[ISN] Justice IG report: Protect laptop data

InfoSec News isn at c4i.org
Tue Oct 11 00:02:41 EDT 2005


http://www.fcw.com/article91061-10-10-05-Web

By Michael Arnone
Oct. 10, 2005 

Justice Department field agents and analysts are keeping classified 
information secure by using their wits and their training - and by 
carrying two laptop computers each. One is strictly for processing 
classified data. The other is for handling unclassified data and using 
unclassified applications, such as word processors and Web browsers. 

Justice employees use the decades-old setup to prevent the accidental 
shift of classified information to an unclassified environment or the 
Internet. It works, but it's bulky and inconvenient. 

Justice's Office of the Inspector General investigated how the 
department uses laptops to process classified information. At the 
suggestion of the department's information technology and security 
staff, the IG also evaluated governmentwide policy on IT security 
certification for all computer systems.

Justice increasingly relies on laptops to process classified 
information. But the department's rules governing those resources do 
not encourage "innovative practices to improve the use of portable 
computers for processing classified information while adequately 
safeguarding classified information," the IG's office concluded in a 
July report.

The report states that Justice's chief information officer should 
alter Standard 1.6, which dictates the departmentwide IT security 
management controls for all desktop and laptop computers that handle 
classified information. The IG said the rules should allow the 
creation of new, accredited computer configurations that permit the 
introduction of security-enhancing safeguards. 

Some of the recommendations the report suggests aren't new, such as 
encrypting data and limiting the data kept on classified hard drives. 
But others would be new for Justice, including the use of small 
removable hard drives.

"The use of removable hard drives that can process both unclassified 
and classified information in the same computer shell is an area that 
the department should consider," the report states. Justice should 
consider authorizing the use of removable hard drives and developing 
appropriate security policies for them, it adds.

Justice organizations are open to the idea of using removable hard 
drives, but some worry that employees might not always follow security 
procedures. IT security experts don't agree on whether the 
recommendations would help or damage the security of Justice's 
classified information. 


A pocket-sized solution

The policy recommendation on removable hard drives is the IG's 
principal improvement to Justice's management of classified 
information on laptops. Measuring roughly 2 inches by 3 inches, each 
drive weighs about 2 ounces and fits into the Type II PC card slots 
found on most laptops. 

Justice's IG consulted the CIA, the National Security Agency, the 
Defense Department's National Reconnaissance Office and the Energy 
Department about their policies on removable hard drives. The first 
three agencies use laptops with two removable hard drives, one each 
for classified and unclassified information. 

NSA officials told the IG's office that a computer's shell does not 
retain data once users remove the hard drive, adding that no data 
remains in the computer's RAM when users turn the machine off. Thus, 
Standard 1.6 should state that the shell of the computer becomes 
unclassified when someone removes the classified hard drive, according 
to the report. 

In addition to halving the number of laptops that Justice employees 
must carry to handle classified information, removable hard drives 
would provide a number of benefits, the report states. For example, 
storing classified data would be easier. 

Justice policies require computers that handle classified data to be 
double-wrapped in paper to show tampering, the report states. Users 
must unhook all peripheral devices and place the computer in a 
specially designed, secure container when they are not using the 
computers. All devices that could possibly store classified 
information must have warning labels on them stating so.

If the department used removable hard drives, only the drives would 
have to be double-wrapped instead of the whole laptop. That 
arrangement would improve security, the IG's office said, because the 
small drives are easier to secure and are less conspicuous than 
textbook-sized laptops.

Removable hard drives would also save Justice money because the drives 
are cheaper than new computers, according to the report. The IG's 
office shopped for 5G drives and found at least two manufacturers that 
sell models for less than $200. The drives could hold a multiuser 
operating system, application software and 4.1G of memory. 

For roughly $400 per user, the report states, "this computer 
configuration would allow both unclassified and classified information 
processing on the same computer." 


Mixed opinions 

The IG office asked three Justice organizations — the Drug Enforcement 
Administration, the FBI and the Executive Office for U.S. Attorneys 
(EOUSA) — whether they authorize their employees to use separate hard 
drives, and if not, whether they would consider doing so. 

None of those agencies authorizes the use of removable hard drives, 
the report states. The FBI said the idea has merit, but it would have 
to evaluate the specifics through the certification and accreditation 
process. EOUSA expressed interest in pursuing the idea as long as 
employees understood the security requirements. The DEA had a mixed 
reaction, saying that the idea could save money, but the risk of 
failing to switch hard drives when necessary could outweigh those 
benefits. 

Paul Martin, Justice's deputy IG, said the report speaks for itself 
and declined to comment.

IT security experts have mixed opinions about the IG's 
recommendations. Bruce Schneier, chief technology officer at 
Counterpane Internet Security, said the report was well-conceived. He 
liked the idea of removable hard drives and the suggestion to install 
tracking devices in laptops to help find lost and stolen computers.

Peter Lindstrom, research director at Spire Security, had more 
reservations about the report's implications. "I don't see a clear 
positive or negative impact on security at all, but it seems to have a 
pretty positive impact on costs - and on [Justice employees'] 
shoulders as well because they only have to carry one laptop," he 
said.

Schneier and Lindstrom said they were amazed that Justice had not 
already made such changes. Lindstrom said he was disappointed that 
Justice didn't think of the idea on its own.

The department is starting to understand that its employees need to do 
both classified and unclassified work on their computers, Schneier 
said. But if those recommendations are an improvement, he added, "it 
must be an absolute mess out there."


Frying pan to fire?

Lindstrom and Schneier disagree on whether removable hard drives 
present a definite security improvement or add as many problems as 
they solve. 

Because it's so easy to make a mistake, "maintaining two sets of 
policies, switching back and forth, is a losing proposition over 
time," Lindstrom said. "I'm not sure that a user in the normal course 
of business would shift back and forth between their behavior around 
classified and unclassified information. You're better off configuring 
the system to force that behavior." 

Schneier disagreed, saying a hardware solution is the best solution 
because hardware is more reliably secure than software. That's why 
Justice's current system of securing and storing classified 
information has worked so well for decades, he said. 

"The best way to make sure classified information doesn't get taken 
out of the building is not to take it out of the building" and keep it 
locked in a safe when not in use, Schneier said.

Schneier said running two removable hard drives with separate 
operating systems and applications on the same computer shell is a 
great idea, especially if Justice follows the IG's suggestion to bar 
access to unclassified information and the Internet while the 
classified drive is in use. 

"That's the best separation you can do," Schneier said. "You might as 
well share a screen, keyboard and CPU." 

Schneier said he wondered whether laptops enabled for such 
configurations are available and how much they cost. He could see 
Justice's proposed practices spreading to DOD and other countries.

On the other hand, Lindstrom isn't sold on the idea of two hard 
drives. To make the system work, Justice would presumably have to buy 
laptops that don't have hard drives, he said. That would force users 
to use the security settings on each removable drive. But if the 
removable drives supplemented the laptop's drive, users could 
accidentally transfer classified information to the unprotected drive, 
he said. 

"As soon as you mount drives at the same time, the fact that they are 
physical devices doesn't matter anymore" because the two are logically 
connected, Lindstrom said. That gives attackers ways to crack the 
unclassified applications to access the classified drive. 

Logical security is the best way to protect data, Lindstrom said. 
Justice could encrypt all data and set up a host intrusion- prevention 
system and digital rights management system, he said. Instead of 
worrying about where to put data, the department should protect its 
data regardless of its location, Lindstrom said. 

By using only one hard drive with adequate security protections, 
Lindstrom said, Justice could potentially save even more money by not 
implementing the IG's recommendations.

[1] http://www.usdoj.gov/oig/reports/plus/a0532/final.pdf


-=-


8 ways to improve security 

The Justice Department's inspector general has suggested the following 
eight changes for improving the security of laptop PCs that process 
classified information.

1. Alter Standard 1.6 - the departmentwide security management 
   controls for all desktop and laptop machines that store, process or 
   transmit national security information - to allow the creation of 
   new accredited computer configurations that permit the introduction 
   of security-enhancing safeguards.

2. Consider using removable hard drives and define them as 
   classifiable devices rather than the computer shell on which users 
   process data. Justice should create appropriate security policies 
   for them. 

3. Modify user profiles to forbid access to unclassified hard drives 
   and the Internet when using a classified drive. 

4. Change Standard 1.6 to support mandatory encryption of classified 
   data. 

5. Keep only a minimal amount of classified data on hard drives, in 
   accordance with National Security Agency practices. 

6. Develop a warning system to alert systems administrators if a 
   computer processing classified information connects to the 
   Internet.

7. Install tracking devices in laptop PCs to more easily locate lost 
   or stolen computers. 

8. Create new labels for computers that process both classified and 
   unclassified data.

- Michael Arnone





More information about the ISN mailing list