US agency destroys keyboards, mice to get rid of viruses

The Economic Development Administration (EDA) is an agency in the US Department of Commerce that promotes economic development in regions of the US suffering low growth, low employment, and other economic problems. In December 2011, the Department of Homeland Security notified both the EDA and the National Oceanic and Atmospheric Administration (NOAA) that there was a potential malware infection within the two agencies’ systems.

The NOAA isolated and cleaned up the problem within a few weeks.

The EDA, however, responded by cutting its systems off from the rest of the world — disabling its enterprise email system and leaving its regional offices no way of accessing centrally-held databases.

It then recruited in an outside security contractor to look for malware and provide assurances that not only were EDA’s systems clean, but also that they were impregnable against malware. The contractor, after some initial false positives, declared the systems largely clean but was unable to provide this guarantee. Malware was found on six systems, but it was easily repaired by reimaging the affected machines.
Ars Technica

EDA’s CIO, fearing that the agency was under attack from a nation-state, insisted instead on a policy of physical destruction. The EDA destroyed not only (uninfected) desktop computers but also printers, cameras, keyboards, and even mice. The destruction only stopped — sparing $3 million (£2 million) of equipment — because the agency had run out of money to pay for destroying the hardware.

The total cost to the US taxpayer of this incident was $2.7 million (£1.8 million): $823,000 (£550,000) went to the security contractor for its investigation and advice, $1,061,000 (£710,000) for the acquisition of temporary infrastructure (requisitioned from the Census Bureau), $4,300 (£2,870) to destroy $170,500 (£114,000) in IT equipment, and $688,000 (£462,000) paid to contractors to assist in development a long-term response. Full recovery took close to a year.

The full grim story was detailed in Department of Commerce audit released on 26 June, subsequently reported by Federal News Radio.

The EDA’s overreaction is, well, a little alarming. Although not entirely to blame — the Department of Commerce’s initial communication with EDA grossly overstated the severity of the problem (though corrected its error the following day) — the EDA systematically reacted in the worst possible way. The agency demonstrated serious technical misunderstandings — it shut down its email servers because some of the emails on the servers contained malware, even though this posed no risk to the servers themselves — and a general sense of alarmism.

The malware that was found was common stuff. There were no signs of persistent, novel infections, nor any indications that the perpetrators were nation-states rather than common-or-garden untargeted criminal attacks. The audit does, however, note that the EDA’s IT infrastructure was so badly managed and insecure that no attacker would need sophisticated attacks to compromise the agency’s systems.

This story originally appeared on ars technica

As published on

About Shailendra Nair

I am full-time IT professional, with excellent exposure in Information technology management, mission critical business application & development, Information security & advisory practice . I have been in the field for little over 13 + years have significant achievement and set new trends in the field & Industry. Grandson of late Indian freedom fighter from Kerala, I am photographer , blogger, guitarist by hobby , adamant NOT arrogant, travel & foodie at heart, globe trotting road warrior , multidimensional thinker & dreamer.
This entry was posted in Technology and tagged . Bookmark the permalink.

Kindly leave your feedback or suggestions

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s