Porn activity detected at DHS (maybe)

The Homeland Security Department's internal computer network generated 65 million security alerts during a three-month period and 6.5 million of those may be linked to employees accessing pornographic words or materials, according to a report today from DHS inspector general Richard Skinner.

Nearly three-quarters of the automated "security event messages" and "detect.misuse.porn" alerts originated from 16 devices on the department's wide area network, according to the report. However, DHS could not identify the specific workstations that had generated the messages, the inspector general found.

Under DHS policy, employees are forbidden to access pornographic materials from workstations. However, the "detect.misuse.porn" message may not necessarily indicate pornography, the IG report explains in a footnote.

DHS' automated network security tools?which create warnings when detecting a possible breach of IT security?are programmed to look for pornographic keywords such as "oral." But sometimes alerts are generated when the keywords are embedded in other words, such as in "behavioral," the report said.

The security warnings are generated automatically by network security tools and are intended to help secure IT systems and detect hacking attempts and viruses.

DHS is not using those tools effectively, the audit found.

"DHS had not finalized procedures for identifying the source of those messages, or for coordinating appropriate actions with other technical and security organizations," the IG wrote. "DHS systems and data are at increased risk of service disruptions and security-related events if automated network security tools are not utilized effectively."

The number of security events increased dramatically in the last year. In July 2004, DHS was receiving about 5.4 million security event messages per month. In February, March and April 2005, the months in which the audit took place, there were 65 million such messages, the report said.

In addition, the DHS network did not have its security accreditations and certifications, the report added. DHS officials agreed with the findings and recommendations.

The inspector general also released a report on security risks for selected sensitive but unclassified mission-critical databases at DHS, and another on security vulnerabilities to the U.S. Visit visitor screening program.

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Our databases track awards back to 2013. Read More

  • Navigating the trends and issues of 2016 Nick Wakeman

    In our latest WT Insider Report, we pull together our best advice, insights and reporting on the trends and issues that will shape the market in 2016 and beyond. Read More

contracts DB

Washington Technology Daily

Sign up for our newsletter.

I agree to this site's Privacy Policy.