Computerworld - At least 595 laptops and desktops belonging to the Navy's Pacific Command in Hawaii have been potentially lost or compromised, according to an internal report that detailed the service's inability to account for hundreds of computers, some of which contained classified data.
The audit, conducted in July by the Naval Audit Service, concluded that the mishap poses a "threat to national security." It was obtained last week by Defense Week, a defense industry trade magazine, despite Navy efforts to block its release.
The report identifies failures and breakdowns in the Navy's system for tracking sensitive equipment deployed aboard Navy ships and submarines -- a system that remains largely paper-based and manual.
John Yoshishige, a spokesman for the Navy's Pacific Command in Hawaii, said that since last week the number of missing computers has been reduced from 595 to 187.
"And we expect that some of those may still turn up ashore," Yoshishige said. "The inventory in the report was only of afloat units."
He was referring to PCs and laptops used onboard ships and submarines.
In addition to ordering an inventory of all shore-based units, the commander of the Pacific Fleet has also directed that the command's CIO, known in Navy parlance as the N6, develop an inventory control management system that will be used by all Pacific Fleet commands.
This isn't the first time the military has lost computers containing sensitive data. For example, in August, two laptop computers classified at the top-secret level disappeared from a Sensitive Compartmented Information Facility (SCIF) run by the U.S. Central Command at MacDill Air Force Base in Tampa, Fla. The only reason those laptops were discovered to be missing was that Secretary of Defense Donald Rumsfeld had ordered investigators to look into how plans for an invasion of Iraq had leaked to the media.
Missing laptop and hard-drive fiascos have also stung the State Department, the Department of Energy and even the FBI in recent years. In August, the Justice Department acknowledged that it couldn't locate 400 laptops and 775 weapons belonging to the FBI and the Drug Enforcement Agency. In addition, the classification level of 317 of the computers belonging to the FBI couldn't be determined.
Accountability problems often stem from the fact that individual military and civilian agency officials are appointed as control or accountability officers for a vast array of equipment, including mobile computers, desks and chairs, that's often deployed for extended periods of time around the world. In addition, the process of keeping tabs on equipment is often determined by the individual officer assigned to manage thehardware and isn't subject to any departmentwide or governmentwide standard.
Read more about Security in Computerworld's Security Topic Center.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!