: (Score:2)
Also, why should we not think that you are an agent of that firm that scours the internet to find bad things posted about TJX, hired by them, Mister A.C.?!
Also interesting titbit from TFA:
Same happened to me :( (Score:5, Funny)
Re:Same happened to me :( (Score:5, Funny)
That's what you get for using "12345" as your password, Mr. President!
Re:Same happened to me :( (Score:4, Funny)
Luggage? Pfft (Score:4, Funny)
Re:Luggage? Pfft (Score:4, Funny)
President Skroobs' director of IT recomends using 2-4-6-8-10 for ssh, since it's obviously double secure over the standard 1-2-3-4-5.
Re: (Score:2)
Re: (Score:3, Funny)
All this time I've thought that it was from one very screwed up person, but now we know it is really from a bunch of people posting with your username and password.
Another 23 year old realizes that McJobs suck (Score:3, Insightful)
Another older guy loses his capacity for outrage (Score:5, Interesting)
Maybe he expected exactly what happened and blew the whistle anyway. So, wise elder, what would you have done?
Re:Another older guy loses his capacity for outrag (Score:5, Insightful)
Re:Another older guy loses his capacity for outrag (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
If it were it wouldn't be something worth mentioning.
Re: (Score:2)
Cynical assholes will always be losers. How's that bitterness treating you? Turned into cancer or heart disease yet? Don't worry, it will. Bitter and petty individuals rarely live long.
Maybe the real message here is not that people will never change. Maybe the message is that y
Re:Another older guy loses his capacity for outrag (Score:5, Insightful)
But it really sounds like you are going further, saying that not only is this how things are, but how they ought to be. It really sounds like you are coming down on the guy for doing the right thing.
Or maybe you are trying to say that everyone should be as cynical as you are? Maybe you believe that we should all expect to get fucked over for doing the right thing, and anyone who doesn't expect that is an idiot who deserves what they got.
Please clarify, do you think this guy got the treatment he deserves? Should we not be outraged here? I'm confused as to your motives for posting what you originally did.
Re: (Score:3, Insightful)
So tell me, what DO they give you medals for?
Re: (Score:2)
To quote my own post, the one you replied to, "what was this guy thinking, doing the right thing in spite of the risks?"
That's called sarcasm, by the way.
Re: (Score:3, Informative)
Remember, kids, like TSA Panda says, the appearance of security is more important than actual security.
BTW, Sarbanes-Oxley has whistleblower protection that may get this company in deep, deep s**t for firing this blogger....
Re:Another 23 year old realizes that McJobs suck (Score:4, Informative)
The heck it didn't. It had to do with a complete lack of security on computer systems that were used in financial transactions. It's hard to keep accurate financial records if key financial systems can be trivially compromised. It also represents a HUGE threat to the financial viability of the company, and technically, failure to include such risks as part of your regular corporate reporting to the SEC is a pretty major case of investor fraud, which was the whole point of Sarbanes-Oxley....
Sadly, covering up security problems seems to be the norm in banking circles. Really gives you a lot of trust in their ability to guard your money, doesn't it?
Oh, and here's a similar story [hugesettlements.com] from 2005 that also suggests that this is likely SarbOx territory.
Re:Another 23 year old realizes that McJobs suck (Score:5, Interesting)
If they had any integrity - Yes, that sounds like the best possible outcome of this.
Think about it - The CIO didn't say "okay, after a major data breach, go ahead and keep using pathetic passwords". The order came down from On High to use secure passwords. This proved inconvenient to hundreds of piddling middle-managers, who ordered "their" IT guys to find a way around all that nasty security. The local IT guys complied, by allowing blank passwords (Corporate probably never expected anything that stupid, and so didn't have a policy stating otherwise).
So, sometime later, Corporate discovers what has happened, and it enrages them. They meet, discuss, take aim, and fire...
And what did he think they were going to do when they caught him, give him a raise and a promise to change their cheap lazy ways?
They could have addressed the problem and rewarded the child who dared to laugh at the naked emperor. By chosing not to, they have very effectively told me they care more about appearances than the security of my credit card data. As a result, I will no longer shop there.
Re: (Score:3, Interesting)
>They could have addressed the problem and rewarded the child who dared to laugh at the naked emperor.
Punishing employees who let you know about problems is like disconnecting your smoke detector. Some of the big security policy frameworks call for a policy statement that *requires* reporting of security problems. If TJX had been my client, they would have been advised
Does the CEO condone this firing act? (Score:4, Interesting)
Re: (Score:3, Informative)
Weak American Dollar (Score:5, Funny)
Good for him (Score:3, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
It may be beyond your control, but it'll still be your responsibility if that's the way they wrote up your job description. Plus, it's a good way to get rid of somebody in the IT department. Doesn't matter if you don't have the authority to do the job, you're still stuck with the responsibility to get it done, and complaining to Those On High about said lack of authority will j
In case you're wondering who TJX is... (Score:4, Informative)
Blank passwords. Wow. No bad guys would ever try that. Disclosing that policy would really compromise security, wouldn't it?
The word "further" bothers me.. (Score:3, Interesting)
Dear TJX (Score:5, Funny)
We're the Slashdot community, and would like you to meet Ms Barbara Streisand, who can help you with your media relations problem.
Yours Truly,
Slashdot Community.
patching potholes with bowler hats (Score:2)
No security problem, not here. huh huh.
Dear TJX CEO, Carol Meyrowitz (Score:2)
So what's the moral supposed to be? (Score:2)
If you want to openly reveal insider company information without first seeking appropriate approval you should expect to be fired.
On top of that I'm a bit suspicious to how privy the kid was to information above and beyond the i
Since when? (Score:4, Interesting)
Re: (Score:2)
Blank passwords? Let the Office Hijinx begin. (Score:2)
Additional Information (Score:4, Informative)
http://www.cgisecurity.com/2008/05/11 [cgisecurity.com]
Gold Mine (Score:4, Funny)
Then they've found a Gold Mine here on Slashdot.
We, your former customers, want security from you. (Score:3, Interesting)
What we, the people who used to shop at TJ Maxx, Marshalls, AJ Wright, HomeGoods, and Bob's Stores, are looking to see is that they can finally claim that they increased their security (using the same standards we expect on the web) so that nobody can intercept what we show the cashier, our credit card stripe data and signature, on its way to the credit card processing company they're using. Good encryption is freely available, great would be hearing that they hired a company that cares about it.
They're thinking about what directly impacts the bottom line (profits) while forgetting that what upsets the customers will directly impact the top line (sales) that will impact that bottom line too.
here are the stores you should avoid (Score:3, Interesting)
Passwords are easy , there is no excuse. (Score:3, Interesting)
BIG_b00bs_a how hard is that to remember?
another
P4ssw0rd5_suck_m3_0ff
Another:
ROY_G_B1V_aa
Jeez, there really isn't any excuse. I think they called this PAL in the Military.
How about the first few letters from the first words in a song or poem?
from Mary had a little lamb:
Mhallwfwwas&wmw12
or another
IXdKKaspdd_10
This can't remember password BS really annoys me.
Add to the fact that any computer system to day should lock down the computer after3 attempts..ah hell lets make it 5 attempts should prevent a brute force or dictionary attack from happens so changing your password isn't really that necessary any more, it's a hold out from 25 years ago when you could only have 8 characters, and there wasn't any lockout.
Since most people who implement security do not understand security and could do risk analysis if their life depended on it, I'm not surprised at the state of affairs in computer security.
And before someone who thinks they know what they are doing corrects me, yes, I do know there are some systems that need tighter security, like missile Codes. Having handled them I know a thing or 4 about them. I am talking about security for 99.99% of everyone else.
Re: (Score:3, Insightful)
Perhaps he didn't trust that the reporter would keep his identity secret? Or, more likely, perhaps there wasn't a reporter interested in the matter. The increasing declines in local journalism, combined with the fact that reporters and technology have traditionally gotten along about as well as oil and water, has meant that often there are no reporters willing to take on a data-breach story. Especially if the person cannot make some kind of sensationalist "your credit cards just got handed to the Russian