Feeds

US Navy preps 'Gestapo' server removal

Bill Clinton on the offensive

  • alert
  • submit to reddit

Top three mobile application threats

The US Navy has a real battle on its hands in the form of a proxy server named Gestapo.

Last month, one Edward Campbell - an independent reporter - discovered a proxy server of dubious distinction lurking in the Commander Naval Reserve Recruiting Command (CNRRC) in New Orleans. It seems that the server named "gestapo.cnrrc.nola.navy.mil” has been pinging various websites, including one of a fellow reporter who had been looking into "cyber-stalking of Muslim journalists". And, in fact, there is evidence of the Gestapo server popping up in a number of places.

The Navy's name choice for the server was certainly not the best. It's uncomfortable enough for some to see the reference to Nazi Germany's police force and even more uncomfortable to think this is the monicker given to some kind of Muslim journalist snoop system.

"What happened was that the name was picked six years ago, and an IT guy plucked the name out of the air," said Lt. Bill Clinton of CNRRC. "It certainly wasn't the smartest choice."

Um, no.

As it turns out, the proxy server is actually working as a firewall, according to CNRRC. It's protecting a database of recruit information and is not snooping at all. The Navy plans to change the Gestapo name at the end of this month.

"We can't shut it down right now because the database is used to get recruiting leads," Clinton said.

The CNRRC has to meet a goal of pulling in new recruits before the database and its accompanying IT gear can be shut down. With that in mind, the Gestapo stop date has been set for 4 August.

"It's a poor choice of words, and we decided to shut it down as soon as we knew," Clinton said. Or, as it were, at a convenient time.

We're not quite sure why the CNRRC's entire IT system needs to be shut down to remove this firewall or why the firewall was actively pinging Web sites and coincidentally ones of Muslim journalists. Maybe some of our dear readers can explain this situation.

Regardless of the IT mechanics behind the Gestapo system, this incident has proved one thing. The Navy has an unmatched talent for naming.

Bill Clinton is actually one of the lower profile names for a Navy spokesman. We prefer the intriguing Lt. Mike Kafka, who, among other things, answers questions about Guantanamo Bay. In particular, Kafka was charged with answering our questions about the Navy's decision not to dub Guantanamo "the least worst place" anymore.

In related news, a few prisoners have managed to make their way out of Guantanamo, and this would no doubt make Joseph K. proud.

If, by chance, you are concerned about what happens to the remaining prisoners in the event of a hurricane, have no fear. We understand that a number of them are applying for official government mascot status. According to the Guantanamo Gazette, this strategy has worked wonders for Georgio the GTMO Goat.

"During a hurricane the Guantanamo Veterinary Treatment Facility (VTF), cannot possibly house the large number of GTMO pets due to their limited space," the Gazette says. "However, Georgio, the GTMO goat, just happens to be on orders and is exempt from this policy."

Lucky Georgio. ®

Related links

Original Gestapo Server story
The GTMO Gazette

Related stories

Guantanamo Bay loses 'least worst place' status - Navy
Abu Ghraib: US security fiasco
Dell in front line of War on Terror

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.