Risk
2/19/2010
02:14 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Military Lifts Removable Media Ban, Imposes Limits

The new policies set strict limits on how thumb drives and other removable media may be used.

The Department of Defense has loosened its outright ban on the use of removable media, but only under strictly limited circumstances and only as a last resort.

In new guidance issued last Friday but first reported this week, U.S. Strategic Command laid out a number of new requirements for the use of any removable media. According to the guidance, only Department of Defense computers in strict compliance with secure hardware requirements will be able to use removable media.

The military had instituted a ban on thumb drives and other removable media such as flash memory cards for cameras in late 2008 after a rash of malware spread by removable media hit the troops.

Those concerns appear to persist. "This is not a return to 'business as usual,'" Vice Adm. Carl Mauney, deputy commander of U.S. Strategic Command, said in an e-mail through a spokesman. However, Mauney said, after "extensive testing of mitigation measures," the military decided it could again allow some removable media -- withing strict limits.

In no way does the lifted ban mean that soldiers will be able to use thumb drives for any purpose. Under the guidance, removable media will be allowed only in "mission-essential operations" and with strict attention to compliance, and even then only to transfer data between locations when "other authorized network resources are unavailable."

After passing the acceptable use test, the hardware must pass its own battery of tests. Soldiers will be able to use only approved, government-purchased and -owned hardware that has been scanned and wiped of any malicious software beforehand and that prevents unauthorized use.

For those who wish to try to skirt the requirements, the military plans to begin random auditing of users and drives. The ban on using personally owned devices on DoD networks, or DoD devices on non-DoD networks, will stay in place.

Additionally, it's possible that individual combatant commands, services, and agencies may issue their own additional restrictions, as the guidance tasks them with creating their own "approval authorities."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7178
Published: 2014-11-28
Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function.

CVE-2014-7850
Published: 2014-11-28
Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.

CVE-2014-8423
Published: 2014-11-28
Unspecified vulnerability in the management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to execute arbitrary commands via unknown vectors.

CVE-2014-8424
Published: 2014-11-28
ARRIS VAP2500 before FW08.41 does not properly validate passwords, which allows remote attackers to bypass authentication.

CVE-2014-8425
Published: 2014-11-28
The management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to obtain credentials by reading the configuration files.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?