Get Task & Purpose in your inbox
The DoD Will Finally Encrypt Service Member Emails. Here's What That Means For You
In a letter to a watchdog lawmaker last week, the Department of Defense confirmed that it will finally, in 2018, join the 21st century and use a popular basic encryption tool to help make emails to and from .mil addresses more secure. What does that mean for your badass email@example.com account? Let’s break it down.
The Defense Information Systems Agency confirmed to Democratic Sen. Ron Wyden of Oregon, a Senate intelligence committee member, that by next year, the Pentagon’s .mil email will implement STARTTLS for enhanced email encryption — a longstanding application that Wyden has called "a basic, widely used, easily-enabled cybersecurity technology."
The move came after years of poking around by the reporters at Vice and some tough talk from Wyden questioning how the military’s 4.5 million-user cloud-based email service had never implemented STARTTLS before.
"I can't think of a single technical reason why they wouldn't use it," one former U.S. Special Operations Command IT whiz told Vice. A hacker and former Marine similarly told the outlet: "The military should not be sending any email that isn't encrypted, period. Everything should get encrypted, absolutely everything. There's no excuse."
How does STARTTLS work?
Vice’s Motherboard blog has a nice breakdown of STARTTLS, which is what’s called an “opportunistic” encryption app. Basically, when your email server and a recipient’s email server hook up to exchange info, STARTTLS sets up the exchange on the fly as an encrypted transaction. When your emails are sent out into the world without encryption, opportunistic or otherwise, they are as readable as postcards, per Vice:
When your email provider doesn't support STARTTLS, your email might be encrypted going from your computer to your provider, but it will then travel across the internet in the clear (unless you used end-to-end encryption.)... When your email provider, and the email provider of the person you're sending the email to, both support STARTTLS, then the email is protected as it travels across.
Is that a big deal?
Kinda, yeah, but not super-big. STARTTLS has been around since 2002, and Gmail first implemented it in 2004. Vice points out that Google and your other popular private email and social-media sites — including Microsoft, Yahoo, Twitter, and Facebook — have already integrated STARTTLS. In the wake of the NSA surveillance disclosures by contractor Edward Snowden, Facebook led a very public charge to get more sites to use STARTTLS to keep the feds from looking at your emails.
So there’s nothing new here; DoD is simply catching up to a basic encryption technology that’s been around for a decade and a half — long enough now that the vast majority of emails you send and receive communicate with another STARTTLS-equipped server. It has some weaknesses, and it ain’t PGP encryption, but it’s a good start.
What the hell took the military so long?
Well, you probably already know from experience that no Pentagon-level IT policy changes overnight. But more than that, keeping mail.mil STARTTLS-free has also given the military a lot more freedom to snoop through your emails — a freedom DISA was probably reluctant to give up. In a letter to Wyden in April, DISA deputy director Maj. Gen. Sarah Zabel said the agency’s software regularly sweeps incoming soldier email for phishing scams, viruses, and the like.
“DISA currently rejects over 85% of all DoD email traffic coming from the Internet on a daily basis due to malicious behavior,” Zabel wrote. “We also inspect for advanced, persistent threats using detection methods developed using national level intelligence. Many of these detection methods would be rendered ineffective if STARTTLS were enabled.”
In fact, top civil liberties groups like the ACLU have long called for government agencies to use encryption not just to protect their sensitive info, but to help establish a broad pro-encryption consensus in America: If the government gets to encrypt its data, then why shouldn’t free American citizens get the same right? Such a norm might not sit well with government agencies, like the NSA, CIA, and FBI, who rely on signals surveillance to further intelligence and investigative aims.
Beyond that, if the military has to triage its IT systems for info security, it’s probably going to tackle unclassified email servers last, after focusing on secure and closed systems like SIPRNET, the National Military Command Center, and Link 16 tactical data transmission networks.
So now my stuff’s going to be encrypted, but it could be easier to hack?
Well, that was DISA’s initial suggestion: Using STARTTLS could make it harder for the Pentagon to catch and neutralize viruses in your emails. But its decision to migrate everyone’s mail.mil accounts to a new STARTTLS gateway by July 2018 suggests whatever kinks the application threw in DISA’s surveillance have now been worked out.
In the meantime, the service is still adamant that you shouldn’t be passing any sensitive info or clicking any weird links in your nonsecure mail.mil account in the first place, so, you know, keep not doing that.
Any other tips?
Yeah: Download less porn. Seriously. Even if it’s virus-free, that much can’t be healthy, man.
Also, remember the cardinal rule of opsec:
A massive billing glitch in Tricare's East region, managed by Humana, on Thursday slammed about 25,000 beneficiaries with premium charges 100 times more than they owe monthly for their coverage.
A Minnesota Army National Guard UH-60 Black Hawk helicopter with three Guardsmen aboard crashed south of St. Cloud on Thursday, said National Guard spokeswoman Army Master Sgt. Blair Heusdens.
At this time, the National Guard is not releasing any information about the status of the three people aboard the helicopter, Heusdens told Task & Purpose on Thursday.
A missing Canadian ex-soldier was reportedly smuggled across the US border and is hiding with a neo-Nazi group
Editor's Note: This article originally appeared on Business Insider.
Former Canadian Army Reserve Master Cpl. Patrik Mathews, 26, was first identified as a member of The Base by Winnipeg Free Press reporter Ryan Thorpe.
Days after Thorpe's report was published, Mathews went missing and was discharged from the military for his alleged ties to the group. His car was found about 10 miles from the U.S. border soon thereafter, and police found a cache of weapons when they raided his home.
Vice reporters Ben Makuch, Mack Lamoureux, and Zachary Kamel, citing confidential sources, reported on Thursday that Mathews had been illegally smuggled across the border and is being hidden by members of The Base, which has operated in encrypted chatrooms as a largely online organization.
The Pentagon's latest attempt to twist itself in knots to deny that it is considering sending up to 14,000 troops to the Middle East has a big caveat.
Pentagon spokeswoman Alyssa Farah said there are no plans to send that many troops to the region "at this time."
Farah's statement does not rule out the possibility that the Defense Department could initially announce a smaller deployment to the region and subsequently announce that more troops are headed downrange.
The Navy could deploy a second carrier to the Middle East if Trump orders an Iran surge, top admiral says
The Navy could send a second aircraft carrier to the Middle East if President Donald Trump orders a surge of forces to the region, Chief of Naval Operations Adm. Mike Gilday said on Thursday.
Gordon Lubold and Nancy Youssef of the Wall Street Journal first reported the United States is considering sending up to 14,000 troops to the Middle East to deter Iran from attacking U.S. forces and regional allies. The surge forces could include several ships.