this post was submitted on 17 Jul 2023
123 points (98.4% liked)

News

37121 readers
1639 users here now

Welcome to the News community!

Rules:

1. Be civil


Attack the argument, not the person. No racism/sexism/bigotry. Good faith argumentation only. This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban. Do not respond to rule-breaking content; report it and move on.


2. All posts should contain a source (url) that is as reliable and unbiased as possible and must only contain one link.


Obvious biased sources will be removed at the mods’ discretion. Supporting links can be added in comments or posted separately but not to the post body. Sources may be checked for reliability using Wikipedia, MBFC, AdFontes, GroundNews, etc.


3. No bots, spam or self-promotion.


Only approved bots, which follow the guidelines for bots set by the instance, are allowed.


4. Post titles should be the same as the article used as source. Clickbait titles may be removed.


Posts which titles don’t match the source may be removed. If the site changed their headline, we may ask you to update the post title. Clickbait titles use hyperbolic language and do not accurately describe the article content. When necessary, post titles may be edited, clearly marked with [brackets], but may never be used to editorialize or comment on the content.


5. Only recent news is allowed.


Posts must be news from the most recent 30 days.


6. All posts must be news articles.


No opinion pieces, Listicles, editorials, videos, blogs, press releases, or celebrity gossip will be allowed. All posts will be judged on a case-by-case basis. Mods may use discretion to pre-approve videos or press releases from highly credible sources that provide unique, newsworthy content not available or possible in another format.


7. No duplicate posts.


If an article has already been posted, it will be removed. Different articles reporting on the same subject are permitted. If the post that matches your post is very old, we refer you to rule 5.


8. Misinformation is prohibited.


Misinformation / propaganda is strictly prohibited. Any comment or post containing or linking to misinformation will be removed. If you feel that your post has been removed in error, credible sources must be provided.


9. No link shorteners or news aggregators.


All posts must link to original article sources. You may include archival links in the post description. News aggregators such as Yahoo, Google, Hacker News, etc. should be avoided in favor of the original source link. Newswire services such as AP, Reuters, or AFP, are frequently republished and may be shared from other credible sources.


10. Don't copy entire article in your post body


For copyright reasons, you are not allowed to copy an entire article into your post body. This is an instance wide rule, that is strictly enforced in this community.

founded 2 years ago
MODERATORS
 

Some of the emails reportedly contained sensitive information such as passwords, medical records and the itineraries of top officers.

top 10 comments
sorted by: hot top controversial new old
[–] Mic_Check_One_Two@reddthat.com 52 points 2 years ago* (last edited 2 years ago) (2 children)

That’s what we in the cybersec business call an “oopsie daisy I made a little fucky-wucky”.

For real though, this isn’t a problem yet. The TL;DR is that Mali has a top-level domain “.ml”. Just like “.co.uk” for the UK. And the military uses the domain “.mil”. So lots of emails accidentally get sent to “[Military email]@[Military email server].ml” instead of sending to .mil.

So a bad actor could simply set up an e-mail server with .ml domains that mirror the military’s .mil ones, and start collecting all of those mis-addressed emails.

So why isn’t it an issue yet? Because we had a contract with Mali to manage their domain. They literally signed administrative rights for the .ml domain over. So the US was able to basically set up their own .ml mirrored sites, to capture all of those mis-addressed emails. They have captured thousands throughout the years, because military members keep misaddressing their emails. Supposedly containing all kinds of sensitive data. Everything from medical records to troop movements and equipment inspection reports.

But that contract ends this week, so Mali could 100% start registering their own domains when that contract expires and domain registrations begin expiring.

[–] Frog-Brawler@kbin.social 12 points 2 years ago (3 children)

Sounds like the military should consider migrating from .mil to something like .usmil

[–] Mic_Check_One_Two@reddthat.com 19 points 2 years ago (2 children)

Or simply set rules to disallow any emails sent to a .ml domain. It’s not a perfect solution because legitimate emails could get caught in the filter. But it would prevent the issue of mis-addressed emails.

[–] dm_me_your_feet@lemmy.world 12 points 2 years ago* (last edited 2 years ago) (1 children)

I doubt the number of US military who legitimately needs to email .ml addresses is that big. Block it for everyone minus known ppl who deal with mali stuff (and have been briefed on the issue). Sort out the ones you missed on day 0. Worst case some legitimate mail to mali gets delayed - whatever. If its urgent, i hope they have better comms channels than email. For external contractors, send them an email with vague threats of consequences if they leak (and instructions to fix their address books). Some mail will still be missent, but this should mitigate most of it.

[–] Burninator05@lemmy.world 2 points 2 years ago

This is the simple answer so you know it won't happen.

[–] Frog-Brawler@kbin.social 1 points 2 years ago

Yea that’s cheaper than my plan. Good call.

[–] SomethingBurger@lemmy.world 7 points 2 years ago

Or mil.us. .mil and .gov should be removed, and the US should use subdomains for their government sites, just like all other countries.

[–] Matt_Shatt@lemmy.world 2 points 2 years ago

Note to self: set up a usmail domain!

[–] lemmy_nightmare@sh.itjust.works 5 points 2 years ago

Thanks for the explanation ☺️

[–] mewpichu@lemm.ee 4 points 2 years ago

What I don't understand is my company set things up to give everyone an alert every time they're sending something to a non company domain. Why aren't there any protections like this in place?

load more comments
view more: next ›