Risk
4/10/2008
05:28 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Sensitive Military Gear Hawked On eBay, Craigslist

GAO investigators were able to buy two F-14 components from separate sellers, special night-vision goggles, body armor vests, and body armor protective plates.

Sensitive military items are being offered for sale through eBay and Craigslist, the Government Accountability Office said in a report issued Thursday, a practice that puts U.S. service members and allies at risk.

"GAO found numerous defense-related items for sale to the highest bidder on eBay and Craigslist," the report said. "A review of policies and procedures for these Web sites determined that there are few safeguards to prevent the sale of sensitive and stolen defense-related items using the sites."

The GAO conducted its investigation between January 2007 and March 2008. Through eBay and Craigslist, the agency's investigators were able to buy two F-14 components from separate sellers, night-vision goggles with a sensitive component that allows U.S. service members to identify friendly forces, an Army combat uniform "that could be used by a terrorist to pose as a U.S. service member," body armor vests, and body armor protective plates.

The GAO report expressed concern that items such as the protective gear could be reverse engineered by adversaries in order to design countermeasures.

The government oversight agency characterized its findings as a snapshot rather than a comprehensive list of available sensitive items. Its investigation did not test whether export controls would have stopped the shipment of such items overseas. Nor did it test whether property management problems in the Department of Defense contributed to availability these items.

The GAO has previously reported on difficulties the government has had keeping track of its property. As the report notes, "Our prior reports found that control breakdowns at DOD allowed members of the general public to acquire sensitive defense-related items, including F-14 components, from the Government Liquidation Web site; these items had not been demilitarized properly."

In a statement to a congressional subcommittee Thursday morning, Jim Buckmaster, CEO of Craigslist, said that GAO mischaracterized his site by calling it "a global marketplace with international reach." He said it was a collection of separate, local marketplaces and that sales involving shipping are rare and strongly discouraged. He said that Craigslist nonetheless does not accept misuse of its site and is eager to solve this problem.

"Contrary to what the GAO report implies, Craigslist has more people actively engaged in its anti-fraud efforts than any Web site on earth," said Buckmaster. "In addition to our in-house anti-fraud team numbering a dozen or more staff members, and the automated blocking and screening routines we have developed, Craigslist benefits from tens of millions of passionate users diligently reviewing every ad on the site, with each user having the power to delete inappropriate ads, which power they exercise to the tune of several million ads removed each month."

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.