Feeds

Japan forgot data wipe on ship sold to Pyongyang

Former coast guard ship's navigation records reach NORKS

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

The Japanese government's data protection policies have been called into question after it emerged that a decommissioned coast guard vessel was sold to a pro-North Korea organisation without any checks as to whether key data on board was first deleted.

The 106-ton Japan Coast Guard patrol boat Takachiho was taken out of service in 2011 and sold to a ship breaker run by a senior figure from the General Association of Korean Residents in Japan (Chongryon), according to the Yomiuri Shimbun.

Chongryon, whose senior officials include members of North Korea’s Supreme People's Assembly, carries out many of the functions a NORKS embassy would have in Japan, as there are no formal diplomatic relations between the two countries.

Although radio equipment and weapons were removed from the Takachiho before its sale, it navigation system was left intact, with the 10th Regional Coast Guard Headquarters in Kagoshima admitting that no checks were made to ensure data records had been wiped.

According to the Yomiuri, the ship could have recorded as many as 6,000 locations over about 250 days when it was handed over.

“The vessel was sold in a state in which information regarding operational patterns of the patrol vessel could have been obtained by some party,” an official told the paper. “We were on low security alert at that time."

That is certainly not the case these days, with heightened tensions on the Korean peninsula and the Japanese coast guard regularly involved in patrols around the disputed Diaoyu (Senkaku) islands.

Although the chairman of the demolition firm, and Chongryon official, claimed that all parts of the boat were scrapped, the revelations will be an embarrassment for Japan in theoretically putting its national security at risk.

To make matters worse, the Coast Guard admitted that there were no policies in place to remove data recording equipment or wipe data before selling decommissioned vessels, meaning the same thing could have happened on other occasions.

That oversight has apparently been corrected now. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.