Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity

    Security Audit Flags Thousands of Military User Accounts

    Written by

    Paul F. Roberts
    Published January 10, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Up to 20 percent of the computer accounts used by the U.S. military are unauthorized or abandoned, providing a major opportunity to hackers and foreign governments who want to spy on the United States, according to a senior military official.

      An ongoing audit of user accounts in the armed services has uncovered an epidemic of expired and unauthorized accounts, including 3,000 in DISA (Defense Information Systems Agency), 1,500 in the U.S. Armys Korean operation, and thousands more spread throughout the military services.

      The weak account management, in addition to slow patch distribution, could be exploited by hackers to gain access to military systems, and has prompted a wholesale review of the militarys IT infrastructure, according to Lt. Gen. Charles Croom Jr.

      The account audit was prompted by a general “stand down” by the U.S. Department of Defenses militarys information assurance groups in November 2005, said Croom, who is Commander of the Joint Task Force – Global Network Operations within the DOD.

      Croom was addressing an audience of military and civilian cyber crime experts at the annual DOD Cyber Crime Conference in Palm Harbor, Fla.

      “The stand down focused us to think about how we think about our networks. Verifying user accounts was about asking Who is on the network? Do they have a valid user account?”

      Often the answer to that question was “no,” according to Croom, who said that the review is ongoing and will not be complete for all DOD agencies until March.

      Between 10 and 20 percent of the accounts audited were flagged for one reason or another.

      Many were merely inactive: vestiges left behind when military personnel transferred from one role to another within the armed forces.

      /zimages/6/28571.gifClick here to read more about the militarys efforts against spyware.

      Others were valid user accounts that had been assigned inappropriate or unnecessary permissions, Croom said.

      Croom declined to comment on how many of the accounts were unauthorized or malicious in origin.

      /zimages/6/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      However, there are ominous signs that outsiders may have been using the accounts to access military systems.

      In the weeks since the military began flagging and disabling the accounts, there has been a marked increase in so-called “spear phishing” attacks against DOD personnel, in which outsiders send e-mail messages that appear to come from superiors within the DOD and ask the employee to provide their password.

      Croom declined to comment on the source of the attacks, but said they were evidence that the change in account management and provisioning was working.

      But poor management of user accounts and permissions, which is often referred to as “provisioning,” is just one problem facing the military.

      The DOD and armed services are also struggling to remediate vulnerabilities in the hardware and software it uses.

      The military deployed double the number of security patches in 2005—42—as it did in 2004.

      However, the process is very slow, and often relies on manual processes and phone calls to coordinate between the four branches of the military and 30 military agencies, he said.

      DOD has also cracked down on open communications ports on the systems that run on its networks, and has closed around 90 percent of inbound and outbound ports on its systems, he said.

      However, vulnerability tracking, user tracking and compliance checking are also decentralized and inefficient, often relying on manual processes that vary from agency to agency.

      “We have inadequate visibility into the global [military] network,” he said.

      The U.S. military operates more than 1,500 networks, containing both classified and unclassified information.

      However, those networks often lack internal boundaries and firewalls that would prevent an intruder who had penetrated the militarys perimeter defenses in one part of the network from traversing the entire military system, Croom said.

      The DOD will be conducting a ground-up review of its classified and unclassified networks and may even need to rebuild those networks from the ground up to improve their security, Croom said.

      “The network is now critical to the war fight. You cant go to war without it,” he said.

      /zimages/6/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Paul F. Roberts
      Paul F. Roberts

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.