C’mon, we’re better than this

Opposition Leader Peter Dutton made his Budget Reply speech last Thursday night.…

Promising the Impossible: Blinken’s Out of Tune Performance…

Things are looking dire for the Ukrainian war effort. Promises of victory…

Opposition Budget in Reply: Peter Dutton has no…

Solutions for Climate Australia Media Release National advocacy group Solutions for Climate Australia…

Understanding the risk

It's often claimed the major supermarkets would prefer to see tonnes of…

A Brutal Punishment: The Sentencing of David McBride

Sometimes, it’s best not to leave the issue of justice to the…

Climate pollution and petrol bills coming down as…

Climate Council Media Release AUSTRALIA IS OFF AND RACING on the road to…

Corporatocracy

It’s time we reckoned with what it means to become a corporatocracy.…

Plan B

By James Moore   Every time there is a release of a New York…

«
»
Facebook

Dotty Domains: The Pentagon’s Mali Typo Leak Affair

Fleet-footed agility and sharp thinking rarely characterise the plodding bureaucrat. An argument can be made that different attributes are prized: cherished incompetence, spells of inattentiveness, and dedication to keeping things secret with severity. What matters is not what you did, but what you pretended to do.

Even with maintaining secrecy, the plodding desk-job hack can face problems, all falling under the umbrella term of “human error”. Papers and files can stray. The occasional USB stick can find its way into unwanted hands. And then there is that damnable business about the cloud and who can access it. 

Despite repeated warnings over a decade by the Amsterdam-based Mali Dili, contracted to manage email accounts of the West African state, traffic from the US military continued to find its way to the .ml domain, the country identifier of Mali. (For all we know, this may still be happening.) This arose because of a typing error, with .mil being the suffix for US military email addresses.

Other countries also seemed caught up in the domain confusion. Over a dozen emails intended for the Dutch military also found their way into the Mali Dili net, with .ml being confused with .nl. Eight emails from the Australian Department of Defence, intended for US military consumption, also met the same fate. These include problems about corrosion in Australia’s F-35 and an artillery manual “carried by command post officers for each battery.”

The man most bemused by this is not, it would seem, in the Pentagon, but a certain Dutch entrepreneur who was given the task of managing the domain. Johannes Zuurbier has found himself inconvenienced by the whole matter for some years. In 2023, he decided to gather the misdirected messages. He currently holds 117,000 of them, though he has received anywhere up to 1,000 messages a day. He has been good enough to badger individuals in the US national cyber security service, the White House, and the local defence attaché in Mali.

The Financial Times reports that the contents of such messages vary. Much of it is spam; a degree of it comprises X-Rays, medical data, identity documents, crew lists for ships, staffing names at bases, mapping on installations, base photos, naval inspection reports, contracts, criminal complaints against various personnel, internal investigations on bullying claims, official travel itineraries, bookings, tax and financial records.

While not earth shaking, one of the misdirected emails featured the travel itinerary of General James McConville, the US Army’s Chief of Staff, whose visit to Indonesia was noted, alongside a “full list of room numbers”, and “details of the collection of McConville’s room key at the Grand Hyatt Jakarta.” Not the sort of thing you necessarily wish your adversaries to know.

Another email from the Zuurbier trove came from an FBI agent and was intended for a US Navy official, requesting personal information to process a visitor from the Navy to an FBI facility. 

Lt. Commander Tim Gorman, a spokesperson from the Office of the Secretary of Defense, has put a brave face on it. “The Department of Defense (DoD) is aware of this issue and takes all unauthorized disclosures of Controlled National Security Information or Controlled Unclassified Information Seriously,” he outlined in a statement to The Verge. He further claimed, without giving much away, that emails sent from a .mil domain to Mali are “blocked”, with a notification being sent to the sender “that they must validate the email addresses of the intended recipients.”

To keep things interesting, however, Gorman confesses that there was nothing stopping other government agencies or entities working with the US government from making the mistake and passing on material in error. His focus, rather, was on the Pentagon personnel, who continued to receive “direction and training”. The Defense Department “has implemented policy, training, and technical controls to ensure that emails from the ‘.mil’ domain are not delivered to incorrect domains.”

The whole affair is becoming a thick parody of administrative dunderheadedness. It follows a pattern of inadvertent exposure of data, the sort that would, if published, probably lead to harassment and prosecution by the Department of Justice. But the incompetent are almost never found wanting; only the well-intentioned deserve punishment. Instead, IT misconfigurations are blamed for what happened, for instance, in February, when three terabytes of US Special Operation Command unclassified emails were made available for public consumption for some two weeks. 

Even as the typo-leaks continue, the United States has imposed sanctions against, of all individuals, Mali’s own defence officials, including the defence minister, Colonel Sadio Camara. The two other individuals in question are Air Force Chief of Staff Colonel Alou Boi Diarra and Deputy Chief of Staff Lieutenant Colonel Adama Bagayoko. In one of his tedious moral fits, US Secretary of State Antony Blinken accused the trio of facilitating and expanding “Wagner’s presence in Mali since December 2021”, claiming an increase of civilian fatalities by 278 per cent since the Russian mercenary group established itself in the country.

The Mali authorities, as of July 25, should have assumed control of the domain. This worries retired US admiral and former director of the National Security Agency and US Army’s Cyber Command, Mike Rogers. “It’s one thing when you are dealing with a domain administrator who is trying, even unsuccessfully, to articulate the concern. It’s another when it’s a foreign government that … sees it as an advantage that they can use.”

Zuurbier, at the conclusion of his decade-long contract, may still have a few juicy numbers for safe keeping, though he will be mindful about what happens when such contents are published, namely, the Assange-WikiLeaks precedent. Mali’s officials, in the meantime, will simply anticipate the dotty domain business to continue. 

 

Like what we do at The AIMN?

You’ll like it even more knowing that your donation will help us to keep up the good fight.

Chuck in a few bucks and see just how far it goes!

Your contribution to help with the running costs of this site will be gratefully accepted.

You can donate through PayPal or credit card via the button below, or donate via bank transfer: BSB: 062500; A/c no: 10495969

2 comments

Login here Register here
  1. Canguro

    Let’s remind ourselves, yet again, of that classic oxymoron, ‘military intelligence.’ The klutzs who populate the upper echelons of the American military, the guys who continually beat the drum for more military engagement across the globe and seemingly are never able to actually achieve whatever the game plane was at the outset – Korea, Vietnam, Iraq, Afghanistan, various localities in Africa being among a wider clutch of examples of institutional incompetence – are the unfortunate front-runners in an organisational behemoth that fundamentally wouldn’t know if its arse was on fire. [e.g. …the Pentagon’s response to the 9/11 attack – there was no plane wreckage – zero, zip, nada – but did any military suit speak up and contest the ‘official narrative’ of that odious & egregious inside whack-job against American infrastructure? No, is the startling answer].

    Dedicated to employing the lowest of the lowest of the American socioeconomic strata, dumb enough to gift security clearances to kids obsessed with video games and others who a more perspicacious attention might have perceived as not actually being the ‘right type’ to represent the armed forces of this hegemonic republican nightmare, it’s hardly surprising that their systems leak like the proverbial sieve.

    Grunts hacking away at their laptops, half-asleep, focussed on what they’ll do when the shift finishes, can hardly be expected to pay attention to the incautious insertion of an extra letter here & there. You get what you pay for, and in America’s case, it’s bottom barrel, second-class, cheap & nasty. The pity is that despite the vulgarity of it all, these red-necked clods still believe that it’s their titular role to run roughshod over the rest of the planet on behalf of Uncle Sam, or more correctly, Uncle Sam’s business interests.

  2. Clakka

    Ready, Fire, Aim. Coming ready or not!

Leave a Reply

Your email address will not be published. Required fields are marked *

The maximum upload file size: 2 MB. You can upload: image, audio, video, document, spreadsheet, interactive, text, archive, code, other. Links to YouTube, Facebook, Twitter and other services inserted in the comment text will be automatically embedded. Drop file here

Return to home page
Exit mobile version