Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security IT

NSA Wages Cyberwar Against US Armed Forces Teams 219

Hugh Pickens writes "A team of Army cadets spent four days at West Point last week struggling around the clock to keep a computer network operating while hackers from the National Security Agency tried to infiltrate it with methods that an enemy might use. The NSA made the cadets' task more difficult by planting viruses on some of the equipment, just as real-world hackers have done on millions of computers around the world. The competition was a final exam for computer science and information technology majors, who competed against teams from the Navy, Air Force, Coast Guard and Merchant Marine as well as the Naval Postgraduate Academy and the Air Force Institute of Technology. Ideally, the teams would be allowed to attack other schools' networks while also defending their own but only the NSA, with its arsenal of waivers, loopholes, and special authorizations is allowed to take down a US network. NSA tailored its attacks to be just 'a little too hard for the strongest undergraduate team to deal with, so that we could distinguish the strongest teams from the weaker ones.' The winning West Point team used Linux, instead of relying on proprietary products from big-name companies like Microsoft or Sun Microsystems."
This discussion has been archived. No new comments can be posted.

NSA Wages Cyberwar Against US Armed Forces Teams

Comments Filter:
  • NCCDC (Score:5, Informative)

    by Anonymous Coward on Monday May 11, 2009 @05:25PM (#27913455)

    Looks a lot like the National Collegiate Cyber Defense Competition [nationalccdc.org]. Any college student team can participate in that one, however, and the NSA or Secret Service have participated in past events iirc.

    The competition is a lot of fun, 64 teams last year.

  • Re:Linux (Score:2, Informative)

    by sleekware ( 1109351 ) * on Monday May 11, 2009 @05:30PM (#27913525)
    I see this was marked as a trolling comment, but I meant with respect of the ability to really harden the security (and great security that is usually comes with a Linux or BSD package by default).
  • by alchemist68 ( 550641 ) on Monday May 11, 2009 @05:38PM (#27913661)
    This appears like a modern day Kobayashi Maru exercise. And instead of it being designed and executed by a single Vulcan whom we all know, it was done by the best and brightest of our 'No Such Agency'. I say congratulations to both parties, the NSA and the winning West Point Team.
  • Re:Not as many? (Score:3, Informative)

    by ross.w ( 87751 ) <rwonderley.gmail@com> on Monday May 11, 2009 @05:47PM (#27913797) Journal

    I never said they don't. They do, and that's bad. But that doesn't change the point that the ability to inspect and audit all your code for vulnerabilities is an attractive feature to any Government not wanting to trust a proprietary vendor beholden to a foreign power. China was just an example. The same would be true of France or Germany.

  • Re:Linux (Score:5, Informative)

    by Bellegante ( 1519683 ) on Monday May 11, 2009 @05:55PM (#27913943)
  • by davidsyes ( 765062 ) on Monday May 11, 2009 @05:55PM (#27913947) Homepage Journal

    Cadets trade trenches for firewalls
    http://news.cnet.com/2100-7350_3-6249633.html [cnet.com]

    (if you don't have nor want a subscription to the NYT....)

    This part probably is getting lots of attention here in /.:

    Cadet Brian McCord, part of the team that installed the operating system, said he was chosen because his senior project was deeply reliant on Linux. The West Point team used this open-source operating system, freely available on the Internet, instead of relying on proprietary products from big-name companies like Microsoft or Sun Microsystems.

    But this part probably says it all:

    ""It seems weird for the Army with its large contracts to be using Linux, but it's very cheap and very customizable," McCord said. It is also much easier to secure because "you can tweak it for everything you need" and there are not as many known ways to attack it, he said."

  • by Frequency Domain ( 601421 ) on Monday May 11, 2009 @06:01PM (#27914039)
    There is no "Naval Postgraduate Academy," it's the "Naval Postgraduate School [nps.edu]". If the authors of the article couldn't be bothered to take 15 seconds to confirm that with Google, it makes me wonder what else is incorrect in their writeup.
  • Re:Not as many? (Score:5, Informative)

    by blitzkrieg3 ( 995849 ) on Monday May 11, 2009 @06:04PM (#27914093)

    There are plenty of ways to hack all OSs. Maybe a generic underhardened Windows install has more know ways...but how would one even quantify what is know and not know.

    When getting attacked by the NSA, I'd prefer to use something that they developed [nsa.gov] to stem such an attack. And I don't want to hear, "well they developed it, so they probably have a backdoor." The many eyes argument definitely applies, since patches from the NSA would undoubtedly come under much more scrutiny. Espeically since this has yet to be proven for other operating systems [wikipedia.org].

    Anyway, the winning team was using Fedora 8, which has SELinux on by default.

  • Re:Not as many? (Score:5, Informative)

    by Unordained ( 262962 ) <unordained_slashdotNOSPAM@csmaster.org> on Monday May 11, 2009 @06:05PM (#27914125)

    And regardless, can you trust the build based on that source code? ACM Classic: Reflections on Trusting Trust [boun.edu.tr] (about the need for a bootstrap compiler, and the concern that this compiler might be infiltrated.)

  • Re:Kobayashi Maru? (Score:4, Informative)

    by timeOday ( 582209 ) on Monday May 11, 2009 @06:18PM (#27914323)
    This is called "ceiling effect" and "floor effect." (cite [wikipedia.org]).
  • by malevolentjelly ( 1057140 ) on Monday May 11, 2009 @06:38PM (#27914639) Journal

    Unless they had it disabled the Red Hat systems they used would have had SELinux enabled by default so if their linux systems really were a sieve then that doesn't speak to highly of SELinux and the NSA.

    SELinux merely brings linux up to par with other popular commercial systems in security, not beyond them. It brings Linux to the level where it may receive a government EAL 4+ certification, which certifies that the system is safe from casual or inadvertent attacks. These systems do not reflect the level of security necessary to defend government networks.

  • Re:Kobayashi Maru? (Score:3, Informative)

    by PitaBred ( 632671 ) <slashdot&pitabred,dyndns,org> on Monday May 11, 2009 @06:47PM (#27914761) Homepage
    Who fell last, basically. If it wasn't hard enough, multiple teams would have finished and you couldn't have distinguished between them.
  • Nothing new here (Score:5, Informative)

    by ronmon ( 95471 ) on Monday May 11, 2009 @06:50PM (#27914795)

    I was in the AF from 1977-1981 and worked directly for the NSA when they still had some scruples. In fact, my last posting was at Fort Meade after several years in the far east.

    As a '202xxA'(Radio Communications Analyst), that focused on foreign military communications, I could have been reassigned at any time as a 202xxB (Radio Communications Security Specialist) with no retraining. The B job just meant we were testing our own weaknesses instead of exploiting those of our opponents. It is important to look inward, find your flaws, and fix them. Kind of like debugging open source code, huh?

    That's what they were doing. Good job.

  • Re:Linux (Score:5, Informative)

    by Anonymous Coward on Monday May 11, 2009 @06:54PM (#27914857)

    I was involved in the exercise. We used FreeBSD and Fedora Core 10 as our base server platforms. We'd used FreeBSD last year, so we were confident that it would give us a solid base to work from.

    According to the exercise directive, we had to run several windows workstations. We used Window2008 as the Active Directory and Domain Controller. We didn't go so far as try the "read only" mode, but W2k8 seemed solid enough for the duration of the exercise. Wasn't easy to get set up and locked down, however.

  • Re:OpenBSD? (Score:3, Informative)

    by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Monday May 11, 2009 @06:57PM (#27914909) Homepage Journal

    I'm always surprised that no one considers using OpenBSD as their operating system; it's the only one that I know of that is specifically, purposely built, for security.

    What? OpenBSD was forked from netbsd, it's not specifically built for security. It's specifically forked from netbsd, and since then the focus has been on security. Arguably the approach is no more or less valid than using a security layer like selinux. The two have certain parallels; getting some software to run on OpenBSD is a bitch, and getting selinux configured and useful is a bitch :)

  • Re:NCCDC (Score:5, Informative)

    by Jah-Wren Ryel ( 80510 ) on Monday May 11, 2009 @07:05PM (#27915029)

    You really think that if the NSA went to Microsoft and asked for source code, that Microsoft would say no?

    Hell, MS even said yes when China asked. [cnet.com]

    Open-source just levels the playing field for the rest of us.

  • Re:OpenBSD? (Score:4, Informative)

    by wandazulu ( 265281 ) on Monday May 11, 2009 @10:04PM (#27916753)

    I mentioned this in another post, but the point of using an Alpha, or a MIPS, or Itanium, or whatever, is not meant to be a cure-all, it's meant to present yet-another-barrier to entry. Since malware typically relies on being pre-compiled, your x86-based exploit isn't going to work. Somehow you find out I'm running OpenBSD on an Itanium. Okay, you have that information, but I've still made your job harder, now you have to go out and get an Itanium to build your malware on before you try to hack my box because you can't assume I'll have a compiler on it (and I would never have a compiler on it).

    Using a OS like OpenBSD and a different chip architecture will not guarantee a hack-proof box, but it's going to make it that much harder; if you're just looking for a box to turn into a zombie, it won't be worth it. If you're a foreign government trying to get at my battle plans, the booze-n-hookers method is likely going to be easier and faster.

  • Re:Not as many? (Score:3, Informative)

    by TED Vinson ( 576153 ) on Monday May 11, 2009 @10:44PM (#27917067)

    I'd be more interested in the permiter defenses they used. Like what kind of IDS/IPS did they use?

    The rules require the teams to construct the network within the constraints of a notional budget. This forces the teams to make choices about what infrastructure and security measures to deploy. They cannot have everything they might want; this is a taste of the risk-benefit decisions managers and admins have to make. It is also intended to make it feasible for the Red Team to penetrate a well-watched network, having only a minimal user-base, in only four days.

    IPS and other automated response systems are prohibited in the CDX.

    For IDS the West Point team used Snort on BSD, with a custom-blended set of rules from VRT and Emerging Threats.

    The budget decisions did not support deploying a dedicated firewall device. Firewalling had to be done using Cisco ACLs; however, some creative use of NAT and VLANs helped to make the Red Team's job a bit harder.

  • Re:Not as many? (Score:3, Informative)

    by Anonymous Coward on Monday May 11, 2009 @10:55PM (#27917169)

    Unless it is a driver for something really important to system stability, it should not take down the whole OS.

    Your complaint is against the PC platform, not the OS. It is impossible to operate PCI hardware without trusting it and the corresponding driver stack. This is due to the way DMA and interrupts work. This may change some day with the "I/O virtualization" features of late, but given the track record of other PC virtualization not being secure, I would not hold my breath.

  • Re:Linux (Score:5, Informative)

    by Tom ( 822 ) on Tuesday May 12, 2009 @05:57AM (#27919457) Homepage Journal

    I'd be interested to see how a team harvested from the basements of MIT or Caltech would stack up in a challenge like this, actually.

    Get their asses handed to them, essentially.

    We all laugh about the military and the secret services, but we forget what an impressive amount of things they do that we do not hear about. Sure, you learn about that double-agent fuckup in the middle east and think "how could anyone be that stupid?" - but you never learn about the other 20 agents that never get caught or uncovered.

    MIT is an impressive university, and they can floor Vegas with card counting. But the NSA is the largest employer of mathematicians in the world, and is still several years ahead of the world-wide scientific community in some areas of math research, especially cryptography.

    They have their share of fuckups, like every organisation of that size. Wouldn't underestimate them, though.

Without life, Biology itself would be impossible.

Working...