Online data a gold mine for terrorists
IT's high-alert response overlooks corporate sites
Computerworld - The widespread availability of sensitive information on corporate Web sites appears to have been largely overlooked by IT and security managers responding this week to the Department of Homeland Security's warning of a heightened terrorist threat against the financial services sector.
Freely available on the Web, for example, are 3-D models of the exterior and limited portions of the interior of the Citigroup Inc. headquarters building in Manhattan -- one of the sites specifically named in the latest terror advisory issued by the DHS. Likewise, details of the Citigroup building's history of structural design weaknesses, including its susceptibility to toppling over in high winds, the construction of its central support column and the fire rating of the materials used in the building, are readily available on the Web.
A Citigroup spokeswoman declined to comment, referring the matter to the building owner, Boston Properties Inc.
Similarly, the Web site of the Chicago Board of Trade includes photographs of the facility's underground parking garages, floor plans of office suites and contact names and phone numbers for the telecommunications service providers that serve the building.
Maria Gemskie, a spokeswoman for the CBOT, said the company could not comment publicly about specific security precautions being put in place. But she stressed that "all aspects of security are taken very seriously and we are looking into [our Web content] as well."
Such information can be a gold mine for terrorists, security experts said. A senior intelligence official at the DHS, speaking on condition of anonymity, said the recent capture of al-Qaeda computer expert Muhammad Naeem Noor Khan in Pakistan yielded a computer filled with photographs and floor diagrams of buildings in the U.S. that terrorists may have been planning to attack.
"Not thinking through the security implications of some of the information put online can be a very dangerous mistake," said Amit Yoran, director of the National Cyber Security Division at the DHS. "The Pentagon has looked very closely at this issue, and certainly corporate America should do the same."
In fact, Yoran said the situation is serious enough that the DHS may need to look into publishing best-practices guidelines for companies to follow.
Eric Friedberg, managing director of New York-based security firm Stroz Friedberg LLC, said the warnings about sensitive Web site postings that his company took to the private sector two years ago have "fallen on deaf ears" (see story).
MacDonnell Ulsch, managing director of Janus Risk Management Inc. in Marlboro, Mass., said making this type of information available is inexcusable.
"It may make it easier for contractors and service providers to do
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts