recommended reading

What Does Alleged iCloud Hack Mean For Federal Agencies?

Gil C/

Most federal agency employees with iPhones probably don't have to worry about hackers ogling naked photos of them saved in Apple’s iCloud backup system.

But they might have cause for concern about attackers targeting the cloud service to peer at sensitive government information, cybersecurity experts warn. 

The problem, experts say, is a lack of awareness. iCloud, by default, automatically backs up a user’s device over Wi-Fi every day, according to Apple's website.

Federal employees could be uploading sensitive information when they work on their personally owned iPhones -- unless agencies take action. And it is not clear that they are.

"Most people have no concept that the data goes out to different places," said Kevin Johnson, CEO of Secure Ideas, a company that tests federal systems for security holes.

The concerns, however, appear to be largely limited to employees’ personal devices. The federal agencies contacted by Nextgov said they blocked access to iCloud on government-owned devices -- and even some personal devices -- as a matter of agency policy.

Concerns Not Limited to Apple

Over the weekend, cybercrooks allegedly snatched explicit photos from the iCloud accounts of dozens of female celebrities, including Oscar winner Jennifer Lawrence, and dumped some of them online. Whether this was done through a bug in Apple's infrastructure, surveillance software, cracking each celeb’s password or a combination of the above is unclear.

But if federal employees don’t know to disable the service, iCloud could potentially save the GPS coordinates of undisclosed federal facilities, wireless device configurations, work documents an employee wants to work on at home and office photos, among other things.  

Those worries aren’t limited to Apple.

"Some Android phones automatically sync to [cloud storage site] Dropbox, which is even more of a concern because Dropbox is designed to be used for any file type, whereas iCloud is for specific types," Johnson said.

Jerry Irvine, a member of the National Cyber Security Partnership, a public-private organization, said personal devices synced to iCloud or any other uncontrolled third-party cloud certainly present a threat to the government.

The "phone itself is connected to the agency's network and the iCloud," he said. "If a federal employee or a consultant is allowed to bring their personal iPhone into the work environment, that is a potential risk."

Irvine, who consults for state and local agencies, added: “They could send emails. They could see emails. All of that could be saved to the cloud without knowledge of the federal government.”

It's unclear what role, if any, the Department of Homeland Security, which supervises federalwide cybersecurity, plays in regulating agencies bring-your-own device, or BYOD, policies. DHS declined to comment. 

The most recent BYOD guidance from the White House is two years old and does not address cloud access.

Agency-Owned Devices More Likely to be Protected

Unlike individually purchased smartphones, government-owned iPhones are more likely to be protected, security professionals and agencies say.

Immigration and Customs Enforcement, for example, deactivates iCloud on each iPhone the agency issues to employees, ICE officials told Nextgov

"Restrictions are enforced using device policy settings installed on every iPhone ICE provides employees," agency spokesman Brandon Montgomery said in an email. iCloud is not sanctioned for storing agency data, ICE officials said. 

At the General Services Administration, software that centrally manages personnel's smartphone use, called MaaS360, disables iCloud on both BYOD phones and GSA-owned phones, agency officials told Nextgov

"GSA does not allow document-sync to iCloud," agency spokeswoman Jackeline Stewart said in an email. 

NASA spokesman Allard Beutel told Nextgov "iCloud is not approved" for storing and processing NASA data, regardless of whether it’s used on a NASA-owned or a BYOD device. Space agency officials were unable to immediately comment on how they enforce the ban. 

As news of the hack surfaced, security researchers described a method for exploiting an iCloud weakness -- nicknamed iBrute, for "brute force" -- that allowed infiltrators to test tons of password attempts without locking the account. Apple released a patch for the vulnerability shortly afterward. 

On Monday, Apple denied the security of the iCloud system was responsible for the breach. An investigation into the incident is still ongoing.

"We have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions," the company said in a statement. "None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud.”

(Image via Gil C/

Threatwatch Alert

Network intrusion / Software vulnerability

Hundreds of Thousands of Job Seekers' Information May Have Been Compromised by Hackers

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.