recommended reading

Commerce Trashes $170,000 Worth of Tech to Disinfect Imaginary Viruses

Biehler Michael/Shutterstock.com

After detecting malicious software in system components at Commerce Department headquarters, federal officials in 2012 disconnected the Economic Development Administration's computer infrastructure, annihilated $170,000 worth of equipment and cut off staff email and data access nationwide, according to an internal audit

The mitigations were overkill.  But department officials would not discover this until more than a year later.

The Commerce inspector general’s office "found neither evidence of a widespread malware infection nor support for EDA’s decision to isolate its IT systems" from the building's network, states a June 26 evaluation.  

In late 2011, the Homeland Security Department, which monitors federal networks for abnormal activity, notified Commerce about possible worms in the department’s systems.

Commerce traced the problem to parts of systems on the headquarters’ network, which supports the Economic Development Administration. That agency, which also has six regional offices, works to encourage U.S. entrepreneurship and competitiveness.

Believing the issue was widespread, the Economic Development Administration asked Commerce to first disconnect its systems from the Herbert C. Hoover Building’s network, according to the IG report. As a result, in January 2012, all employees inside and outside Washington lost access to email and websites. Personnel outside the Beltway also lost connectivity to database applications and other information at headquarters.

Agency officials “concluded that the risk, or potential risk, of extremely persistent malware and nation-state activity (which did not exist) was great enough to necessitate the physical destruction of all of EDA’s IT components," the audit states. Officials subsequently demolished desktops, printers, TVs, cameras, computer mice, keyboards and other IT parts priced at more than $170,000.  

It wasn’t until April that the agency brought the workforce back online using alternative services. But the demolition continued.

"By Aug. 1, 2012, EDA had exhausted funds for this effort and therefore halted the destruction of its remaining IT components, valued at over $3 million," the auditors wrote. 

One cause for the confusion: The department Computer Incident Response Team member assigned to the job was unqualified. The incident handler “had minimal incident response experience, no incident response training, and did not have adequate skills to provide incident response services,” the report states. Rather than hand the agency a list of possibly infected components, the employee mistakenly provided a roster of 146 components within the network. Only six parts were contaminated.

In total, the agency spent more than $2.7 million—over half of its fiscal 2012 budget -- on recovery efforts.  

Not until the IG informed Commerce that there was no malware plague did the department take steps to recover earlier this year, the auditors wrote. The repairs took five weeks, in contrast to the one year the agency wasted chasing after ghost viruses. 

The Verge first reported the inspector general's findings on Monday.  

In a June 12 response to a draft audit, Commerce officials defended the safety measures taken.

"EDA acted out of an abundance of caution in an effort to protect the IT security and privacy of our staff, the Department of Commerce, grantees, other federal partners and clients with whom we interacted electronically," wrote Matt Erskine, Commerce deputy assistant secretary for economic development. "Despite the disruption, EDA continued to conduct and complete its important work and provided its grantees and applicants with excellent customer service."

(Image via Biehler Michael/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.