For over 10 years, millions of emails associated with the US military have been getting sent to Mali, a West African country allied with Russia, due to a typo, according to a report from the Financial Times. Instead of appending the military’s .MIL domain to their recipient’s email address, people frequently type .ML, the country identifier for Mali, by mistake.
Johannes Zuurbier, a Dutch entrepreneur contracted to manage Mali’s domain, tells the Financial Times that this has been happening for over a decade despite his repeated attempts to warn the US government. When Zuurbier began noticing requests for nonexistent domains, like army.ml and navy.ml, he set up a system to catch these misdirected emails, which the Financial Times reports “was rapidly overwhelmed and stopped collecting messages.”
Since January alone, Zuurbier has reportedly intercepted 117,000 misdirected emails, several of which contain sensitive information related to the US military. According to the Financial Times, many of the emails include medical records, identity document information, lists of staff at military bases, photos of military bases, naval inspection reports, ship crew lists, tax records, and more.
Once Zuurbier’s 10-year contract with Mali ends on Monday, authorities in Mali will be able to gain access to the emails
Some of the misdirected emails were sent by military staff members, travel agents working with the US military, US intelligence, private contractors, and others, the Financial Times reports. For example, an email from earlier this year reportedly contained the travel itinerary for General James McConville, the US Army’s chief of staff, for his visit to Indonesia. The email included a “full list of room numbers,” along with “details of the collection of McConville’s room key at the Grand Hyatt Jakarta.”
Zuurbier won’t be able to intercept these emails for much longer, however. Once his 10-year contract with Mali ends on Monday, authorities in Mali will be able to gain access to the emails. Russia established a presence in Mali last year through the Wagner Group, a Russian state-backed paramilitary organization that recently staged a rebellion against President Vladimir Putin. In May, the US State Department said the Wagner Group sought to use Mali as a route to transport war supplies to Ukraine.
“The Department of Defense (DoD) is aware of this issue and takes all unauthorized disclosures of Controlled National Security Information or Controlled Unclassified Information seriously,” Tim Gorman, a spokesperson for the Office of the Secretary of Defense, says in an emailed statement to The Verge. Gorman adds that emails sent from a .mil domain to Mali are “blocked” and that the “sender is notified that they must validate the email addresses of the intended recipients.”
Gorman acknowledges that this doesn’t stop other government agencies or those working with the US government from mistakenly sending emails to Malian addresses, though. Still, he notes that “the Department continues to provide direction and training to DoD personnel.”
Any org that deals with sensitive info should
Ensure that emails going outside the org go through additional scrutiny.
The user should have to validate the sensitivity of the email and attachments so the system can deny passing them to untrusted networks.
Use PKI to encrypt important messages so only the recipients can unencrypt them
Use domains that are entirely separated from the internet for military sensitive stuff (NIPR Net, SIPR, JWICS, etc). Those won’t route to the open internet in other countries for any reason.
The PKI bullet comes with its own damn issues, though. I understand it is more secure, but fucking Christ neither I nor the recipient can access that email and the email chain next month for some fucking certificate issue related reason.
Now, WTF did we say in that email? What was the work around for that issue that we had that month? Do we even fucking remember what we were talking about?
I hate it, it’s bad. Maybe it’s just the army’s email and not like that in other corporate or military email systems. I regularly pull up old email chains to review what we did back when, to spin myself back up on issues and work arounds, to then RE the email for a situation update request, etc. if I can’t access them, which is a common issue, then it’s causing more harm than help.