Online data a gold mine for terrorists
IT's high-alert response overlooks corporate sites
Computerworld - The widespread availability of sensitive information on corporate Web sites appears to have been largely overlooked by IT and security managers responding this week to the Department of Homeland Security's warning of a heightened terrorist threat against the financial services sector.
Freely available on the Web, for example, are 3-D models of the exterior and limited portions of the interior of the Citigroup Inc. headquarters building in Manhattan -- one of the sites specifically named in the latest terror advisory issued by the DHS. Likewise, details of the Citigroup building's history of structural design weaknesses, including its susceptibility to toppling over in high winds, the construction of its central support column and the fire rating of the materials used in the building, are readily available on the Web.
A Citigroup spokeswoman declined to comment, referring the matter to the building owner, Boston Properties Inc.
Similarly, the Web site of the Chicago Board of Trade includes photographs of the facility's underground parking garages, floor plans of office suites and contact names and phone numbers for the telecommunications service providers that serve the building.
Maria Gemskie, a spokeswoman for the CBOT, said the company could not comment publicly about specific security precautions being put in place. But she stressed that "all aspects of security are taken very seriously and we are looking into [our Web content] as well."
Such information can be a gold mine for terrorists, security experts said. A senior intelligence official at the DHS, speaking on condition of anonymity, said the recent capture of al-Qaeda computer expert Muhammad Naeem Noor Khan in Pakistan yielded a computer filled with photographs and floor diagrams of buildings in the U.S. that terrorists may have been planning to attack.
"Not thinking through the security implications of some of the information put online can be a very dangerous mistake," said Amit Yoran, director of the National Cyber Security Division at the DHS. "The Pentagon has looked very closely at this issue, and certainly corporate America should do the same."
In fact, Yoran said the situation is serious enough that the DHS may need to look into publishing best-practices guidelines for companies to follow.
Eric Friedberg, managing director of New York-based security firm Stroz Friedberg LLC, said the warnings about sensitive Web site postings that his company took to the private sector two years ago have "fallen on deaf ears" (see story).
MacDonnell Ulsch, managing director of Janus Risk Management Inc. in Marlboro, Mass., said making this type of information available is inexcusable.
"It may make it easier for contractors and service providers to do
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts