NASA breach update: Stolen laptop had data on 10,000 users

Breached unencrypted laptop puts personal data of NASA employees and contractors at risk, spokesman says

Personally identifiable information of "at least" 10,000 NASA employees and contractors remains at risk of compromise following last month's theft of an agency laptop, a spokesman told Computerworld via email Thursday.

Agency employees had been told of the October 31 theft of a laptop containing the personal data from a locked car in an email message Tuesday from Richard Keegan Jr., associate deputy administrator at NASA.

In the email, Keegan told employees that the stolen laptop contained sensitive personally identifiable information (PII) on a large number of NASA employees, contractors and others. Unspecified NASA documents were also stolen from the car, he added.

"Although the laptop was password protected, it did not have whole disk encryption software, which means the information on the laptop could be accessible to unauthorized individuals," Keegan warned employees in the email.

Responding to questions from Computerworld today, NASA spokesman Allard Beutel acknowledged that agency waited nearly two weeks to publicly disclose the breach. He said that in the interim, NASA was working with law enforcement personnel to recover the laptop, and was working to determine exactly whose personal data was stored on it.

"NASA immediately began working with local law enforcement after the laptop was stolen, with the goal of recovering the computer and protecting the sensitive data," Beutel said in the agency's first public update since disclosing the theft to employees. "At the same time, NASA IT specialists and security officials began performing an exhaustive automated and manual analysis of the data to make sure everyone with information on the stolen laptop is notified."

The agency is currently in the process of notifying the victims of the breach, Beutel added.

The theft prompted questions about why personal data is stored on a laptop and why it wasn't encrypted.

The incident prompted an immediate agency-wide initiative to implement full disk encryption on all NASA laptops by Dec. 21, starting with those carried by teleworking employees.

Beutel said the laptop was stolen from a teleworking employee whose job responsibilities included reviewing personally identifiable information.

NASA does have rules stating that all individual files with PII should be encrypted, Beutel said.

However, he added, "The stolen computer was password protected, but some of the specific files were not encrypted as required by NASA policy. The hard drive also had not yet received the whole disk encryption software as part of the ongoing agency-wide effort."

Until all agency laptops are fully encrypted, NASA telecommuters must use encrypted loaner systems, Beutel said.

"Employees are being directed to review the information contained on their computers to ensure all sensitive information is appropriately encrypted at the file level, and to purge all unneeded sensitive files," he said.

The compromise isn't surprising considering that NASA has the lowest portable device encryption rate among all federal agencies, said John Pescatore, an analyst with Gartner Inc.

According to a report released in March by the White House Office of Management and Budget, only 41% of NASA-owned portable devices meet the encryption requirements of the Federal Information Security Management Act (FISMA), Pescatore said.

NASA's effort fall far behind other agencies, he said, noting that 83% of all federal government laptops run encryption tools.

Pescatore noted that NASA is likely hurt because it's made up of multiple separate fiefdoms.

Each of the agency's labs has separate IT operations with their own standards, he said. "That has complicated NASA's ability to drive a enterprise security solution. It is probably the biggest reason why NASA is consistently" behind other agencies in security grades, he said.

The mandate to encrypt sensitive data on federal systems stems from a 2006 incident in which a laptop computer and hard disk belonging to the U.S. Department of Veterans Affairs was stolen from the home of a VA data analyst.

The stolen equipment, later recovered by the FBI, contained unencrypted personal data belonging to over 26.5 million active military duty personnel and veterans.

Ironically, more than six years after the incident, the VA encryption rate ranks third from the bottom among federal agencies, Pescatore added.

Considering the VA's record, NASA's encryption problems shouldn't be a surprise, added Richard Stiennon principal at IT-Harvest.

"No surprise at all. Employees will always squirrel away data. Trunks will always been broken into. Laptops will always be targets for theft," Stiennon said.

Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is jvijayan@computerworld.com.

Read more about security in Computerworld's Security Topic Center.

Join the CSO newsletter!

Error: Please check your email address.

Tags Cybercrime and HackingNASAsecurityencryption

More about FBIGartnerInc.NASAOffice of Management and BudgetTopic

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jaikumar Vijayan

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place