Computerworld - At least 595 laptops and desktops belonging to the Navy's Pacific Command in Hawaii have been potentially lost or compromised, according to an internal report that detailed the service's inability to account for hundreds of computers, some of which contained classified data.
The audit, conducted in July by the Naval Audit Service, concluded that the mishap poses a "threat to national security." It was obtained last week by Defense Week, a defense industry trade magazine, despite Navy efforts to block its release.
The report identifies failures and breakdowns in the Navy's system for tracking sensitive equipment deployed aboard Navy ships and submarines -- a system that remains largely paper-based and manual.
John Yoshishige, a spokesman for the Navy's Pacific Command in Hawaii, said that since last week the number of missing computers has been reduced from 595 to 187.
"And we expect that some of those may still turn up ashore," Yoshishige said. "The inventory in the report was only of afloat units."
He was referring to PCs and laptops used onboard ships and submarines.
In addition to ordering an inventory of all shore-based units, the commander of the Pacific Fleet has also directed that the command's CIO, known in Navy parlance as the N6, develop an inventory control management system that will be used by all Pacific Fleet commands.
This isn't the first time the military has lost computers containing sensitive data. For example, in August, two laptop computers classified at the top-secret level disappeared from a Sensitive Compartmented Information Facility (SCIF) run by the U.S. Central Command at MacDill Air Force Base in Tampa, Fla. The only reason those laptops were discovered to be missing was that Secretary of Defense Donald Rumsfeld had ordered investigators to look into how plans for an invasion of Iraq had leaked to the media.
Missing laptop and hard-drive fiascos have also stung the State Department, the Department of Energy and even the FBI in recent years. In August, the Justice Department acknowledged that it couldn't locate 400 laptops and 775 weapons belonging to the FBI and the Drug Enforcement Agency. In addition, the classification level of 317 of the computers belonging to the FBI couldn't be determined.
Accountability problems often stem from the fact that individual military and civilian agency officials are appointed as control or accountability officers for a vast array of equipment, including mobile computers, desks and chairs, that's often deployed for extended periods of time around the world. In addition, the process of keeping tabs on equipment is often determined by the individual officer assigned to manage thehardware and isn't subject to any departmentwide or governmentwide standard.
Read more about Security in Computerworld's Security Topic Center.
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!