Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Government Security The Military United States IT Your Rights Online

US Missile Defense Staff Told To Stop Watching Porn 187

An anonymous reader writes "John James Jr., director of the U.S. Missile Defense Agency, who is responsible for the nation's missile defense system, recently sent out a one-page memo warning employees and contractors to stop using agency computers to visit pornographic Web sites. That's right; apparently they were watching the wrong type of bombshells."
This discussion has been archived. No new comments can be posted.

US Missile Defense Staff Told To Stop Watching Porn

Comments Filter:
  • Why? (Score:5, Funny)

    by Githaron ( 2462596 ) on Friday August 03, 2012 @12:13PM (#40870009)
    Why is this considered news?
    • Re:Why? (Score:5, Funny)

      by Desler ( 1608317 ) on Friday August 03, 2012 @12:15PM (#40870039)

      Because they were playing with the wrong type of missiles?

    • Re:Why? (Score:5, Funny)

      by DickBreath ( 207180 ) on Friday August 03, 2012 @12:27PM (#40870199) Homepage
      Because watching pr0n isn't being productive like those of us who read Slashdot.
      • What else should missile defense staff do to pass time?
      • Re:Why? (Score:5, Funny)

        by stretch0611 ( 603238 ) on Friday August 03, 2012 @02:08PM (#40871487) Journal

        Pron IS productive for these people. Aren't they trained constantly to launch their missile and have them explode. Watching porn is no more than a training video.

        If we go to war and they are told to launch their missile and watch them explode, they will be ready and perform their duty well.

        And if they watched enough "training videos" they will be able to control the timing of that launch and subsequent missile explosion with remarkable accuracy due to all their practice and training.

        • Re:Why? (Score:5, Funny)

          by Impy the Impiuos Imp ( 442658 ) on Friday August 03, 2012 @05:12PM (#40873513) Journal

          > Apparently they were watching the wrong type of bombshells.

          Brian: Dumb joke.
          Stewie: You think it's so easy, name 12.

          Brian:
          Apparently they were watching the wrong type of missiles.
          Apparently they were watching the wrong type of payloads.
          Apparently they were watching the wrong type of shots.
          Apparently they were watching the wrong type of O-rings.
          Apparently they were watching the wrong type of re-entry procedure.
          Apparently they were watching the wrong type of liquid coolant.
          Apparently they were watching the wrong type of emergency ejection.
          Apparently they were watching the wrong type of solid rocket.
          Apparently they were watching the wrong type of holding pattern.
          Apparently they were watching the wrong type of engine flameout.
          Apparently they were watching the wrong type of fire surpression system.
          Apparently they were watching the wrong type of throttle up.

          Stewie: Name 5 more.

          Brian:
          Apparently they were watching the wrong type of loading the cargo bay.
          Apparently they were watching the wrong type of playing with the funny arm.
          Apparently they were watching the wrong type of rubber suit.
          Apparently they were watching the wrong type of trans docking.
          Apparently they were watching the wrong type of linkup.

          Stewie: Name 6 more.

          Brian:
          Apparently they were watching the wrong type of system failure.
          Apparently they were watching the wrong type of manual procedure.
          Apparently they were watching the wrong type of stirring the tank.
          Apparently they were watching the wrong type of evacuation procedure.
          Apparently they were watching the wrong type of moon rover.
            Apparently they were watching the wrong type of boot to the moon.

          Stewie: (Throws guitar on the floor) F(bleep) you!

          Brian:
            Apparently they were watching the wrong type of separation procedure.
            Apparently they were watching the wrong type of Weiner von Braun.
            Apparently they were watching the wrong type of 'tang.
            Apparently they were watching the wrong type of ...

          Stewie: Now you die.

    • Re:Why? (Score:5, Insightful)

      by jhoegl ( 638955 ) on Friday August 03, 2012 @12:27PM (#40870203)
      The real question is, why arent these less than half a dozen getting fired?
      If they have time to watch porn, then the position they are filling is not required.
      • Re:Why? (Score:5, Insightful)

        by kubernet3s ( 1954672 ) on Friday August 03, 2012 @12:33PM (#40870269)
        actually, yeah, most of us would be out on our asses if our employers caught us looking at porn. The reason people tag links NSFW is because you can get fired for even accidentally clicking on non-pornographic nudity.
        • Re:Why? (Score:4, Insightful)

          by AliasMarlowe ( 1042386 ) on Friday August 03, 2012 @12:39PM (#40870363) Journal

          actually, yeah, most of us would be out on our asses if our employers caught us looking at porn. The reason people tag links NSFW is because you can get fired for even accidentally clicking on non-pornographic nudity.

          So these guys might have just been looking at Wikipedia [wikipedia.org], or perhaps at Wikipedia [wikipedia.org]? Caution, some Wikipedia pages (like those two) might actually be considered NSFW in really incredibly prudish places, simply because they contain photos of human genitalia (but non-prurient photos).

      • Re: (Score:3, Insightful)

        by magarity ( 164372 )

        The people who need to be fired are the network administrators who aren't filtering external traffic properly in the first place. And why not fire this director who doesn't see that's the true source of the problem?

        • Re:Why? (Score:5, Insightful)

          by ganjadude ( 952775 ) on Friday August 03, 2012 @12:58PM (#40870607) Homepage
          Why blame the network admin? He didnt make you go to those sites. Sure you could say that if it was filtered they wouldnt go to the sites but that is not the point. These are adults, working in what is a pretty important function with major security concerns. There is no one to blame but those who typed in the address and clicked enter.
        • Re:Why? (Score:5, Insightful)

          by v1 ( 525388 ) on Friday August 03, 2012 @01:00PM (#40870651) Homepage Journal

          The people who need to be fired are the network administrators who aren't filtering external traffic properly in the first place.

          That doesn't really fix the problem. It sounds like a good idea until you realize you're pitting the network admin against the users. His job isn't to get involved with a game of cat and mouse. Most admins grow tired of being expected to have an airtight physical defense when there's no complementary policy in place.

          A better response is to have the network admins place reasonably good filtering in place. Not airtight. Not filters that interfere with legitimate traffic. Filters with a zero-false-positive. Then if someone is still watching porn, it's easy to demonstrate that they're taking steps to bypass the filtering. Make it clear to the staff that deliberately bypassing the filters is a fireable offense.

          This solves most of the problem all at once. No collateral damage, no borderline unfair calls, reasonable expense, and accountability where it belongs.

          It also makes the perps easier to catch, since they don't have to spend hours trying to different things before they finally find the inevitable crack in the armor. They'll try basic things like proxy or direct IP etc. Those are easy to prove as deliberate while at the same time being easy to detect. If you're placing the entire onus on the net admin, the users can dig at your defenses all day long without so much as a wrist-slap, and when they finally discover another way, they've' not only beat you, you may have a difficult time noticing you've been beat. And then you are the bad guy for having "allowed" them to violate policy.

          I've been in charge of cat and mouse before. I'd set something up, they'd find a way around it. I'd add another net. They'd stop for a bit and then they'd find a way around it. Rinse and repeat. All the while the manager wouldn't bother to yank one of them into the office and discuss the perils of working hard to break company policy. The filters finally got tight enough that the manager started having problems with some of his downtime, and then things really got weird. You don't want to be here.

          "against company policy" needs to mean "you don't do that here", not "we're going to try to stop you from doing that here".

          • Re:Why? (Score:5, Insightful)

            by Tom ( 822 ) on Friday August 03, 2012 @01:54PM (#40871361) Homepage Journal

            It sounds like a good idea until you realize you're pitting the network admin against the users. His job isn't to get involved with a game of cat and mouse.

            I don't only agree, I'd go a step further: The admins job is not to filter content, but to keep the network running.

            Filter malware, yes. Content? Why should the admin care if that image shows a tit or a cat?

            Maybe I'm too open-minded but I don't get what the fuss is all about. If I came upon a co-worker or even a subordinate watching porn, I'd be more worried that he's not working than what he is watching. Sure it's not very tasteful, but as long as his hands stay out of his trousers (or skirt, let's stop pretending only men watch porn), I don't care all that much. Maybe if our society were a little less sexually repressed, we could focus on what actually matters instead of political correctness?

            • Re: (Score:2, Interesting)

              by sumdumass ( 711423 )

              Fun fact,
              Almost every time I view the router logs and find porn sites in them, it happens that someone violated the security policy and brought unsecured media from home and infected their work system, clicked yes for a popup and installed something or somehow infected the computer with malware that the Antivirus didn't pick up. I don't know if it cause and effect where the malware caused the porn lookups or if the malware was the result of the porn lookups, but I know a symptom of the malware was pornograp

          • "Make it clear to the staff that deliberately bypassing the filters is a fireable offense."

            That's why people bring their own notebooks and watch porn with their phone's personal hotspot.
            Albeit that might not work for missile defense when they are a mile down a mountain.

            • by v1 ( 525388 )

              That's why people bring their own notebooks and watch porn with their phone's personal hotspot.

              As a network admin, dealing with employees "wasting company time" isn't my job, so I really don't get too involved with it. So I really don't care if they jack up their personal computer. But I must admit I feel even less sorry for them when they wasted company time to do it in the first place. Serves them up a heaping fresh pile of "serves you right".

        • No. This is not a technical issue, it is a personnel issue.

          On the technical side we can block access to sites by URL, IP, or keyword... but there are ways to get around these blocks, and implementing/maintaining these controls takes time and money away from more useful projects.

          It is far better to instruct employees that such activity is not allowed, and discipline (including termination if necessary) those who do not follow the policy.

          I can see an argument for the case that in a defense environment there

        • by sjames ( 1099 )

          In many places, there is an assumption that the people working there are adults and don't need net-nanny and it's many false positives. Since the employees were caught and no malware got in, the network is apparently being properly monitored and filtered.

        • Bullshit, it is not the network admins job to enforce workplace rules. That's like firing the phone guy because some manager can't keep his guys from calling the wife too much.

          It's a personnel management deficiency not a technology deficiency. You will never be able to block everything that shouldn't be viewed from work unless you just pull the plug.

      • If they have time to watch porn, then the position they are filling is not required.

        So taking breaks is good for productivity - unless you're a government employee?

      • "If they have time to watch porn, then the position they are filling is not required."

        Filling various positions is required in porn worth watching.

      • Re:Why? (Score:5, Insightful)

        by ultranova ( 717540 ) on Friday August 03, 2012 @01:54PM (#40871363)

        The real question is, why arent these less than half a dozen getting fired?
        If they have time to watch porn, then the position they are filling is not required.

        There are quire a few positions where periods of activity and waiting alternate. Trying to "remove the slack" in such scenarios typically results in small savings in periods of passivity and huge disasters in periods of activity. This is especially true in scenarios like missile defense where activity periods depend on some unpredictable external factor - it's too late to hire staff when the air raid sirens start blaring, and having enough staff to handle a missile attack means that you'll have more than you need when an attack is not incoming.

        But even beyond that, human beings aren't capable of giving 100% 8 hours a day. If you try to make them, those who can leave for greener pastures and those who can't concentrate on looking busy, rather than doing their job. The end result is that you'll end up with incompetent, unmotivated people trying their best to deceive the management.

        But perhaps this isn't about wasted time but porn. If so, then please remember that this is a position that likely requires quite a bit of highly specialized training. Is punishing people for being impure sinners a good enough reason to justify the cost of training their replacements? Maybe, maybe not - but since this training would come out of taxpayer money, it would probably be best to not pay to enforce any moral code that doesn't absolutely have to be.

      • by Chibi ( 232518 )

        I spent some time working with the FAA. The person I replaced had been fired for viewing porn at work. The case was still in litigation up to two years after he was fired, due to the union. I'm not really sure what was being argued, but my manager had to go to hearings every once a while.

        I kind of assumed these would be military positions, but the summary mentions employees and contractors, so perhaps that is where the union is getting involved (In the case of employees. Contractors are used in a lot of

      • Disagree. There are lots of jobs out there where your role is to basically wait for something to happen, and if it does happen, handle it. They may even be pretty highly paid and important jobs, depending on what "something happening" is what exactly what "handling it" involves. I'd say that the guys responsible for handling an incoming nuclear missile attack are pretty damn important. There's not many things where it's more important that they be handled properly if they happen, or that we hope they don't

    • by ppanon ( 16583 )

      Because flash animations and other movie formats have been used as vectors for malware in the past. So if they're using missile defense computers to watch porn, they are potentially infecting critical defense computers with trojans that could be exploited by an enemy.

      I suppose that if they're bringing their commercial DVDs, or personal home movies through the security checkpoints it might be OK, but then they would need to explain their collection to their wives/SOs.

      • So if they're using missile defense computers to watch porn, they are potentially infecting critical defense computers with trojans that could be exploited by an enemy.

        ...Why are any critical missile defense computers connected to the Internet? I mean, isn't that pretty much asking for that very scenario?

    • Re:Why? (Score:5, Insightful)

      by jank1887 ( 815982 ) on Friday August 03, 2012 @12:34PM (#40870279)

      because of this tidbit in the Bloomberg article:

      "Using what is called steganography, Cunningham said, a programmer can embed malicious computer code that infects computers, opens ports, steals data or gains access to networks when photos, videos or other files are downloaded."

      Now, THAT's news. So, now, instead of malware writers using steganography to hide commands or payload data accessed by normal executable malware code, we have steganographic malware that autoexecutes just by being downloaded! I'll get started on the GIMP payload filter...

      • Re: (Score:2, Troll)

        by xlsior ( 524145 )
        Unlikely as it sounds, it's definitely possible... For example, a number of years ago a bug in the windows gdi rendering system could allow arbitrary code execution when viewing a malformed jpeg picture: http://tinyurl.com/c5z3rfy [tinyurl.com] And later, an even easier exploit came along where a legacy printer macro file format (don't remember the extension) simply renamed to jpeg would allow the execution of a script when the 'image' was viewed in Internet explorer since both file formats were supported by the
        • Re:Why? (Score:5, Insightful)

          by dgatwood ( 11270 ) on Friday August 03, 2012 @01:13PM (#40870821) Homepage Journal

          I don't think the GP was claiming that it doesn't happen. Image formats are relatively complex, and compressed audio and video formats doubly so. If you're going to have a security hole in an OS or a browser, odds are good that it will be in a codec somewhere.

          That said, what we have here is a pretty egregious misuse of the term steganography. Steganography refers to hiding data inside other data. A trojan image file that exploits a bug in your browser to load malware isn't steganography because there is no actual image. There's no hiding. It is merely the misrepresentation of one type of data as another type of data, which is a trojan horse, not steganography.

          Steganography would be Chinese dissidents using image files that contained a subtle watermark in the least significant bits to send coded messages to one another, or someone embedding a piece of software in the low order bits of an MPEG stream. Those examples meet the core requirement that the enclosing data be at least ostensibly plausible data. Note that opening such a photo or MPEG stream reveals a photo or a movie. It does not execute anything, because if it did, the secret payload wouldn't be very hidden, now would it? :-)

      • I seem to remember reading about an indestructible cookie that some academic had created. It was actually a number of cookies sprinkled around the system. They checked on eachother constantly and in the case that one was deleted the others would recreate it. One part of it was actually a graphic file, possibly a GIF if memory serves.

        • An image in the browser cache, with javascript reading the pixel values. The 'evercookie' also used a conventional cookie, and a flash cookie, and a few other methods too. Upon visiting the site, if even one of the cookie copies could be read it would recreate the others.
      • by 1u3hr ( 530656 )

        Now, THAT's news. So, now, instead of malware writers using steganography to hide commands or payload data accessed by normal executable malware code, we have steganographic malware that autoexecutes just by being downloaded! I'll get started on the GIMP payload filter...

        I wish I knew what the guy really meant, because that's pure bullshit.

        Images that "autoexecute"??? The only thing that it might reference is some overflow in in whatever displays the image. But that is certainly not "steganography".

        Or of course, there is the old trick of "install this codec to view Anna Kournikova blowjob video! Is anyone who works on missile defence really that dumb? There certainly are malware infested porn sites. But the images are just images.

        But I guess knowing what they did wi

      • by AK Marc ( 707885 )
        I thought that flash and PDF vulnerabilities could be classified in that category. And there were some really old MP3 ones as well.
    • Re: (Score:2, Interesting)

      by Anonymous Coward

      Why is this considered news?

      It's news to me that what are supposed to be professional soldiers/airmen have to be reminded not to engage in non-work related activity while on duty. (Whatever happened to "You can review the field manual during periods of inactivity. No, you absolutely cannot read the newspaper while on duty.")

      It's news to me that people are using what are probably supposed to be secure or semi-secure systems to browse non-work-related sites on the public Internet.

      It's news to me that the government's response to the abo

    • I don't know about you, but when I surf porn at my missile defense job I kick it old school.

      Say what? Nike Ajax?

      Sheeeit.. say WHAT? Nike Herc?

      Pfftt.. I got your "Herc" right here! Nike Zeus?

      How 'bout I Sprint [youtube.com] with his homeboy Spartan [youtube.com].

      Too bad neither of these [wikipedia.org] were hit to kill and packed nukes.
    • The fact the DoD hired an imbecile who can't configure a proxy to block access to porn IS news to me.

      • by AK Marc ( 707885 )
        If you can configure a proxy with 100% success rate, you should be an NSA, not DoD. It's impossible with anything more permissible than a verified white list, and even then, you could still get errors.
  • by Anonymous Coward on Friday August 03, 2012 @12:13PM (#40870017)

    make love not war baby!

  • by Anonymous Coward on Friday August 03, 2012 @12:18PM (#40870095)

    ...this means our missile defense has been shooting blanks this whole time?

  • by phantomfive ( 622387 ) on Friday August 03, 2012 @12:18PM (#40870097) Journal
    It because a problem when some of the computers started getting viruses and trojans from the porn sites.

    That's what the first article says. The second article says that wasn't the reason. I guess this is why it's a waste to read the articles.
  • Why not? (Score:4, Interesting)

    by shaitand ( 626655 ) on Friday August 03, 2012 @12:19PM (#40870099) Journal

    Not that this is really news worthy but who cares if they are watching porn? This is a legitimate job that has to be staffed 24/7 and probably requires about 20min worth of total combined labor in a typical year. Being the military that is increased to maybe a few days labor worth of redundant checklists over the course of the year.

    • Not that this is really news worthy but who cares if they are watching porn? This is a legitimate job that has to be staffed 24/7 and probably requires about 20min worth of total combined labor in a typical year. Being the military that is increased to maybe a few days labor worth of redundant checklists over the course of the year.

      Having done jobs where your sole purpose most of the time is just to be there waiting I understand the lack of things to do. Still Gotta love the fact that beyond the normal workplace squimishness their main concern was viruses and malware, which porn sites have actually gotten a lot better about policing these days.

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      Then they can buy their OWN computer to do it on cant they?

      Or are you comfortable with missile defense computers looking at porn sites (which have been consistent virus vectors in years past)? Even if those are not hooked up to the main computers all it takes is one mistake...

      Also when you sign up to the military you sign away rights. You also sign on for people telling you 24/7 what to do and where to pee.

      When I used to run a network. I told people do what you want on your own time and on your OWN hardw

      • Even if those are not hooked up to the main computers all it takes is one mistake...

        But perhaps not watching porn increases the likelyhood of making a mistake? Who knows what they'll do when they get really bored and have no porn, video games or other distraction, they'll probably start screwing around with the missile systems...

      • I highly doubt the missile systems are tied to any sort of network. Either way toss up a guest wifi net and leave them alone. Believe me, there are worse ways for people with missile keys and too much time of their hands to vent their slowly building frustrations.

        There is also nothing about a porn site that makes it more likely to harbor malware. Most of the infections I've seen came from financial sites.

    • This is a legitimate job that has to be staffed 24/7 and probably requires about 20min worth of total combined labor in a typical year.

      You can't know that.

      SAC in the fifties became known for its relentless drill and discipline. It is what the military demands and expects on assignments like this.

      Those who do not measure up get transfered out.

      There is somewhere worse than mainland Alaska in the U.S. Military. An island called Shemya in the Aleutians, a group of islands off the coast of the Alaskan Peninsula. According to legend, the wind never drops below 60 knots, the temperature never rises above -20 C and there's a 10-foot visibility fog 300 days of the year. Primary duty there is clearing the runway of obstructions. Every time someone left, they took a rock with them so someday there would be no more island and no one would ever have to go back. Or so that legend goes/

      Reassigned to Antarctica [tvtropes.org]

  • by schlachter ( 862210 ) on Friday August 03, 2012 @12:20PM (#40870111)

    Johnson: [notices Dr. Evil's spaceship on radar] Colonel, you better take a look at this radar.
    Colonel: What is it, son?
    Johnson: I don't know, sir, but it looks like a giant--
    [cut to the sky in two jets]
    Jet Pilot: Dick!
    Dick: Yeah?
    Pilot: Take a look outta starboard.
    Dick: Oh, my God! It looks like a huge--
    [cut to a forest with 2 birdwatchers]
    Bird-Watching Woman: Pecker!
    Bird-Watching Man: [raises his binoculars] Oh, where?
    Bird-Watching Woman: Wait! that's not a woodpecker. It looks like someone's--
    [cut to a boot camp]
    Army Sergeant: PRIVATES! We have reports of an unidentified flying object! It is a long, smooth shaft, complete with--
    [cut to a baseball game]
    Umpire: 2 balls! [looks up from game] What is that? That looks just like an enormous--
    [cut to a Chinese school]
    Teacher: Wang! Pay attention!
    Wang: I was distracted by that enormous flying--
    [cut to a concert with Willie Nelson and another guitarist]
    Musician: Willie.
    Willie: Yeah?
    Musician: What's that?
    Willie: [looks up] Well, it looks like a giant--
    [cut back to headquarters]
    Colonel: Johnson!
    Johnson: Yes, sir!
    Colonel: Get on the horn to British Intelligence and let them know about this!

  • Make love not War....pass the hand cream
  • either way they are still watching missiles :/
  • The US Missile Defense agency doesn't have any sort of content filter that could block this type of thing? You'd think they could use a simple whitelisting system - there can't be that many sites outside of *.gov that Missile Defense workers legitmately need to access from work. Let them use a smart phone in the lunchroom (outside of secure areas) when they need to update Facebook (or browse porn).

    • This surprises me as well: I work at a government facility, and it's locked down to the point where I can't get a fair number of sites that actually relate to my job, never mind something work-inappropriate.

  • Overblown story (Score:5, Informative)

    by addie ( 470476 ) on Friday August 03, 2012 @12:35PM (#40870285)

    The article says that less than half a dozen individuals were found to be accessing inappropriate material. That's out of over 8,000 individuals who work at MDA - one memo was sent out to address the problem.

    This is not news.

  • From article: U.S. missile defense workers have been warned that porn on the job is not allowed. It's not just a question of public security due to distraction, but there's also the risk of computer security due to malware found on many such sites.

    So they're running Windows machines. Check. Thanks for the information. :>

  • The military wants an image of a disciplined group of people focused on their job.
    Reality the bulk is a bunch of young adults in their sexual prime...

    What do you think will happen?

  • ...so from now on, bring you own porn to work in the form of a magazine.

  • Not just for blocking porn, but malware.

  • replace the men in the missile silos with computer control so we don't have to deal with this.

  • Clearly they are just studying new shaft designs for missiles. We are always turning to nature to inspire us. Maybe we need to lube the rockets before we penetrate mother earth's atmosphere. You would never get such an idea without porn. Science.
  • We shouldn't be so uptight, it's not like everyone in the world will die if they're distracted from their job for an instant.

  • They were watching massive ordnance penetrators attacking and blowing their payloads in various soft targets :D

  • I think, if I worked there, I would think about bringing my own keyboard then.

    Mouse too.

  • there's actually a serious reason why they shouldn't permit internet-porn-watching in U.S. classified military networks. if they really really want to watch porn, they should provide *isolated* computers and DVDs - or the personnel should bring their own personal machines into the building (if permitted).

    criminals *know* that lots of people watch porn, so they make sure that such sites are loaded with viruses. even just knowing, now, that U.S. military watch porn, you can be damn sure that there will be f

  • Then prosecute them under sexual harassment law. As managers share legal liability with a company if they knowingly permit such a situation (such as participating in it). They can keep their jobs (government employees are almost impossible to fire), let people take them to civil court until they've had enough.

  • I'm going to assume they have their critical workstations airgapped and these are their email/other workstations where they can access situational awareness information.

    Simple way to resolve this is to allow access to whitelist-only pre-approved sites. We do this in our SCADA control room. SCADA machines are airgapped, and email/documentation machines are white-list only.

    We do give them access to Terminal Servers in a DMZ which have less-restricted Internet access.

    Also, we allow them to bring in their own

The truth of a proposition has nothing to do with its credibility. And vice versa.

Working...