The Military Will Start Encrypting Emails. Here’s What That Means … – Task & Purpose

In a letter to a watchdog lawmaker last week, the Department of Defense confirmed that it will finally, in 2018, join the 21st century and use a popular basic encryption tool to help make emails to and from .mil addresses more secure. What does that mean for your badass joe.schmuckatelli@centcom.mil account? Lets break it down.

The Defense Information Systems Agency confirmed to Democratic Sen. Ron Wyden of Oregon, a Senate intelligence committee member, that by next year, the Pentagons .mil email will implement STARTTLS for enhanced email encryption a longstanding application that Wyden has called a basic, widely used, easily-enabled cybersecurity technology.

The move came after years of poking around by the reporters at Vice and some tough talk from Wyden questioning how the militarys 4.5 million-user cloud-based email service had never implemented STARTTLS before.

I cant think of a single technical reason why they wouldnt use it, one former U.S. Special Operations Command IT whiz told Vice. A hacker and former Marine similarly told the outlet: The military should not be sending any email that isnt encrypted, period. Everything should get encrypted, absolutely everything. Theres no excuse.

Vices Motherboard blog has a nice breakdown of STARTTLS, which is whats called an opportunistic encryption app. Basically, when your email server and a recipients email server hook up to exchange info, STARTTLS sets up the exchange on the fly as an encrypted transaction. When your emails are sent out into the world without encryption, opportunistic or otherwise, they are as readable as postcards, per Vice:

When your email provider doesnt support STARTTLS, your email might be encrypted going from your computer to your provider, but it will then travel across the internet in the clear (unless you used end-to-end encryption.) When your email provider, and the email provider of the person youre sending the email to, both support STARTTLS, then the email is protected as it travels across.

Kinda, yeah, but not super-big. STARTTLS has been around since 2002, and Gmail first implemented it in 2004. Vice points out that Google and your other popular private email and social-media sites including Microsoft, Yahoo, Twitter, and Facebook have already integrated STARTTLS. In the wake of the NSA surveillance disclosures by contractor Edward Snowden, Facebook led a very public charge to get more sites to use STARTTLS to keep the feds from looking at your emails.

So theres nothing new here; DoD is simply catching up to a basic encryption technology thats been around for a decade and a half long enough now that the vast majority of emails you send and receive communicate with another STARTTLS-equipped server. It has some weaknesses, and it aint PGP encryption, but its a good start.

Well, you probably already know from experience that no Pentagon-level IT policy changes overnight. But more than that, keeping mail.mil STARTTLS-free has also given the military a lot more freedom to snoop through your emails a freedom DISA was probably reluctant to give up. In a letter to Wyden in April, DISA deputy director Maj. Gen. Sarah Zabel said the agencys software regularly sweeps incoming soldier email for phishing scams, viruses, and the like.

DISA currently rejects over 85% of all DoD email traffic coming from the Internet on a daily basis due to malicious behavior, Zabel wrote. We also inspect for advanced, persistent threats using detection methods developed using national level intelligence. Many of these detection methods would be rendered ineffective if STARTTLS were enabled.

In fact, top civil liberties groups like the ACLU have long called for government agencies to use encryption not just to protect their sensitive info, but to help establish a broad pro-encryption consensus in America: If the government gets to encrypt its data, then why shouldnt free American citizens get the same right? Such a norm might not sit well with government agencies, like the NSA, CIA, and FBI, who rely on signals surveillance to further intelligence and investigative aims.

Beyond that, if the military has to triage its IT systems for info security, its probably going to tackle unclassified email servers last, after focusing on secure and closed systems like SIPRNET, the National Military Command Center, and Link 16 tactical data transmission networks.

Well, that was DISAs initial suggestion: Using STARTTLS could make it harder for the Pentagon to catch and neutralize viruses in your emails. But its decision to migrate everyones mail.mil accounts to a new STARTTLS gateway by July 2018 suggests whatever kinks the application threw in DISAs surveillance have now been worked out.

In the meantime, the service is still adamant that you shouldnt be passing any sensitive info or clicking any weird links in your nonsecure mail.mil account in the first place, so, you know, keep not doing that.

Yeah: Download less porn. Seriously. Even if its virus-free, that much cant be healthy, man.

Also, remember the cardinal rule of opsec:

WATCH MORE:

Continue reading here:
The Military Will Start Encrypting Emails. Here's What That Means ... - Task & Purpose

Related Posts
This entry was posted in $1$s. Bookmark the permalink.