Feeds

Top NASA scientist busted for leaking satellite intel

Key networks not secured

The Power of One eBook: Top reasons to choose HP BladeSystem

A former NASA scientist who helped discover evidence of water on the moon has been arrested on charges he tried to sell Israel classified information about US military satellite systems.

Stewart Nozette, 52, of Maryland, was arrested in a sting in which an FBI agent posed as an Israeli intelligence officer. According to federal prosecutors, he demanded money and a new Israeli passport in exchange for the sensitive information, which he obtained while working with a high security clearance for the US space agency.

The charges came Monday, just a few days after a government watchdog agency warned congress that NASA has failed to adequately secure its computer networks against hackers, terrorists, and hostile nations. The report (PDF) from the Government Accountability Office cited a long list of shortcomings, including the lack of sufficient systems to authenticate users who access the system.

The shortcomings "make it possible for intruders, as well as government and contractor employees, to bypass or disable computer access controls and undertake a wide variety of inappropriate or malicious acts," the report concluded. "As a result, increased and unnecessary risk exists that sensitive information is subject to unauthorized disclosure, modification, and destruction and that mission operations could be disrupted."

NASA networks and systems have already been successfully targeted by attackers, the report said. During fiscal years 2007 and 2008, NASA reported 1,120 incidents that resulted in malware being installed and unauthorized access to sensitive information. Last year, the space agency established a security operations center to prevent attacks. While NASA has made important progress in securing its networks, it still faces serious shortcomings.

"NASA has not yet fully implemented key activities of its information security program to ensure that controls are appropriately designed and operating effectively," the report said. "Despite actions to address prior security incidents, NASA remains vulnerable to similar incidents."

The charges leveled against Nozette suggest that NASA isn't the only US government agency that was affected by the breach. In addition to his research into lunar poles, he also held top security clearances from the Energy Department's Lawrence Livermore National Laboratory. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.