- Obama not worried about Ebola at upcoming African summit in D.C.
- Obama: ‘We tortured some folks’ after 9/11
- Obama administration asked whole D.C. Circuit to take on major Obamacare case
- Mark Levin: Topple GOP leadership or country will ‘unravel’
- Massachusetts to let police chief deny gun buys to those deemed unfit
- John Kerry condemns attack on Israeli soldiers, kidnapping
- U.S. starts to evacuate American Ebola patients from West Africa: Report
- Geraldo slammed as ‘dummy’ for backing Clinton’s bin Laden claim
- Israeli spokesman: No need to debate who broke the cease-fire
- 35 Palestinians killed; Israeli officer missing
Glitch imperils swath of encrypted records
Data destruction easy, inventor warns
Question of the Day
Without careful monitoring and management, SSH users go on creating keys, often storing them in easily identifiable directories where hackers can find and use them to access secure computers.
He said the auditors found in “a fraction of the bank’s environment” more than 1 million unaccounted-for keys — 10 percent of which granted root access, or control of the server at the most basic level.
It is not just in the private sector where hackers could use the keys for illicit purposes.
“One of the biggest challenges the federal agencies face [in encryption] is key management,” he said.
Mr. Fergus noted that federal rules for classified computer networks cover the “issuance and assignment and storage of keys” but do not dictate what should be done with used keys.
“There’s nothing in the standards or the protocols,” he said.
As a teenager in the 1990s, Sean M. Bodmer hacked government computers and was arrested by the FBI. Today, he is a top researcher at the computer security firm CounterTack, based in Waltham, Mass.
“It’s quite horrific what access you can get with an SSH key,” Mr. Bodmer told The Times.
Mr. Bodmer described how a hacker could use abandoned keys to move through a supposedly secure computer network by hopping from server to server.
“It’s a domino effect” security breach, he said.
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
Shaun Waterman is an award-winning reporter for The Washington Times, covering foreign affairs, defense and cybersecurity. He was a senior editor and correspondent for United Press International for nearly a decade, and has covered the Department of Homeland Security since 2003. His reporting on the Sept. 11 Commission and the tortuous process by which some of its recommendations finally became ...
- Senator's memo shows Iran links in Homeland Security's troubled immigration program
- Help wanted: Homeland Security plagued by vacancies at the top
- Dems back bill to fix problems in investor visa program
- Democrats proceed with Mayorkas vote despite pending investigation
- NSA monitored 'World of Warcraft' players
Latest Blog Entries
TWT Video Picks
By Orrin G. Hatch
Procedural changes impede the chamber's traditional deliberative function
- Border agents cleared of civil rights complaints from illegal immigrant children
- U.N. condemns Israel, U.S. for not sharing Iron Dome with Hamas
- Porn-surfing feds blame boredom, lack of work for misbehavior
- Obama military strategy too weak for future security, panel reports
- Ben Carson takes major step toward presidential campaign
- CRUZ: A tale of two hospitals: One in Israel, one in Gaza
- Pentagon wants extra $19M to equip, train Ukrainian troops
- House backs faster deportations, cancels 'Dreamer' policy
- Feds raid S.C. home to seize Land Rover in EPA emission-control crackdown
- Ted Nugent slams 'lying freaks' at liberal media: I'm 'doing God's work'
Top 10 U.S. military helicopters
Obama's biggest White House 'fails'
Celebrities turned politicians
Athletes turned actors