DOD issues long-awaited social media policy

Memo lays out rules for various Internet tools

Defense Department officials finally released a long-awaited set of policy directives for the use of social networking and other Internet-based technologies. The DOD sought to balance utility with security, and the final result puts military leaders on notice that they must take responsibility for the cybersecurity of their operations.

The memorandum formalizes the military’s recognition that the ability to work effectively depends on Internet-based capabilities, which have become “integral to operations across the Department of Defense,” wrote Deputy Secretary of Defense William J. Lynn III, who issued the directive. "This directive recognizes the importance of balancing appropriate security measures while maximizing the capabilities afforded by 21st century Internet tools."


Related stories:

DOD policy memo

Security issues may lead DOD to ban use of social media

DOD weighs greater use of social media


The new directive requires military and defense agency leaders to make Internet capabilities via the military’s unclassified but sensitive network available across all of DOD. Until now, some leaders have prevented or severely limited such access.

It also states that commanders at all levels and the heads of DOD components shall continue to defend against malicious intrusions and attacks, such distributed denial-of-service attacks, and take immediate and commensurate actions to safeguard missions. That would permit the discretion to limit access to the Internet to preserve operations security or address bandwidth if necessary.

The directive preserves the practice of prohibiting users from accessing Internet sites, or engaging in activity via social media sites, involving pornography, gambling, hate-crime and other prohibited activities. And it reiterates that members of military, defense and related agencies must continue to follow existing ethics and privacy guidelines.

“The real importance of this memo,” said David Wennergren, DOD deputy chief information officer, “is helping people understand how important it is to share information in a contested environment—in a consistent way. And it’s about being thoughtful about security.”

The memo's primary importance, Wennergren said, is in addressing the inevitable tensions between two groups: those in the military who want to accelerate the sharing of information and those responsible for keeping DOD networks secure.

The purpose of this memo was to help people think about both together, he said. “When you think about security, you tend to think about individual access. And when you think about sharing, you don’t think about security.  This memo was issued to enforce consistency around the use of technologies that are really powerful in helping people get their jobs done better," he said.

But it's also intended to lay a broader foundation for secured computing in an unfriendly environment, he said.  “If what you really want to do is secure information sharing, you need to think about technology that allows you to do trusted computing from untrusted computers,” he said. “It’s sort of like the national park model — take nothing with you, leave nothing behind."

Wennergren also said that desktop virtualization and server virtualization will play a larger role in the secure use of social media in the future. “Imagine having a trusted desktop in the cloud,” he said. “If apps and data are up in the cloud and you understand the perimeter, you can raise the boundaries of security overall.  Virtualization can allow you to be protect your environment from the PC you’re booting into,” he said.

That will especially important as people access more and more data on secure networks through mobile clients, he said.

The road to releasing the policy memo relied on the kind of social media and collaboration tools the memo advocates, Wennergren noted. “We practiced what we preached,” he said, explaining that DOD leaders used a wiki-based approach to gain feedback from stakeholders and the public.

Elizabeth McGrath, DOD's assistant deputy chief management officer and performance improvement officer, said it's increasingly necessary for DOD to figure out how to work with social media tools, rather than barring them.

“As a way to communicate I think social media is terrific," she said. "With the younger generation coming, they expect social media. And I think you need to put those tools on the desktop to enable collaboration.

Agencies will grow more comfortable with the tools as they use them, she said. 

Adm. Mike Mullen, chairman of the Joint Chiefs of Staff, invited followers on his Facebook page to view the new social media policy, demonstrating the value of the technology.

About the Authors

Wyatt Kash served as chief editor of GCN (October 2004 to August 2010) and also of Defense Systems (January 2009 to August 2010). He currently serves as Content Director and Editor at Large of 1105 Media.

Doug Beizer is a staff writer for Federal Computer Week.

Featured

  • Contracting
    8 prototypes of the border walls as tweeted by CBP San Diego

    DHS contractors face protests – on the streets

    Tech companies are facing protests internally from workers and externally from activists about doing for government amid controversial policies like "zero tolerance" for illegal immigration.

  • Workforce
    By Mark Van Scyoc Royalty-free stock photo ID: 285175268

    At OPM, Weichert pushes direct hire, pay agent changes

    Margaret Weichert, now acting director of the Office of Personnel Management, is clearing agencies to make direct hires in IT, cyber and other tech fields and is changing pay for specialized occupations.

  • Cloud
    Shutterstock ID ID: 222190471 By wk1003mike

    IBM protests JEDI cloud deal

    As the deadline to submit bids on the Pentagon's $10 billion, 10-year warfighter cloud deal draws near, IBM announced a legal protest.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.