NASA scrambles to encrypt laptops after major breach
Personally identifiable information on NASA employees, contractors exposed in Oct. 31 laptop theft; workers told of incident this week
Computerworld - NASA is scrambling to implement full disk encryption on agency laptops after one containing unencrypted personal information on a "large" number of people was recently stolen.
Agency employees were told of the October 31 theft of the laptop and NASA documents from a locked car in an email message Tuesday from Richard Keegan Jr., associate deputy administrator at NASA.
Keegan told employees that the stolen laptop contained sensitive "Personally Identifiable Information" (PII) about a large number of NASA employees, contractors and others.
"Although the laptop was password protected, it did not have whole disk encryption software, which means the information on the laptop could be accessible to unauthorized individuals," Keegan warned.
"We are thoroughly assessing and investigating the incident, and taking every possible action to mitigate the risk of harm or inconvenience to affected employees," he added.
NASA has hired data breach specialist ID Experts to help notify all of the individuals affected by the breach, Keegan said.
Those whose personal data could be accessed by the crooks will receive free credit monitoring and identity theft monitoring services as well as an insurance reimbursement policy in case of identity theft.
NASA did not respond to a request for information on how many employees were affected, or why the agency waited nearly two weeks to disclose the breach.
The incident marks the second time this year that a NASA laptop containing unencrypted sensitive information was stolen.
In March, a laptop containing names, Social Security Numbers, phone numbers, email addresses, dates of birth, college GPAs and other personal data of NASA employees at NASA"s Kennedy Space Center was stolen from the car of a worker at the facility, according to NASA Watch.
That breach also impacted a large but unspecified number of employees.
The latest incident appears to have finally pushed NASA to mandate full disk encryption on laptops containing sensitive data.
In his alert, Keegan noted that NASA Administrator Charles Bolden and CIO Linda Cureton have issued a directive prohibiting the removal of computers from a NASA facility unless whole disk encryption is enabled or all sensitive files are individually encrypted.
The directive applies to all laptops containing PII, data on International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR) data, procurement and human resources information, and other sensitive but unclassified (SBU) data, Keegan said.
CIOs at all NASA facilities have been instructed to complete disk encryption on the "maximum possible number of laptops" by Nov. 21, Keegan said, and to add encryption capabilities to all laptops by Dec. 21. After that date, no laptop from any NASA facility, unless whole disk encryption is enabled.
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Microsoft plans another short patch slate for next week, but finds a few XP bugs to crush
- Target attack shows danger of remotely accessible HVAC systems
- Target hackers try new ways to use stolen card data
- Update: Microsoft to patch just-revealed Windows zero-day tomorrow
- NSA spying prompts open TrueCrypt encryption software audit to go viral
- Microsoft warns of Office zero-day, active hacker exploits
- Hackers move to create next Blackhole after 'Paunch' arrest
- Adobe hack shows subscription software vendors lucrative targets
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts