Page 2 of 3 FirstFirst 123 LastLast
Results 11 to 20 of 29

Thread: Pentagon banning flash drives...

  1. #11
    Thank God for camera phones for those 1-page screenshots on a SIPRNet and NIPRNet connected secured card accessed workstation. Thank Jesus for LinuxBoot cd's with usb turned on to read NTFS Documents and Settings. Thank God for bored and lazy sheep in the military who care less. Thank Microsoft for reintroducing virii and bugs that were addressed in older distrubitions but forgotten in newer versions so security experts can pay their rent for the month
    Last edited by Linen0ise; December 5th, 2008 at 05:49 PM.

  2. #12
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    As NukEvil says:

    Flash drives/other removable media have nothing to do with their current problem.Stupidity seems to be the major issue. Another issue is a lack of adherence to policies (if they even have any) regarding basic system protection (weak/blank passwords, etc)...
    This is a much more fundamental and deep seated problem that has nothing to do with technology or operating systems. In fact, to suggest that it has is to make an even greater mistake of suggesting that technology can provide the solution. Which, of itself, it cannot.

    This is about:

    1. A security model.
    2. Security policies.
    3. Security processes to enforce the policies.
    4. Security procedures to support the processes.
    5. Governance & management of the security system.

    Given that there is generally a high turnover of personel in military and government environments it is vital that there is an appropriate succession and training mechanism to prevent the whole system being gradually degraded.

  3. #13
    Dissident 4dm1n brokencrow's Avatar
    Join Date
    Feb 2004
    Location
    Shawnee country
    Posts
    1,243
    This is about:

    1. A...model.
    2. ...policies.
    3. ...processes to enforce...policies.
    4. ...procedures to support...processes.
    5. Governance & management of...???
    The tech is changing every week or every month. Code is inherently
    insecure. Human beings are...sinners. Hardware's spread from here
    to kingdom come and tied to some database, now tied to some other
    database. And the newest 'model' is...a cloud?

    Noam Eppel is right...security is absurd. CYA. No one else will.
    “Everybody is ignorant, only on different subjects.” — Will Rogers

  4. #14
    Quote Originally Posted by nihil View Post
    @ phernandez and The-Spec,

    Correct me if I am wrong, but I seem to recall that there was a scandal about flash drives when we first went into Iraq?
    You mean when soldiers film the battlefield operations meant to stay secret only to have the young soldier remove the 8GB micro-sd card. I bet 99% of them don't know what a stamp flash drive look like. You could easily walk past Gomer Pile.

    http://counterterrorismblog.org/

    Who is watching the watchers? funny stuff
    Last edited by Linen0ise; December 8th, 2008 at 04:13 PM.

  5. #15
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    You mean when soldiers film the battlefield operations meant to stay secret only to have the young soldier remove the 8GB micro-sd card.
    No, this was just kit around offices etc where they employed locals as janitors and support staff. They just stole it because it was easy pickings?

    Linen0ise

    Roaches have eaten your Avatar man!!!!!!


    Time for you to use your "RAID" knowledge huh?

  6. #16
    Senior Member
    Join Date
    Dec 2006
    Location
    Myrtle Beach, SC
    Posts
    238
    LOL that was a good one

  7. #17
    @ÞΜĮЙǐЅŦГǻţΩЯ D0pp139an93r's Avatar
    Join Date
    May 2003
    Location
    St. Petersburg, FL
    Posts
    1,705
    Flash drives are allowed on certain networks, banned on others. The Federal government does not have a global policy on this, although there are numerous "recommendations."

    My network bans flash drives and most writeable media. I almost thought that they were concerned about security, until I discovered that Cisco's Port Security is actually considered to be a security measure, and not just a way to piss off users and techs.
    Real security doesn't come with an installer.

  8. #18
    Yes, that's my CC number! 576869746568617's Avatar
    Join Date
    Dec 2003
    Location
    Earth
    Posts
    397
    It should have been done alot sooner.

    While they are very convenient, they pose a tremendous risk to both the OPSEC and CIA of a network.

    The previous incidents in both Iraq and Afghanistan should have outlined to DoD the tremendous risk that they posed to both OPSEC and CIA.

    At the time of those incidents, their main concern was an OPSEC one - controlling the spillage of classified matterial and PHI that were leaked to outside sources. They were too nearsighted to see the other risks to CIA.

    In the years since those incidents, there have been numerous exploits and proof of concept attacks demonstrated at both BlackHat and DEFCON concerning these devices.

    The blame rests with the agency CIO's and DAA's who did not formulate effective countermeasures when conducting their risk analysis.

    It also rests with the IA managers, department managers, and commanders at every level for not ensuring that the end-users had the proper training needed to mitigate the risk.

    Unfortunately, there is no patch for human stupidity.
    Last edited by 576869746568617; December 31st, 2008 at 02:22 AM.
    Windows 9x: n. A collection of 32 bit extensions and a graphical shell for a 16 bit patch to an 8 bit operating system originally coded for a 4 bit microprocessor. Written by a 2 bit company that can\'t stand 1 bit of competition.


  9. #19
    @ÞΜĮЙǐЅŦГǻţΩЯ D0pp139an93r's Avatar
    Join Date
    May 2003
    Location
    St. Petersburg, FL
    Posts
    1,705
    Quote Originally Posted by 576869746568617 View Post
    It should have been done alot sooner.

    While they are very convient, they pose a tremendous risk to both the OPSEC and CIA of a network.

    The previous incidents in both Iraq and Afghanistan should have outlined to DoD the tremendous risk that they posed to both OPSEC and CIA.

    At the time of those incidents, their main concern was an OPSEC one - controlling the spillage of classified matterial and PHI that were leaked to outside sources. They were too nearsighted to see the other risks to CIA.

    In the years since those incidents, there have been numerous exploits and proof of concept attacks demonstrated at both BlackHat and DEFCON concerning these devices.

    The blame rests with the agency CIO's and DAA's who did not formulate effective countermeasures when conducting their risk analysis.

    It also rests with the IA managers, department managers, and commanders at every level for not ensuring that the end-users had the proper training needed to mitigate the risk.

    Unfortunately, there is no patch for human stupidity.
    Without pointing at any specific individuals, I have met numerous Information Security Officers, both within the Federal sector, and many private sector corporations. None have really impressed me. Most seem to lack any technical aptitude at all.
    Real security doesn't come with an installer.

  10. #20
    Yes, that's my CC number! 576869746568617's Avatar
    Join Date
    Dec 2003
    Location
    Earth
    Posts
    397
    Unfortunately, that seems to be a very common occurance. It's both funny and disturbing how most commands treat duty positions like the IASO/ISSO.

    Most that I have seen view it as an inconvience...just another appointment memo that has to be filled out for inspection purposes. They just arbitrarily put a name on a memo, and that's it. They don't even think about the individual's qualification to actually perform the job.

    Hopefully, with the latest revision of DoD Directive 8570.1, some of this will change. Finally, they are requiring that all personnel in any IA related position complete not just DoD and component specific training, but also obtain an industry standard certification such as CompTIA's Security+ or ISC2's CISSP.

    Not only do they have to get certified, but they are also now required to maintain the certification through continuing education and re-certification if needed.

    While this is not a cure-all, it is definately a step in the right direction.
    Windows 9x: n. A collection of 32 bit extensions and a graphical shell for a 16 bit patch to an 8 bit operating system originally coded for a 4 bit microprocessor. Written by a 2 bit company that can\'t stand 1 bit of competition.


Similar Threads

  1. Turns .Net to Flash
    By SDK in forum General Programming Questions
    Replies: 0
    Last Post: March 31st, 2005, 12:19 AM
  2. USB Flash Drives - Temporary Internet Files
    By netspyder in forum Miscellaneous Security Discussions
    Replies: 5
    Last Post: May 23rd, 2004, 01:17 AM
  3. usb flash -vs- mapped drives
    By phishphreek in forum AntiOnline's General Chit Chat
    Replies: 4
    Last Post: January 9th, 2004, 02:58 PM
  4. flash for website !!!!!!!!!!!!!!
    By thuongtamnhan in forum AntiOnline's General Chit Chat
    Replies: 3
    Last Post: November 1st, 2003, 03:45 PM
  5. Flash Tutorial: The Basics
    By morfius in forum Other Tutorials Forum
    Replies: 8
    Last Post: June 7th, 2002, 01:48 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •