recommended reading

Commerce Trashes $170,000 Worth of Tech to Disinfect Imaginary Viruses

Biehler Michael/

After detecting malicious software in system components at Commerce Department headquarters, federal officials in 2012 disconnected the Economic Development Administration's computer infrastructure, annihilated $170,000 worth of equipment and cut off staff email and data access nationwide, according to an internal audit

The mitigations were overkill.  But department officials would not discover this until more than a year later.

The Commerce inspector general’s office "found neither evidence of a widespread malware infection nor support for EDA’s decision to isolate its IT systems" from the building's network, states a June 26 evaluation.  

In late 2011, the Homeland Security Department, which monitors federal networks for abnormal activity, notified Commerce about possible worms in the department’s systems.

Commerce traced the problem to parts of systems on the headquarters’ network, which supports the Economic Development Administration. That agency, which also has six regional offices, works to encourage U.S. entrepreneurship and competitiveness.

Believing the issue was widespread, the Economic Development Administration asked Commerce to first disconnect its systems from the Herbert C. Hoover Building’s network, according to the IG report. As a result, in January 2012, all employees inside and outside Washington lost access to email and websites. Personnel outside the Beltway also lost connectivity to database applications and other information at headquarters.

Agency officials “concluded that the risk, or potential risk, of extremely persistent malware and nation-state activity (which did not exist) was great enough to necessitate the physical destruction of all of EDA’s IT components," the audit states. Officials subsequently demolished desktops, printers, TVs, cameras, computer mice, keyboards and other IT parts priced at more than $170,000.  

It wasn’t until April that the agency brought the workforce back online using alternative services. But the demolition continued.

"By Aug. 1, 2012, EDA had exhausted funds for this effort and therefore halted the destruction of its remaining IT components, valued at over $3 million," the auditors wrote. 

One cause for the confusion: The department Computer Incident Response Team member assigned to the job was unqualified. The incident handler “had minimal incident response experience, no incident response training, and did not have adequate skills to provide incident response services,” the report states. Rather than hand the agency a list of possibly infected components, the employee mistakenly provided a roster of 146 components within the network. Only six parts were contaminated.

In total, the agency spent more than $2.7 million—over half of its fiscal 2012 budget -- on recovery efforts.  

Not until the IG informed Commerce that there was no malware plague did the department take steps to recover earlier this year, the auditors wrote. The repairs took five weeks, in contrast to the one year the agency wasted chasing after ghost viruses. 

The Verge first reported the inspector general's findings on Monday.  

In a June 12 response to a draft audit, Commerce officials defended the safety measures taken.

"EDA acted out of an abundance of caution in an effort to protect the IT security and privacy of our staff, the Department of Commerce, grantees, other federal partners and clients with whom we interacted electronically," wrote Matt Erskine, Commerce deputy assistant secretary for economic development. "Despite the disruption, EDA continued to conduct and complete its important work and provided its grantees and applicants with excellent customer service."

(Image via Biehler Michael/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.