Cracks in security leave DHS financial systems vulnerable to abuse

Investigators posing as technicians tricked employees into sharing passwords, and auditors found credit cards, laptops and sensitive information lying around offices after hours.

Security weaknesses in the computers that track money for the Homeland Security Department could lead to a substantial mistake in the agency's financial statements, according to a federal audit.

KPMG analysts hired by the DHS inspector general to assess the department's various financial systems for the fiscal year ending Sept. 30, 2010, found about 160 deficiencies, or inadequate controls, most of which -- 65 percent -- were repeats of the previous year's problems. The IG office released a redacted version of the April 26 report on Monday.

Among the information technology inadequacies highlighted: ex-employees were still able to logon to their accounts and unauthorized outsiders successfully acquired user passwords from DHS personnel.

"Collectively, the IT control deficiencies limited DHS' ability to ensure that critical financial and operational data were maintained in such a manner to ensure confidentiality, integrity and availability," the report stated. "We consider them to collectively represent a material weakness for DHS" based on accounting industry standards.

An auditor impersonating a help-desk employee tricked unwitting DHS staff into providing their system user names and passwords at several agencies, according to the assessment. Recently, hackers used this increasingly popular tactic, known as social engineering, to gain entry into and steal data from federal contractor RSA Security. In that incident, the culprits posed as a recruiting website and sent company employees human resources-related emails containing malicious software that obtained access to the RSA network.

KPMG analysts used a less sophisticated lure -- a phone call. Masquerading as DHS technical support staff, auditors dialed randomly selected employees at DHS agencies and asked them to provide user passwords to help fix a network issue. At Customs and Border Protection, two of the 16 people who answered the phone divulged their network passwords. At the Transportation Security Administration, the fake technicians snagged three passwords, after an unspecified number of attempts.

At the Federal Emergency Management Agency, several personnel shared their user IDs and passwords, the report said. Some staff, however, looked up the imposters' assumed names in an agency directory to check identification, asked for help desk ticket numbers, or reported the attempted breaches to supervisors.

The audit did not say how many employees handed over their passwords at each DHS component.

KPMG analysts also discovered that some agencies neglected to promptly disable the accounts of employees who stopped working for the agency. CBP staff shutdown ex-employee accounts bi-weekly, a violation of agency policy that requires deactivation on the employees' last day. And at Immigration and Customs Enforcement, someone accessed the account of a former employee, even though the agency had installed a feature that disables user accounts after 45 days of inactivity.

While attempting to physically break into systems after hours, investigators found employees left government credit cards, financial system user IDs and passwords, laptops, and server names and network addresses, unguarded in their cubicles or offices.

At FEMA, analysts noted seeing large stacks of documents and compiled spreadsheets that contained sensitive, personal information belonging to business partners. Auditors also found a non-locking server room.

The departmentwide inspection determined that many agencies were either not monitoring audit logs for potential cyber incidents, or they assigned personnel with conflicting roles to review the logs.

For example, at the Coast Guard, staff were not recording and reviewing all failed log-in attempts. At CBP, personnel were not reviewing security audit logs for the system that keeps track of commercial goods entering the United States. Meanwhile, a FEMA employee with "super user" system administration access was responsible for monitoring other super users' activity, a duty that should have been delegated to a separate individual without those access privileges.

An examination of IT system performance found that many DHS agencies, including the Coast Guard, ICE and U.S. Citizenship and Immigration Services, could not install mechanisms to prevent duplicate payments. One unnamed component disbursed duplicate payments two times during 2009 and 2010.

Homeland Security recently abandoned long-held aspirations of deploying a unified finance, acquisition and asset management system, following several procurement protests.

In an undated letter attached to Monday's audit, DHS Acting Chief Financial Officer Peggy Sherry, Chief Information Officer Richard Spires, and Chief Information Security Officer Robert West said that they agreed with the findings in a draft report.

The CIO and CFO "continue to work jointly in ensuring the timely remediation of financial system security weaknesses and strengthening the department's information systems controls environment," they wrote.

On Tuesday afternoon, a DHS spokesman said in a statement that the department "takes this, and all audits, very seriously as indicated by the response to the auditors' findings and recommendations in the report. As in the past, all audit findings will be addressed through the department's formal plan-of-attack and milestones process. Over the last two years, the department has made significant progress in improving the security and functionality of our financial systems, and we will continue to improve in the future."

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.