- Big milestone for Britain’s little Prince George who turns 1
- Murphy: Israel must be wary of Hamas using civilian deaths for recruitment
- Royce: Putin recruiting ‘every skinhead and malcontent around Russia’
- Nancy Pelosi is adamant: Congress worked together when Bush was president
- ‘Slender Man’ stabbing victim receives Purple Heart from anonymous veteran
- Kentucky city called socialist for buying gas station, undercutting competitor fuel prices
- Israel hits five mosques, sports complex in overnight Gaza strikes
- Hillary Clinton dogged for refusing reporters’ questions on book tour
- EPA tweet baffles: ‘I’m now a C-List celebrity in Kim Kardashian: Hollywood’ iPhone game
- Australian P.M. Abbott: MH17 evidence tampered with on ‘industrial scale’
State Dept. computers open to hackers: report
Question of the Day
Despite frequent hacking attempts and the threat of another Edward Snowden-like data theft, the State Department’s computer systems remain woefully insecure and easily could be breached by enemies seeking to steal classified information, the department’s internal watchdog says.
The warning by the department’s inspector general was issued one day after State was blamed by a bipartisan Senate report for allowing lax security at its Benghazi, Libya, compound and failing to stop a deadly 2012 attack there that senators concluded was preventable.
The department has failed to address “significant and recurring weaknesses” with cybersecurity — some which were flagged during earlier reviews dating to 2011, the department’s inspector general wrote in a redacted letter made public Thursday.
“The department is responsible for preserving and protecting classified information vital to the preservation of national security in high risk environments across the globe,” the inspector general said, but added that officials have yet to “correct many of the existing significant deficiencies thereby leading to continuing undue risk in the management of information.”
The vulnerabilities could allow foreign spies to steal U.S. secrets or terrorists to acquire sensitive information that could be used to plan more attacks like the slayings of U.S. Ambassador J. Christopher Stevens and three others in Benghazi.
The unsecured networks also could allow internal leaks of classified information, the inspector general said, such as those revealed by Army Pvt. Bradley Manning and Mr. Snowden, a former National Security Agency contractor.
Investigators said more than 6,300 administrators have wide access to computer systems and databases, with limited oversight on who is accessing information.
“Really, no computers are completely secure,” said Clifford Neuman, director of the Center for Computer Systems Security at the University of Southern California. “With these kinds of systems, it’s not if there will be a breach, it’s when there will be a breach.”
Although most classified and sensitive information is kept on a separate network from the day-to-day operations, lots of sensitive information is still at risk, Mr. Neuman said.
At the very least, the State Department could be exploited by more traditional crime, investigators said. The agency handles millions of dollars from items such as visa fees, making it a prime target for theft. Processing passport applications means agency computers often contain lots of personal information about U.S. citizens.
The inspector general has been warning the department of the problems since 2011, but inspectors say little has been done. The watchdog declared computer security a “significant deficiency,” one of the highest and most urgent markers the government uses to track issues.
Most of the specifics on what is not working are still classified because of concerns that the vulnerabilities could be exploited.
Although officials have expressed a desire to correct the problems, inspectors said little action has been taken and no written guidelines or documented strategies have been implemented for improving security.
In a response to investigators, the State Department’s Management Control Steering Committee said a plan to fix the vulnerabilities is under consideration and should be ready by the end of the month.
“The committee takes the reported weaknesses very seriously,” said Chairman James Millette. “The committee believes that our efforts over the coming year will advance the department’s information security posture.”
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
Phillip Swarts is an investigative reporter for The Washington Times, covering fiscal waste, fraud and political ethics. He is a graduate of the Medill School of Journalism at Northwestern University and previously worked as an investigative reporter for the Washington Guardian. Phillip can be reached at firstname.lastname@example.org.
- Christians flee Mosul after ISIL threat: Convert to Islam or die
- Ex-Gitmo detainee Moazzam Begg charged with terrorism
- Chicago shooting spree: 22 people shot in 12 hours
- U.S. bests Iran to advance to the Gold Medal match at the FIVB World League Finals
- Bill Maher blames Hamas for Gaza violence: 'Do you really expect the Israelis not to retaliate?'
Latest Blog Entries
TWT Video Picks
U.S. appetite for drugs begets violence migrants are fleeing
- IRS seeks help destroying another 3,200 computer hard drives
- Jewish woman booted from JetBlue flight over fight with Palestinian
- YOUNG: A sinking presidency, deeper after November?
- Hillary Clinton dogged for refusing reporters' questions on book tour
- PRUDEN: A deadly enemy within exacerbating immigration crisis
- Rep. Jared Polis' anti-fracking crusade riles Colorado
- Hamas terrorists wear Israeli army uniforms to ambush soldiers in Gaza
- MERRY: Handicaps in Hillary's way
- Blunder on the bases costly in D-Backs' 4-3 loss
- Nancy Pelosi: Congress worked together when Bush was president
Obama's biggest White House 'fails'
Celebrities turned politicians
Athletes turned actors
20 gadgets that changed the world
Fighting in Iraq