\
For the specific details yes, but hiding the strategic reasons for why we have security and the general ways attackers can exploit us is a terrible idea. Computers are not a military-only appliance, their use and abuse is common knowledge and freely available.
End users, especially those with important jobs such as being pilots, need to know how their actions can affect the network.
Take for example the following hypothetical, which is an entirely possible event. Keep in mind all of knowledge used to build this theoretical attack is common knowledge to even the most basic of script kiddies on the internet.
This site bills itself as a military aviation community, which naturally makes it an attractive target for people who want to collect info on the US Military. It also runs a relatively popular bulletin board system that has been exploited in the past to reveal sensitive information, and is virtually guaranteed to be exploitable in the future. So bad guy finds this new exploit, or develops it himself, which basically allows him to pull down the entire forum database.
So whats in the database? Copies of all the posts naturally, but there is a lot more sensitive information to be gathered:
- Copies of all undeleted Private messages - How many times do you see "PM sent" A lot. Well Private messages are only private in that everyone can't immediately see them. They are still stored in the database. It is likely that someone has left a message here that has sensitive info on it and now the bad guy has it
- Registration email addresses - Gives the bad guy a target to perform a spear fishing attack on. Now he can craft a targeted email that he is reasonably sure is going to someone who info he wants that is a member of the military. While most people will recognize this attack and not fall for it, how many will report it. And of course, there will always be that one person who clicks the link...
-Password hashes - These are one way representations of the passwords people use to log on to this board and are one of the holy grails for such an attacker. With a lot of computing power (and bad guys have this in spades with compromised computers/bots) these hashes can be broken, revealing the plaintext password. For most people this isnt a problem, its a password for a forum that has already been compromised. But here is the big win for the attacker: There are some people here (likely a lot) who use the same password for this forum as they do for their email, and everything else on the internet. Now the bad guy has this password.
But what can he do with it?
Well the next step is to take that email address and look through every message ever sent and received. With gmail offering GB of free space why would anyone ever delete anything? This is a gold mine to an attacker, especially with various military systems still opting to send a password reminder email to a civilian address. It would be extremely easy to use the compromised email to gain access to a military system.
The bottom line: User actions outside the network can let attackers inside our network. But the overall point is this, network security is extremely vital to prevent military secrets from walking out the door. While people may complain about password requirements and thumb drive bans it is often done for a very good reason. The attackers only have to be successful once, while defenders have to be successful all the time.
Again, the above scenario is entirely possible and is in the domain of an attacker with moderate skill, or low skill with a lot of determination. This info used to build this attack is freely available.
It would be a very good idea for everyone here to think about what they do with computers and the internet and how their actions could be helping an attacker exploit themselves and the military.