Risk
2/19/2010
02:14 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Military Lifts Removable Media Ban, Imposes Limits

The new policies set strict limits on how thumb drives and other removable media may be used.

The Department of Defense has loosened its outright ban on the use of removable media, but only under strictly limited circumstances and only as a last resort.

In new guidance issued last Friday but first reported this week, U.S. Strategic Command laid out a number of new requirements for the use of any removable media. According to the guidance, only Department of Defense computers in strict compliance with secure hardware requirements will be able to use removable media.

The military had instituted a ban on thumb drives and other removable media such as flash memory cards for cameras in late 2008 after a rash of malware spread by removable media hit the troops.

Those concerns appear to persist. "This is not a return to 'business as usual,'" Vice Adm. Carl Mauney, deputy commander of U.S. Strategic Command, said in an e-mail through a spokesman. However, Mauney said, after "extensive testing of mitigation measures," the military decided it could again allow some removable media -- withing strict limits.

In no way does the lifted ban mean that soldiers will be able to use thumb drives for any purpose. Under the guidance, removable media will be allowed only in "mission-essential operations" and with strict attention to compliance, and even then only to transfer data between locations when "other authorized network resources are unavailable."

After passing the acceptable use test, the hardware must pass its own battery of tests. Soldiers will be able to use only approved, government-purchased and -owned hardware that has been scanned and wiped of any malicious software beforehand and that prevents unauthorized use.

For those who wish to try to skirt the requirements, the military plans to begin random auditing of users and drives. The ban on using personally owned devices on DoD networks, or DoD devices on non-DoD networks, will stay in place.

Additionally, it's possible that individual combatant commands, services, and agencies may issue their own additional restrictions, as the guidance tasks them with creating their own "approval authorities."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8148
Published: 2015-01-26
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.

CVE-2014-8157
Published: 2015-01-26
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.

CVE-2014-8158
Published: 2015-01-26
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.

CVE-2014-9571
Published: 2015-01-26
Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.

CVE-2014-9572
Published: 2015-01-26
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.