Sensitive US military info exposed in accidental
emails to Mali
By Jonathan Lehrfeld and Colin Demarest
Jul 17, 11:14 PM
A simple typo reportedly directed millions of emails with sensitive information to the African country Mali. (Colin Demarest/C4ISRNET)
A simple typo reportedly directed millions of
emails with sensitive information to the African country Mali rather than their
intended U.S. military recipients.
For years, a misspelling of “.MIL” in the suffix
of military email addresses as “.ML” — the country domain for Mali —
unintentionally led to a “typo leak,” according to The Financial Times, which
first reported the story. As a result, everything from diplomatic
documents, tax returns, passwords and travel details of top officers has been
exposed, the outlet noted.
None of the emails are said to be classified.
Department of Defense spokesperson Lt. Cmdr. Tim
Gorman told Military Times via email the department “is aware” of the issue and
“takes all unauthorized disclosures of Controlled National Security Information
or Controlled Unclassified Information seriously.”
A Dutch entrepreneur contracted to manage Mali’s
domain, Johannes Zuurbier, identified the leak, Financial Times said.
“This risk is real and could be exploited by
adversaries of the US,” he wrote to the outlet.
Authority over the .ML domain, Financial Times
reported, is set to soon revert from Zuurbier to Mali’s government, which of late has
grown its relationship with Russia. The West African
nation may now have additional means to cozy up to the long-time U.S.
competitor.
Russia and other world powers prod U.S. networks
to gain an unvarnished look at weapons and modernization projects, troop
movements and other potentially jeopardizing secrets.
The Defense Department has since 2015 experienced
more than 12,000 cyber incidents, with yearly totals declining as of 2017,
according to the Government Accountability Office, a federal watchdog.
Among the reported contents of the erroneously
addressed emails were: X-rays and medical data, identity document information,
crew lists for ships, staff lists at bases, maps of installations, photos of
bases, naval inspection reports, contracts, criminal complaints against
personnel, internal investigations into bullying, official travel itineraries,
bookings as well as tax and financial records.
One misdirected email included travel plans for
Army Chief of Staff Gen. James McConville and his delegation for a
then-upcoming visit to
Indonesia in May, Financial Times reported.
The Pentagon is already dealing with the fallout
of a military documents breach. Massachusetts
Air National Guard member Jack Teixeira is accused of
accessing, keeping and sharing classified national defense information,
including insights concerning the Russia-Ukraine war. He pleaded not guilty to
charges in June.
“As you’ve seen from when we had our first
unauthorized disclosure from earlier this year we’ve implemented policy and
training mechanisms,” Deputy Pentagon Press Secretary Sabrina Singh said during
a July 17 briefing. While the Pentagon bounces emails sent to the Mali “.ML”
address, contact made via personal accounts do not offer the same protection,
she added.
“None of the leaked emails that were reported came
from a DoD email address,” Singh said, adding that the department discourages individuals
from using personal emails or credentials for official work.
The American military is not the only one to fall
victim to the spelling blunder, Financial Times reported. Emails meant for the
Dutch military, which uses “army.nl,” were also unintentionally sent to Mali
thanks to a mistaken “army.ml” in the email domain.
Embassies in Washington for Mali and the
Netherlands did not immediately respond to a request for comment made by
Military Times.
Ingen kommentarer:
Legg inn en kommentar
Merk: Bare medlemmer av denne bloggen kan legge inn en kommentar.