Computerworld - At least 595 laptops and desktops belonging to the Navy's Pacific Command in Hawaii have been potentially lost or compromised, according to an internal report that detailed the service's inability to account for hundreds of computers, some of which contained classified data.
The audit, conducted in July by the Naval Audit Service, concluded that the mishap poses a "threat to national security." It was obtained last week by Defense Week, a defense industry trade magazine, despite Navy efforts to block its release.
The report identifies failures and breakdowns in the Navy's system for tracking sensitive equipment deployed aboard Navy ships and submarines -- a system that remains largely paper-based and manual.
John Yoshishige, a spokesman for the Navy's Pacific Command in Hawaii, said that since last week the number of missing computers has been reduced from 595 to 187.
"And we expect that some of those may still turn up ashore," Yoshishige said. "The inventory in the report was only of afloat units."
He was referring to PCs and laptops used onboard ships and submarines.
In addition to ordering an inventory of all shore-based units, the commander of the Pacific Fleet has also directed that the command's CIO, known in Navy parlance as the N6, develop an inventory control management system that will be used by all Pacific Fleet commands.
This isn't the first time the military has lost computers containing sensitive data. For example, in August, two laptop computers classified at the top-secret level disappeared from a Sensitive Compartmented Information Facility (SCIF) run by the U.S. Central Command at MacDill Air Force Base in Tampa, Fla. The only reason those laptops were discovered to be missing was that Secretary of Defense Donald Rumsfeld had ordered investigators to look into how plans for an invasion of Iraq had leaked to the media.
Missing laptop and hard-drive fiascos have also stung the State Department, the Department of Energy and even the FBI in recent years. In August, the Justice Department acknowledged that it couldn't locate 400 laptops and 775 weapons belonging to the FBI and the Drug Enforcement Agency. In addition, the classification level of 317 of the computers belonging to the FBI couldn't be determined.
Accountability problems often stem from the fact that individual military and civilian agency officials are appointed as control or accountability officers for a vast array of equipment, including mobile computers, desks and chairs, that's often deployed for extended periods of time around the world. In addition, the process of keeping tabs on equipment is often determined by the individual officer assigned to manage thehardware and isn't subject to any departmentwide or governmentwide standard.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts