Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Hackers break into Energy's computer networks, put employees at risk
Friday - 8/16/2013, 4:36pm EDT
More than 14,000 current and former Energy Department employees are at risk of identity theft. For a second time this year, DoE confirmed hackers broke into its unclassified computer network, which disclosed employees' personally identifiable information (PII).
"Individual notifications to affected current employees will begin no later than this Friday, Aug. 16, and will be completed by Aug. 30," stated an internal Energy Department email sent to employees earlier this week, which was obtained by Federal News Radio. "While a significant number of employees whose information may have been affected may no longer be employed by the department, it will be necessary to obtain current contact information in order to notify these personnel. The individual notification process for former employees will begin this week."
DoE told employees it is working with federal law enforcement agencies to find out more about the hacking incident, which happened at the end of July.
"No classified data was targeted or compromised," the email stated. "Once the full nature and extent of this incident is known, the department will implement a full remediation plan."
This is yet another in a growing list of hacking incidents for Energy in the last couple of years.
In February, Energy said the attack disclosed employee PII, but didn't offer any details of how many or which parts of the agency were affected.
In June 2012, the FBI charged a man for trying to sell access to DoE's network to an undercover agent.
In 2011, Energy's lab went offline for almost two weeks after a cyber attack against the Northwest National Laboratory in Washington state limited Internet access and took down its website.
The Energy Inspector General reported in December that the department lacked a unified cybersecurity incident management strategy. Auditors said Energy maintained a number of independent, at least partially duplicative, cybersecurity incident management capabilities that created inefficiencies in the process and security of the network.
Since the report, Energy CIO Bob Brese told Federal News Radio in December he's trying to modernize the agency's network in layers and start up a new security operations center. Energy created a Joint Cybersecurity Coordination Center that consolidated its reporting and information sharing across all of DoE, including its labs and offices.
Former Energy Chief Information Security Officer Gil Vega said in April Energy faced a zero day attack earlier this year and responded quickly because of the cyber threat intelligence coming from the coordination center.