Risk
4/10/2008
05:28 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Sensitive Military Gear Hawked On eBay, Craigslist

GAO investigators were able to buy two F-14 components from separate sellers, special night-vision goggles, body armor vests, and body armor protective plates.

Sensitive military items are being offered for sale through eBay and Craigslist, the Government Accountability Office said in a report issued Thursday, a practice that puts U.S. service members and allies at risk.

"GAO found numerous defense-related items for sale to the highest bidder on eBay and Craigslist," the report said. "A review of policies and procedures for these Web sites determined that there are few safeguards to prevent the sale of sensitive and stolen defense-related items using the sites."

The GAO conducted its investigation between January 2007 and March 2008. Through eBay and Craigslist, the agency's investigators were able to buy two F-14 components from separate sellers, night-vision goggles with a sensitive component that allows U.S. service members to identify friendly forces, an Army combat uniform "that could be used by a terrorist to pose as a U.S. service member," body armor vests, and body armor protective plates.

The GAO report expressed concern that items such as the protective gear could be reverse engineered by adversaries in order to design countermeasures.

The government oversight agency characterized its findings as a snapshot rather than a comprehensive list of available sensitive items. Its investigation did not test whether export controls would have stopped the shipment of such items overseas. Nor did it test whether property management problems in the Department of Defense contributed to availability these items.

The GAO has previously reported on difficulties the government has had keeping track of its property. As the report notes, "Our prior reports found that control breakdowns at DOD allowed members of the general public to acquire sensitive defense-related items, including F-14 components, from the Government Liquidation Web site; these items had not been demilitarized properly."

In a statement to a congressional subcommittee Thursday morning, Jim Buckmaster, CEO of Craigslist, said that GAO mischaracterized his site by calling it "a global marketplace with international reach." He said it was a collection of separate, local marketplaces and that sales involving shipping are rare and strongly discouraged. He said that Craigslist nonetheless does not accept misuse of its site and is eager to solve this problem.

"Contrary to what the GAO report implies, Craigslist has more people actively engaged in its anti-fraud efforts than any Web site on earth," said Buckmaster. "In addition to our in-house anti-fraud team numbering a dozen or more staff members, and the automated blocking and screening routines we have developed, Craigslist benefits from tens of millions of passionate users diligently reviewing every ad on the site, with each user having the power to delete inappropriate ads, which power they exercise to the tune of several million ads removed each month."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jamie, the darn Unicorn is back."
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.