After a heated congressional hearing on cybersecurity Wednesday, two major security players say there may be many more breaches than reported.
Within the past year, a hacker secretly broke into the Department of Homeland Security network and deleted, updated, and captured information -- all without anyone knowing he was even in there.
Luckily, the hacker was Keith A. Rhodes, chief technologist at the U.S. Government Accountability Office. Rhodes, considered to be the federal government's top hacker, has a congressional mandate to test the network security at 24 government agencies and departments. He performs 10 penetration tests a year on agencies such as the IRS and the Department of Agriculture. And for the past year, he's been testing the network at DHS.
"I would label them [DHS] as being at high risk," Rhodes told InformationWeek the day after a congressional hearing into the security of the government agency tasked with being the leader of the nation's cybersecurity. "There was no system we tested that didn't have problems. There was nothing we touched that didn't have weaknesses, ranging from WAN to desktops. ... If we had continued the audit we would have found more. We curtailed the audit because we just kept finding problems. At a certain point, we just ran out of room in our basket."
Rhodes was one of the people who testified before the congressional hearing that took the Department of Homeland Security and its CIO, Scott Charbo, to task for weaknesses in the department's computer network.
Jim Langevin, D-R.I., chairman of the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, said at the hearing Wednesday afternoon that the 844 incidents came during fiscal 2005 and 2006. He also said the infiltration of federal government networks and the possible theft or exploitation of information on them is one of the most critical issues confronting the country, noting that the Chinese have been "coordinating attacks against the Department of Defense for years."
However, Alan Paller, director of research at the SANS Institute, said 844 is most likely only a piece of the security breaches that the department suffered in that two-year span.
"The reality is that the federal agencies don't report all of them," he said in an interview after the hearing. "Eight hundred and forty-four is a big number, but it's a sample of the reality, not the total reality."
Paller said the 844 incidents reported to executives at DHS could be as much as 80% of the real total or as little as 10%. He estimates it's closer to half. "You don't know about all of them. That I can guarantee," he said. "And in particular, you're not knowing about the worst ones."
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.