Guest Blog: Gentlemen Do Not Open Attachments
DoD policy recently opened access to Internet web pages from NIPRNET computers. This policy is unenforceable and is insecure. It allows the inadvertent inclusion of attachments for downloading of malware from where it can further propagate across DoD networks to subvert security.
According to the National Security Agency, in 1928, Secretary of State Henry Stimson, closed down the Department's intelligence bureau. His rationale was that "Gentlemen do not read other gentlemen's mail."
We have now a comparable situation in the Department of Defense. New policies and guidance have been issued that declare, in effect, that well-behaved gentlemen and gentlewomen should abstain from reading potentially toxic attachments to social computing messages.
Such policies and guidance do not promote the security of defense networks and should be therefore modified.
The Deputy Secretary of Defense Memorandum
The Deputy Secretary of Defense issued a policy for guiding the uses of Social Networking Services in a Directive-type Memorandum of February 25, 2010. The memorandum acknowledges that "... SNS capabilities as integral to operations across the Department of Defense using the Non-Classified Internet Protocol Router Network (NIPRNET)." There are at least five million computing devices connected to the Department of Defense networks.
This policy is deficient in that it does not address the danger of allowing access to web services, such as social computing, that can insert malicious software attachments to any message. Such insertions from the Internet, if opened, can then compromise the security of computing devices on numerous networks.
The DEPSECDEF generic policy states that: "commanders shall defend against malicious activity" and "commanders shall deny access to sites with prohibited content, such as pornography, gambling, hate crime activities." Unfortunately, none of this can be executed with the existing manpower. It cannot be enforced using the available technical means.
Browsers exist in every personal computer. They can connect to millions of web pages without anyone in the DoD having the capacity to restrict access to every potential source of malware. Without enforcement there will be always web pages from where a military or civilian person can download computer code that subsequently trigger attacks that can be launched from the inside of the NIPRNET.
Even with firewall and anti-virus protection, which is always imperfect, there will always be web pages capable of delivering malware to DoD. This is because the malware will always be technically superior to any institutional defenses, which are administered by overworked, understaffed and under-resourced personnel. Therefore DoD cannot and should not depend on blocking of known sites and certainly not on malware protection safeguards managed by error-prone people.
The Air Force Public Affairs Agency Guidance
In November 2009, the Air Force Public Affairs Agency released Version 2 of the guidance for using LinkedIn, YouTube, Flickr, Facebook, MySpace, and other social media sites.
The Air Force offers rules for gentlemanly conduct in posting social media entries:
- Do not post classified information
- Replace all errors
- Readily admit mistakes
- Use best judgment in whatever your post
- Avoid offensive language
- Abstain from violation of privacy
- Never, but never lie.
Comment
Mr. Stassmann,
Dear Mr. Agarwal:
AFCEA has now posted Part II
Comments