Email this Article Email   

CHIPS Articles: Hold Your Breaches, January-March 2009

Hold Your Breaches, January-March 2009
By Steve Muck - January-March 2009
All Department of the Navy personnel should continue to increase their level of awareness about properly safeguarding personally identifiable information (PII). To learn more about properly safeguarding PII, go to www.doncio.navy.mil.

The following is a reported loss or breach of PII involving a Department of the Navy information system with lessons learned from the event. Incidents such as these will be reported in each subsequent CHIPS magazine to increase PII awareness. Names have been changed or removed, but details are factual and based on reports sent to the DON Chief Information Officer (DON CIO) Privacy Office.

A former civilian contractor, working in support of the Navy Marine Corps Intranet (NMCI), obtained personally identifiable information associated with approximately 17,000 individuals. The PII was downloaded to a thumb drive and consisted of names associated with Social Security numbers, home addresses and other data elements.

The contractor, who had a criminal record, then attempted to sell this information to an individual he believed to be a foreign spy, but who was actually a law enforcement official. The contractor was arrested April 18, 2008, and was later found guilty of aggravated identity theft and exceeding authorized access to a computer for personal gain. He is now awaiting sentencing.

The conviction for exceeding authorized access to a computer for financial gain carries a maximum sentence of five years in prison. Aggravated identity theft carries a mandatory two-year sentence that must be served consecutive to any sentence imposed for the charge of exceeding authorized access. Both counts also include maximum fines of $250,000. A maximum sentence of incarceration for seven years is possible.

This breach attracted national media attention and demonstrated how the insider threat is potentially more damaging than breaches involving human error.

A joint investigation by the Naval Criminal Investigative Service and Federal Bureau of Investigation found that the contractor also sent screenshots of PII to two e-mail addresses of individuals who did not have a need to know and with the intent to sell the contents of the entire database.

The individuals whose PII was compromised via the two e-mails have been notified. The investigation concluded that the bulk of the database was not compromised.

Lessons Learned

• The insider threat, with access to large amounts of privacy sensitive data, poses a significant and real danger to the Department of the Navy.
• Defense Department and DON policy require personnel who access PII to receive a favorable personnel security investigation. The background check for the individual involved in this incident was not initiated. See DoD Directive 5200.2-R, DoD Personnel Security Program, and Secretary of the Navy Manual, Personnel Security Program, SECNAV M-5510.30, for details of this security guidance. Increased awareness of DoD and DON policy is recommended.
• Contract language clearly identified the need to conduct a security investigation for personnel hired to fill the contractor position, but it was not initiated. Improved contract oversight is needed.
• A base security access system that accurately screens criminal offenders was not available and would have provided another means to prevent the perpetrator from gaining access to the base and NMCI network.

Steve Muck is the DON CIO privacy lead.

Related CHIPS Articles
Related DON CIO News
Related DON CIO Policy
CHIPS is an official U.S. Navy website sponsored by the Department of the Navy (DON) Chief Information Officer, the Department of Defense Enterprise Software Initiative (ESI) and the DON's ESI Software Product Manager Team at Space and Naval Warfare Systems Center Pacific.

Online ISSN 2154-1779; Print ISSN 1047-9988