1 min read

Manual Data‑Handoffs Threaten National‑Security Networks via Stolen Media

Manual Data‑Handoffs Threaten National‑Security Networks via Stolen Media

The CYBER360 study, cited by The Hacker News, found that a large share of national‑security agencies still move sensitive files using manual, offline methods—USB sticks, external hard drives, CDs, and even printed media. These “air‑gap” transfers are treated as low‑risk, yet they give adversaries a predictable vector: compromised physical media can be introduced into isolated networks without triggering automated defenses.

When malicious media slips past procedural checks, it can exfiltrate classified data, implant ransomware, or corrupt mission‑critical systems, potentially crippling intelligence operations. Defenders must prioritize eliminating manual hand‑offs, enforce strict media control policies, require cryptographic signing of all transferred files, and deploy continuous monitoring of removable‑media usage to shrink this attack surface.

Source: Read original article