X
Edition:
United States

  • Business
    • Business Home
    • Legal
    • Deals
    • Aerospace & Defense
    • Finance
    • Autos
    • Reuters Summits
  • Markets
    • Markets Home
    • U.S. Markets
    • European Markets
    • Asian Markets
    • Global Market Data
    • Indices
    • Stocks
    • Bonds
    • Currencies
    • Comm & Energy
    • Futures
    • Funds
    • Earnings
    • Dividends
  • World
    • World Home
    • U.S.
    • Special Reports
    • Reuters Investigates
    • Euro Zone
    • Middle East
    • China
    • Japan
    • Mexico
    • Brazil
    • Africa
    • Russia
    • India
  • Politics
    • Politics Home
    • Election 2016
    • Polling Explorer
    • Just In
    • What Voters Want
    • Supreme Court
  • Tech
    • Technology Home
    • Science
    • Top 100 Global Innovators
    • Environment
    • Innovation
  • Commentary
    • Commentary Home
    • Podcasts
  • Breakingviews
    • Breakingviews Home
    • Breakingviews Video
  • Money
    • Money Home
    • Retirement
    • Lipper Awards
    • Analyst Research
    • Stock Screener
    • Fund Screener
  • Rio 2016
  • Pictures
    • Pictures Home
    • The Wider Image
    • Photographers
    • Focus 360
  • Video
Exclusive: U.S. Treasury's intelligence network vulnerable to hack - audit
  • Africa
    América Latina
  • عربي
    Argentina
  • Brasil
    Canada
  • 中国
    Deutschland
  • España
    France
  • India
    Italia
  • 日本
    México
  • РОССИЯ
    United Kingdom
  • United States
Cyber Risk | Thu Jul 23, 2015 9:18pm EDT

Exclusive: U.S. Treasury's intelligence network vulnerable to hack - audit

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in a photo illustration in Paris April 15, 2014.  REUTERS/Mal Langsdon
A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in a photo illustration in Paris April 15, 2014. REUTERS/Mal Langsdon
By Jason Lange | WASHINGTON

WASHINGTON Lax security left the U.S. Treasury's computer system for tracking overseas threats to America's financial system vulnerable to hackers, according to a government audit prepared in late 2014 and obtained by Reuters.

The Treasury Foreign Intelligence Network is used by U.S. spy agencies to share top-secret information and to keep tabs on the impact of sanctions against countries such as Iran and Russia, as well as militant groups like Hezbollah.

The report, prepared in September 2014, gave no indication the foreign intelligence network had been hacked. But auditors found up to 29 percent of Treasury's devices connected to the intelligence network did not meet federal cybersecurity standards. (bit.ly/1IgUM5K)

"As a result ... devices may not be protected with the most secure recommended configurations, increasing the risk of being compromised," the Treasury's Office of Inspector General, or OIG, said.

A copy of the audit was obtained on Thursday through a U.S. Freedom of Information Act request. A Treasury official said the OIG had identified a "minor issue on a very secure system."

"Since the release of the audit, Treasury has remedied this matter," the official said.

The report comes to light following the revelation of the theft by hackers of millions of U.S. government personnel files. America's intelligence chief has said that hack was linked to China, although U.S. officials say the government does not plan to publicly blame Beijing.

Intelligence analysts use the Treasury's system to identify overseas threats to America's economy and finances. Treasury Secretary Jack Lew said last year the prospect of a cyber attack on the U.S. financial system was a "real threat" to national security.

The Treasury's intelligence system is also used to assess the economic disruption caused by U.S. sanctions on targeted countries, groups and individuals.

In a controversial deal that faces fierce opposition in Congress, the Obama administration has agreed to ease sanctions on Iran if Tehran scales back its nuclear program.

Treasury originally designed its foreign intelligence network in 2004 to be used by about 30 officials but built up the system to accommodate more users as America stepped up its global campaign against al Qaeda and other militant groups.

Between March and May of 2014, OIG auditors conducting an annual review of the Treasury's cybersecurity found some computers using Microsoft Corp's (MSFT.O) Windows had not been properly configured.

That meant network engineers would have trouble updating security software for the sensitive network's computers, servers and printers, the audit said.This was not the first time auditors had found the top secret Treasury system lacking. In a 2008 audit, the OIG found the Treasury Foreign Intelligence Network was slow in upgrading a system that had relied on "antiquated hardware and software."

In a letter attached to the 2014 report, the Treasury's top intelligence officer, S. Leslie Ireland, said she agreed with the OIG's findings. Treasury officials were already working to close the security gap and planned to finish that job by April 2015, about six months after the audit, Ireland said.

(Reporting by Jason Lange; Additional reporting Yeganeh Torbati; Editing by Kevin Krolicki and Lisa Shumaker)

Trending Stories

    Editor's Pick

    LIVE: Election 2016

    Sponsored Topics

    Next In Cyber Risk

    Business groups petition China's premier on cyber rules

    BEIJING In a letter addressed to Chinese Premier Li Keqiang, 46 global business groups spanning finance, information technology, insurance and manufacturing urged Beijing to revise its draft cyber rules which they said would hamper trade.

    Australia's controversial census in chaos after possible cyber attack

    SYDNEY Australia's first online national census was in chaos on Wednesday after the survey website crashed overnight due to a possible cyber attack, raising concerns over the country's cyber security and criticism of its slow internet services.

    Philippine bank says it preserves ties with big U.S. banks despite heist role

    MANILA Rizal Commercial Banking Corp (RCBC) officials say they have preserved ties with major U.S. banks despite the use of one of its branches in Manila by cyber criminals to funnel $81 million stolen from the Bangladesh central bank’s account at the Federal Reserve Bank of New York.

    MORE FROM REUTERS

    From Around the Web By Taboola

    Sponsored Content By Dianomi

    X
    Follow Reuters:
    • Follow Us On Twitter
    • Follow Us On Facebook
    • Follow Us On RSS
    • Follow Us On Instagram
    • Follow Us On YouTube
    • Follow Us On LinkedIn
    Subscribe: Feeds | Newsletters | Podcasts | Apps
    Reuters News Agency | Brand Attribution Guidelines | Delivery Options

    Reuters is the news and media division of Thomson Reuters. Thomson Reuters is the world's largest international multimedia news agency, providing investing news, world news, business news, technology news, headline news, small business news, news alerts, personal finance, stock market, and mutual funds information available on Reuters.com, video, mobile, and interactive television platforms. Learn more about Thomson Reuters products:

    Eikon
    Information, analytics and exclusive news on financial markets - delivered in an intuitive desktop and mobile interface
    Elektron
    Everything you need to empower your workflow and enhance your enterprise data management
    World-Check
    Screen for heightened risk individual and entities globally to help uncover hidden risks in business relationships and human networks
    Westlaw
    Build the strongest argument relying on authoritative content, attorney-editor expertise, and industry defining technology
    ONESOURCE
    The most comprehensive solution to manage all your complex and ever-expanding tax and compliance needs
    CHECKPOINT
    The industry leader for online information for tax, accounting and finance professionals

    All quotes delayed a minimum of 15 minutes. See here for a complete list of exchanges and delays.

    • Site Feedback
    • Corrections
    • Advertise With Us
    • Advertising Guidelines
    • AdChoices
    • Terms of Use
    • Privacy Policy