Skip Links

NASA breach update: Stolen laptop had data on 10,000 users

Breached unencrypted laptop puts personal data of NASA employees and contractors at risk, spokesman says

By Jaikumar Vijayan, Computerworld
November 16, 2012 07:45 AM ET

Computerworld - Personally identifiable information of "at least" 10,000 NASA employees and contractors remains at risk of compromise following last month's theft of an agency laptop, a spokesman told Computerworld via email Thursday.

15 of the worst data breaches

Agency employees had been told of the October 31 theft of a laptop containing the personal data from a locked car in an email message Tuesday from Richard Keegan Jr., associate deputy administrator at NASA.

In the email, Keegan told employees that the stolen laptop contained sensitive personally identifiable information (PII) on a large number of NASA employees, contractors and others. Unspecified NASA documents were also stolen from the car, he added.

"Although the laptop was password protected, it did not have whole disk encryption software, which means the information on the laptop could be accessible to unauthorized individuals," Keegan warned employees in the email.

Responding to questions from Computerworld today, NASA spokesman Allard Beutel acknowledged that agency waited nearly two weeks to publicly disclose the breach. He said that in the interim, NASA was working with law enforcement personnel to recover the laptop, and was working to determine exactly whose personal data was stored on it.

"NASA immediately began working with local law enforcement after the laptop was stolen, with the goal of recovering the computer and protecting the sensitive data," Beutel said in the agency's first public update since disclosing the theft to employees. "At the same time, NASA IT specialists and security officials began performing an exhaustive automated and manual analysis of the data to make sure everyone with information on the stolen laptop is notified."

The agency is currently in the process of notifying the victims of the breach, Beutel added.

The theft prompted questions about why personal data is stored on a laptop and why it wasn't encrypted.

The incident prompted an immediate agency-wide initiative to implement full disk encryption on all NASA laptops by Dec. 21, starting with those carried by teleworking employees.

Beutel said the laptop was stolen from a teleworking employee whose job responsibilities included reviewing personally identifiable information.

NASA does have rules stating that all individual files with PII should be encrypted, Beutel said.

However, he added, "The stolen computer was password protected, but some of the specific files were not encrypted as required by NASA policy. The hard drive also had not yet received the whole disk encryption software as part of the ongoing agency-wide effort."

Until all agency laptops are fully encrypted, NASA telecommuters must use encrypted loaner systems, Beutel said.

"Employees are being directed to review the information contained on their computers to ensure all sensitive information is appropriately encrypted at the file level, and to purge all unneeded sensitive files," he said.

The compromise isn't surprising considering that NASA has the lowest portable device encryption rate among all federal agencies, said John Pescatore, an analyst with Gartner Inc.

Originally published on Click here to read the original story.

Our Commenting Policies
Latest News
rssRss Feed
View more Latest News