Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    U.S. Military Must Step Up Top Brass Training to Thwart Phishing

    Written by

    Wayne Rash
    Published August 13, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      When the offices of the Joint Chiefs of Staff at the Pentagon were hacked three weeks ago, the hackers, who were apparently from Russia, harvested a trove of unclassified but sensitive data.

      What happened is that those hackers managed to launch a phishing attack against one or more people at the JCS and were successful in at least one case. Fortunately, it wasn’t long before cyber-security systems discovered them in the Pentagon’s unclassified mail system and shut the system down.

      Shutting the system down limited the damage and ensured that no more information would be extracted until security personnel could determine exactly how the hackers had gotten in and what information they’d taken. They’re still working on that.

      Meanwhile, The Wall Street Journal reports that JCS personnel received a one-hour training session on what a phishing attack is and how to avoid one. Such a training session is probably a good thing since it’s important to help the staff understand the problem. But for an organization that’s handling our country’s sensitive national defense information, one has to wonder if that’s all they’re going to get.

      A little background: When someone talks about an unclassified email system, to the outsider it sounds as if this is an email system that’s used for setting up lunch meetings and discussing this week’s failure of the Washington Nationals’ bullpen. To some extent that’s true, but an unclassified email system is much more than that.

      In the military, an unclassified email system simply means that the content of the email doesn’t have to be protected to the extent it would be if the material were so secret that its distribution must be restricted.

      This means, for example, that email messages will include information about operations such as travel plans, training and personnel actions. Taken together, such information can paint an important picture of the tempo and background of military operations. Letting one’s adversary have access is not a good thing.

      The question then is: What can be done about it? As it happens, the U.S. Navy has had the answer all along.

      In an article set to appear in the September issue of the Harvard Business Review, a former vice chairman of the Joint Chiefs of Staff, Admiral James Winnefeld, along with Christopher Kirchhoff, who also served on the Joint Staff, and Professor David Upton from Oxford University discuss the critical role human factors play in security.

      They argue that the model to use is the one developed by Admiral Hyman Rickover when he developed the management and training procedures for the Navy’s nuclear propulsion program.

      Rickover was determined to make the Navy’s nuclear propulsion program so safe that it could be operated reliably even while the ships that depended on nuclear propulsion operated for months underwater or were located far from any source of technical support.

      U.S. Military Must Step Up Top Brass Training to Thwart Phishing

      He did this with rigorous training, careful selection of personnel, and mutual oversight by the people involved in the program.

      He also put his trust in the people, so that anyone, no matter how junior, could stop a procedure in process if he or she detected a safety problem, while requiring any task that could create an accident to be accomplished by at least two people.

      The result of this nearly fanatical attention to detail is that so far the U.S. Navy has never had a nuclear accident.

      One legacy of this practice made its way to the U.S. Cyber Command, which has been highly effective in turning aside the millions of attacks sustained by military computer systems on a daily basis. But outside of the Cyber Command, things haven’t gone so smoothly.

      “You don’t do [the training] after the problem has occurred,” said Stu Sjouwerman, founder and CEO of security awareness training company KnowBe4. “You want to do that before someone clicks on a compromised site.”

      “You’d expect the Joint Chiefs [of Staff] to have had that training in place—and they hadn’t. That was borderline criminal oversight,” Sjouwerman added. It was also highly surprising that the White House server was hacked, he said. “You’d expect that especially with Obama having a focus on cyber-attacks, they would have given security training a very high priority.”

      In fact, the military does give security training a high priority, but as in many organizations, there are weak spots. One has to guess (since the JCS isn’t discussing the breach) that the Joint Chiefs followed a familiar pattern in which the guys at the top were too busy to get the security training everyone else got. The fact that they had to have an emergency training session on phishing after the breach points to this explanation.

      But what’s being overlooked even as the military fixes this problem is the similar issue at companies where the C-level executives are apparently immune from corporate security training requirements. They’re too busy, you see. Their time is too expensive to waste with training.

      But, in fact, it’s the data held and used by the C-suite that’s likely the most critical to the success of the business. Even if hackers can’t hack the cash registers, they can still hack the CEO’s email.

      This is a blind spot in corporate governance if there ever was one. The authors of the Harvard Business Review article point this out. Unfortunately, I suspect the people who need it the most will also be too busy to read it.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×