Computerworld - At least 595 laptops and desktops belonging to the Navy's Pacific Command in Hawaii have been potentially lost or compromised, according to an internal report that detailed the service's inability to account for hundreds of computers, some of which contained classified data.
The audit, conducted in July by the Naval Audit Service, concluded that the mishap poses a "threat to national security." It was obtained last week by Defense Week, a defense industry trade magazine, despite Navy efforts to block its release.
The report identifies failures and breakdowns in the Navy's system for tracking sensitive equipment deployed aboard Navy ships and submarines -- a system that remains largely paper-based and manual.
John Yoshishige, a spokesman for the Navy's Pacific Command in Hawaii, said that since last week the number of missing computers has been reduced from 595 to 187.
"And we expect that some of those may still turn up ashore," Yoshishige said. "The inventory in the report was only of afloat units."
He was referring to PCs and laptops used onboard ships and submarines.
In addition to ordering an inventory of all shore-based units, the commander of the Pacific Fleet has also directed that the command's CIO, known in Navy parlance as the N6, develop an inventory control management system that will be used by all Pacific Fleet commands.
This isn't the first time the military has lost computers containing sensitive data. For example, in August, two laptop computers classified at the top-secret level disappeared from a Sensitive Compartmented Information Facility (SCIF) run by the U.S. Central Command at MacDill Air Force Base in Tampa, Fla. The only reason those laptops were discovered to be missing was that Secretary of Defense Donald Rumsfeld had ordered investigators to look into how plans for an invasion of Iraq had leaked to the media.
Missing laptop and hard-drive fiascos have also stung the State Department, the Department of Energy and even the FBI in recent years. In August, the Justice Department acknowledged that it couldn't locate 400 laptops and 775 weapons belonging to the FBI and the Drug Enforcement Agency. In addition, the classification level of 317 of the computers belonging to the FBI couldn't be determined.
Accountability problems often stem from the fact that individual military and civilian agency officials are appointed as control or accountability officers for a vast array of equipment, including mobile computers, desks and chairs, that's often deployed for extended periods of time around the world. In addition, the process of keeping tabs on equipment is often determined by the individual officer assigned to manage thehardware and isn't subject to any departmentwide or governmentwide standard.
Read more about Security in Computerworld's Security Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- Live Webcast
Enhance Your Virtualization Infrastructure With IBM and Vmware
Date: Wednesday, May 14, 2014, 1:00 PM EDT
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts