Cyber ​​Security Failure Fears 'Deadly Missile Attacks', Pentagon watchdog warns



[ad_1]

Breaking News E-mails

Receive last minute alerts and special reports. News and stories that matter, broadcast in the morning on weekdays.

Au Alex Johnson

Cyber ​​security has also become fundamental: neglecting to encrypt classified USB sticks and failing to physically lock critical computer servers makes the US vulnerable to deadly missiles The report, dated December 10 but not released before Friday, summarizes eight months of investigation of the country's ballistic missile defense system by the Pentagon's Inspector General's office. , or IG.

The audit focused on five of the Department of Defense's 104 facilities that manage ballistic missile defense systems and technical information.

The facilities are not identified in the 44-page report, which has been completely redacted. But the report makes many specific references to programs involving the Army, the Navy and the Missile Defense Agency.

"The Army, the Navy and the MDA did not protect networks or systems that process, store and transmit technical information from unauthorized persons, access and use," the declassified report concludes.

The deficiencies could lead to the disclosure of "essential details that compromise the integrity, confidentiality and availability of [ballistic missile defense] technical information". Twice, he warns that such a disclosure "could allow American opponents to bypass the capabilities of [ballistic missile defense] making them vulnerable to deadly missile attacks."

The audit found deficiencies in at least three of the seven safety factors examined.

Perhaps most troubling, the audit revealed that administrators in three of the five facilities did not control known vulnerabilities on classified networks, even those that were reported as immediately and potentially serious by Cyber ​​Command. American.

According to the audit, a vulnerability deemed critical since 1990 still had not been resolved by the time the IGO office examined it in April. The report outlines the potential consequences of exploiting this vulnerability.

Some facilities have not implemented extremely basic cybernetic security measures, such as the installation of security cameras to monitor the entrances and exits of facilities holding ballistic missile defense information, or to Based on the audit, ensure that access to computer servers distributing classified information was restricted to persons with an approved motive and authorized to work with them.

In some cases, there was not even a lock at the doors of the rooms housing the servers he found. In others, the server rooms may have been locked, but the lock keys have been kept in unlocked filing cabinets. The data center manager of one of the facilities told investigators that he did not know that storage keys and keys needed to be secured, according to the report.

Investigators also found that employees and contractors were allowed to take classified data with them. removable media such as USB sticks without proper authorization. It is thus that Edward Snowden, then a subcontractor of the National Security Agency, allegedly stole thousands of extremely sensitive secrets from the government in 2013.

[ad_2]
Source link