DoD blocks military access to social networking sites
Using the sites could clog DoD systems, military says
Computerworld - The U.S. Department of Defense has blocked access to some social networking sites on its computers, saying use of the sites could clog the military's networks, a spokeswoman said today.
The restrictions, which went into effect yesterday, had been considered for some time, said Lt. Col. Randi Steffy, a spokeswoman for the U.S. Strategic Command, which is overseeing the task force that designed the restrictions.
"The consideration here is a bandwidth issue. The .mil domain needs to be preserved for the operational requirements, and it was looked at that many of these sites with the video usage and that sort of thing essentially clog up the systems so they decided to put in restrictions," Steffy said. "Security was a small consideration but it really was a bandwidth/network management issue."
Although Steffy declined to name the sites that were restricted, published reports said they include YouTube, MySpace and 11 other Web sites where soldiers post photos, videos and audio recordings to share with family and friends.
However, soldiers will still be able to access these sites from nonmilitary computers, such as those found in Internet cafes.
Earlier this month, the Army issued a regulation barring soldiers from blogging, taking part in online discussion groups or sending personal e-mails unless they clear the content beforehand with a superior officer, according to a document obtained by Wired Magazine.
Read more about Networking in Computerworld's Networking Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts