Navy reacts quickly to NMCI breach

The Navy has changed the passwords of all Navy-Marine Corps Intranet unclassified users as a precautionary measure following a recent portal breach.

The breach was traced to an abnormally configured legacy server that was attached to the NMCI unclassified network, according to Lt. Cmdr. Ron Steiner, a spokesman for the Naval Network Warfare Command (NETWARCOM) in Norfolk, Va.

That server was blocked and taken offline. The classified network was not affected, Steiner added.

Steiner said no personal or operational information was compromised during the intrusion. Also, the NMCI portal continued to run and didn't need to be taken down, he said.

The Global Network Operations Center in Norfolk detected the intrusion Oct. 20. Steiner declined to go into the specific time line of when the intrusion was blocked, but said, 'The security process worked fairly quickly.'

NETWARCOM is leading a forensic and technical investigation of the breach. The Naval Criminal Investigative Service is conducting a separate criminal investigation.

'We're looking at prevention and what processes might not have gone as they should,' Steiner said.


  • business meeting (Monkey Business Images/

    Civic tech volunteers help states with legacy systems

    As COVID-19 exposed vulnerabilities in state and local government IT systems, the newly formed U.S. Digital Response stepped in to help. Its successes offer insight into existing barriers and the future of the civic tech movement.

  • data analytics (

    More visible data helps drive DOD decision-making

    CDOs in the Defense Department are opening up their data to take advantage of artificial intelligence and machine learning tools that help surface insights and improve decision-making.

Stay Connected