Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
United States Security

DOD Kicks Up Cybersecurity Efforts 178

codingOgre writes "The US Army will try to secure an entire computer network against a team led by the NSA. They are cadets at West Point competing against military academies and other schools in a four-day Cyber Defense Exercise this week. I would have to think that this would be a lot of fun! I would like to see what the NSA and friends could throw at my network, although one would think they wouldn't reveal all their cards...like the backdoor into any Windows box :)" In a related story, jkinney3 writes: "The feds are wising up to the needs for a verifiable, secure code base for all of the DOD stuff, according to Government Computing News. A proposed solution 'would create a single executive organization responsible for software integrity and information assurance.' Joe Jarzombek, deputy director for software assurance in DOD's Information Assurance Directorate, said 'DOD possesses so many millions of lines of code in countless thousands of packages, that it would take years of effort and millions of dollars just to identify what was developed where.' I'm envisioning a lot of Bugzilla installations."
This discussion has been archived. No new comments can be posted.

DOD Kicks Up Cybersecurity Efforts

Comments Filter:
  • by Anonymous Coward on Thursday April 22, 2004 @11:37AM (#8939343)
    Is this why all those US bank notes say "IN DOD WE TRUST" on them?
  • by Anonymous Coward on Thursday April 22, 2004 @11:37AM (#8939349)
    They'll be unplugging the network. NSA probably has a work-around, though.
    • ...but I'm sure the NSA will try to hijack the EM transmissions at the endpoints. Of course, the military is quite aware of that, but your average computer installation probably wouldn't be safe simply by disconnecting the network...

      Kjella
      • by Anonymous Coward
        What if the NSA really isnt that great at hacking?

        I mean I'm sure they are competent. But I bet they use mostly public tools and methods.

        Security research is a pretty accessible field and there are many security researchers both public and underground. The chance that a small group of NSA people have discovered some super elite technique of hacking while the rest of the entire world is in the dark seems slim to me.

        • Maybe, but I hope they scan the rooms for bugs very very carefully and check their cords for keystroke loggers and other forms of EM taps.

          Why hack it when you can walk in the front door using the password you picked up from a video above the keyboard?
    • "Army lost last year not because of a successful outside attack but from a self-inflicted wound in which an authorized network user accidentally knocked out service for several hours, costing precious points that helped Air Force prevail."
    • by MisterSquid ( 231834 ) on Thursday April 22, 2004 @01:42PM (#8940895)

      Army slob 1: OK, everything locked down?

      Army slob2: Services off, filtering on. Nothin's gettin' in here.

      NSA hack: [Taps on keyboard. Clicks "Send."]

      Army slob 1: Hey, check it out. I just got an email with nude pix of Natalie Portman and HOT GRITS!

      Army slob 2: Score!

      Army slob 1: [Clicks "Open Email"]

      NSA 1: Army 0

      • Re:NSA's Secret Plan (Score:4, Interesting)

        by STrinity ( 723872 ) on Thursday April 22, 2004 @02:15PM (#8941308) Homepage
        It's funny but unfortunately true. My father does this for a living, and part of his job is dealing with ijits who send classified reports to their Hotmail accounts so they can work on them at home. (If you knew the ranks of some of the guys who do that, you'd be building a bomb shelter right now.)
  • by abh ( 22332 ) <ahockley@gmail.com> on Thursday April 22, 2004 @11:38AM (#8939362) Homepage
    Username is joshua, and you don't need to enter a password.
  • Easy... (Score:5, Funny)

    by JimDabell ( 42870 ) on Thursday April 22, 2004 @11:38AM (#8939373) Homepage

    Nowhere in the article does it say that the computers have to be on.

    • by GillBates0 ( 664202 ) on Thursday April 22, 2004 @11:41AM (#8939408) Homepage Journal
      Will the network have UNIX or Windows based OS's? I would think the better idea is to use a mixture of OS/platforms to simulate a real-world network, but it should've been mentioned.

      It would also be interesting to see which OS allows the "red team" to infiltrate the network.

      • For the most part, the army uses Windows boxes... Mostly Win2k and Windows XP. At least, they do in the command I work at.

        I am aware that there ARE various UNIX boxes scattered around, but Windows makes up the vast majority, for reasons that continue to elude me.

        -Damen
        • this is crap. i work for the army and i know the parent poster is correct. i have seen numerous unix projects cancelled only to be replaced by windows/.NET projects. the only reason.... costs. they see cheap laptops and highly mobile servers and if they break just junk it and replace. the F-ed up part is the unix machines passed more tests the windows boxes for air drops, people drops, EMI tests, etc. i heard of some troops being air dropped some dell laptops which fell into a small pond. effectively wasti
          • Well, I dont know about your worm part.. I'm in charge of about 8 servers, and I get harassed about every day to install the newest AV updates.. They're staying pretty on the ball with that.
          • That's right folks, you heard it here on slashdot first:
            Unix boxes are superior to Windows boxes because they're more waterproof


      • by OECD ( 639690 ) on Thursday April 22, 2004 @11:51AM (#8939516) Journal

        Will the network have UNIX or Windows based OS's?

        Read the fine article--the Army team, at least, uses Linux

        Pretty amazing the /. story didn't trumpet that fact.

      • by agentZ ( 210674 ) on Thursday April 22, 2004 @11:53AM (#8939554)
        I'm involved at the Navy side of this exercise.

        The requirements specify using Exchange, but otherwise we're free to use whatever operating systems we want. Obviously I can't say what we're using for operational security reasons, but let's just say that it's a heterogeneous environment.
        • Erogenous eh? Must be BSD [wigen.net]...
        • What is that any operating system that is NMCI compliant?

          The Navy as I understand it is heading for a completely monoculture network. Worse yet that monoculture is brought to you by the folks from Redmond. You can expect a few more ships towed into port.
          • "What is that any operating system that is NMCI compliant?...brought to you by the folks from Redmond."

            You know? At this point, I dunno who is the worst...MS or EDS. NMCI feels like the anti-christ to a dba or developer here...ick!! I can't wash off the dirt...help...help...

      • I've got DOS 6.22 filed around here somewhere. Not loading any drivers for the NIC is a very secure way to run that operating system. And depending on what hardware you're running, it runs pretty darn quick. ;-)
    • "Army lost last year not because of a successful outside attack but from a self-inflicted wound in which an authorized network user accidentally knocked out service for several hours, costing precious points that helped Air Force prevail."

      So, as you can see, turning the computers off is actually counter productive.

      Also, this is pretty cool:

      "The rules this year are designed to make the competition simulate more of a 24-hour operation, despite the reality that "Taps" still sounds at 2330 (11:30 p.m.) and c
  • by Anonymous Coward
    If anyone has enough money to be able to afford Macs, it's the government/military. :-)

    The NSA will never break into those.
  • hacker wargames (Score:4, Interesting)

    by quelrods ( 521005 ) * <quel@ q u e l r o d.net> on Thursday April 22, 2004 @11:39AM (#8939381) Homepage
    It sounds like a CTF match, except via the government. I somehow doubt they'd publish packet dumps and such of the event, but that'd be even more interesting. Kudos to the nsa/dod for trying to ensure some of our vital infrastructure is secured from attack.
  • by mfh ( 56 ) on Thursday April 22, 2004 @11:39AM (#8939386) Homepage Journal
    While we would like to thank you for participating in our security test, we can not further report on this event due to National Security, and we humbly request that all key loggers, camera phones and recording devices remain in the safe hands of our NSA coat-check-girls (for fine tuning).
  • Yessir [ultralog.net].
  • Sounds good to me (Score:3, Insightful)

    by shadowkoder ( 707230 ) on Thursday April 22, 2004 @11:40AM (#8939395)
    I hope this is a path the military will continue to follow. Security is vital when you come to rely heavily on intelligence. Lets just hope the dont stop here and take this as a serious effort.
    • Re:Sounds good to me (Score:1, Informative)

      by Anonymous Coward
      This "path" was set upon in 1993 when the NSA officially stood up the IW teams, in at least making them accessible to the DoD as an exercise and assessment tool. DoD networks have been regular vicitms for the last decade.

      Ultimately, the Red Teams are worth about 30 days of organizational leadership attention (depending on the visibility of the exercise), resulting in near-term actionable items that get little if any funding to help secure success. Its the ADHD nature of the entire DoD-- leadership change
  • Uh oh... (Score:4, Funny)

    by adun ( 127187 ) on Thursday April 22, 2004 @11:42AM (#8939411)
    I'm sure we all remember the LAST time some snotty smart punks hacked into a military computer!

    "Hello Professor Falken. Would you like to play a game?"

    *shudder*
  • duh (Score:1, Insightful)

    by Anonymous Coward
    Firewall it with OpenBSD, use pf's packet cleansing option. Ta-Da!
  • Shocking (Score:5, Interesting)

    by thebra ( 707939 ) * on Thursday April 22, 2004 @11:42AM (#8939421) Homepage Journal
    Army lost last year not because of a successful outside attack but from a self-inflicted wound in which an authorized network user accidentally knocked out service for several hours, costing precious points that helped Air Force prevail.
    Isn't this how most corporate networks are taken down? BTW, I can't access the intranet.
    • Re:Shocking (Score:5, Informative)

      by ssuppe ( 773610 ) on Thursday April 22, 2004 @11:56AM (#8939591)
      Army lost last year not because of a successful outside attack but from a self-inflicted wound in which an authorized network user accidentally knocked out service for several hours, costing precious points that helped Air Force prevail.

      Well, that's not exactly what happened. I was a member of the Air Force Academy's team. I don't want to give too much away because you never know who will be reading this, but the Air Force's Team didn't have a SINGLE break-in during the entire excercise. Even when we were ordered to take down our firewalls on the last day, all of our machines were locked down (even the requisite Windows Boxen) that there were no compromises. The Red Team wasn't even able to perform a 100% successful DOS attack

      The exercise was basically run like this. Every team was given more or less the same hardware/# of machines to use to defend their network. You were allowed to use any operating system you felt was necessary, although a certain number of Windows machines had to be on the network. Each team had to provide a variety of services, including local account, local mail for members of the red team, web servers, database services, mail, DNS and FTP. SFTP was not allowed, so you had to be creative in your security.

      Services were measured by downtime - a service could go down for a specific amount of time before points were taken away. The points were on a subjective scale based on amount of downtime, how you remedied it, etc.

      It should ALSO be noted that this is an exercise that resides purely in Academia - it's an exercise between a bunch of different service academies, which is NOT the same thing as the operational United States military

      All in all, it was an EXTREMELY exciting exercise, lots of attacks were thwarted, many cans of Mountain Dew were imbibed. We laughed a little, cried a little, heck we even learned a little.

  • I hope not (Score:5, Funny)

    by go3 ( 570471 ) on Thursday April 22, 2004 @11:43AM (#8939433)
    They'll probably just install Norton Internet Security.
  • by 53cur!ty ( 588713 ) on Thursday April 22, 2004 @11:43AM (#8939441) Homepage
    A lovely 5 year stay in LevinWorth!

    What do we have for the runner-ups John?

    Where the fun is [technicalknow-how.com]

  • haha (Score:5, Interesting)

    by Anonymous Coward on Thursday April 22, 2004 @11:46AM (#8939460)
    We get random netbios traffic from the DoD all the time... looks like something is not locked down over there. Either that or they are scanning other government agencies for open windows computers. hmmmm.
  • by Otter ( 3800 ) on Thursday April 22, 2004 @11:47AM (#8939481) Journal
    ...the former head of the Los Angeles LUG protests this by, uh, ...

    Hmmm, I guess he's run out of cheap ways to get attention. Maybe he could quit the AAA or the Subway Sub Club, or something like that.

  • by KaDOOGAN ( 171877 ) on Thursday April 22, 2004 @11:48AM (#8939487) Homepage
    As the post states, I don't think NSA will reveal all methods.

    DOD: could you sec-test our network?
    NSA: sure.

    NSA: we've found these holes
    DOD: fixed
    DOD: hey, now even you guys can't get in!
    NSA: Doh!
    • by Kjella ( 173770 ) on Thursday April 22, 2004 @12:03PM (#8939670) Homepage
      DOD: could you sec-test our network?
      NSA: sure.

      NSA: we've found these holes
      DOD: fixed
      DOD: hey, now even you guys can't get in!

      NSA: riiiiiiiiight...
      DOD: there's more?
      NSA: *whistles innocently*
      DOD: could others have discovered the same exploits?
      NSA: theoretically, that is, if there were any
      DOD: so theoretically, if they nuke us with our own nukes, it's your fault
      NSA: ....*whoops*

      Kjella
    • The NSA's primary job is to secure the communications of our government agencies. If that means securing them even against moles in the NSA, that's a good thing.
  • Art of War (Score:5, Funny)

    by WoodenRobot ( 726910 ) on Thursday April 22, 2004 @11:48AM (#8939493) Homepage
    Cyber warfare, a subset of classic information war that goes back as far as ancient Chinese military strategist Sun Tzu, has pushed its way into U.S. military curricula as the Internet has become pervasive.

    Sun Tzu say "try asking them for their passwords, maybe offering a bar of chocolate in return. [slashdot.org]"
  • Cyber Rattling (Score:2, Interesting)

    by Doc Ruby ( 173196 )
    Now that they've got a disgruntled former employee [com.com], the CyberSecurity corps of Homeland Security will turn their eyes on all unpatriotic Americans who can get TV time. And the rest of us will drown in emailed PIF viruses.
    • I link to a story about how the former CyberTerrorism chief had a plan that would have protected Americans from the tide of email viruses now plaguing us, possibly nipping it in the bud, and that's "flamebait". If you don't want to debate the hard questions, go back to Bob Jones University, where it's all gospel, without that inconvenient "discourse".
      • You critical mistake was to say something favorable about someone who has dared to criticize our Glorious Leader, and who is therefore clearly an Evil America-Hating Terrorist.

        Say, citizen ... why do you hate America so much? Are you an Evil America-Hating Terrorist who criticizes our Glorious Leader, too?

        Get'im, boys!
        • Wait - I called him a "disgruntled former employee", which my NewSpeak Encyclopedia (Vol 2004.4.1365b) specifies as an upgrade from "postal" and "regime change".

          These "Flamebait" and "Troll" mods generally look to me less like rightwing supression than like "Whatever Generation" wimpouts. Kids today - no nerve. Anything that looks like confrontation is bad. Breeding a nation of deniers overlaps the rightwing agenda of a scared, servile populace armed to the teeth and targeting strawmen. But, as I learned f
  • The US Army will try to secure an entire computer network against a team led by the NSA
    Ha-ha-ha-ha-ha-ha-ha-ha-ha-ha-ha-hoho-ha-ha-ha-h a- ha-ha-ha-ha... eeeeeh ... -ha-ha-ha-ha-ha-ha-ha-ha-ha-ha-ha-ha-ha-ha!!!
  • NSAKey (Score:3, Interesting)

    by shachart ( 471014 ) <shachar-slashdot&vipe,technion,ac,il> on Thursday April 22, 2004 @11:53AM (#8939550)
    Hey, does anyone recall the NSAKey symbol that leaked on a debug version of a DLL in NT 4? (Was that GINA.DLL?) I wonder if it's still in there in later versions...
  • Kudos (Score:4, Insightful)

    by DoubleD ( 29726 ) on Thursday April 22, 2004 @11:53AM (#8939556)
    It is good to see the issue of computer security intelligently approached.

    It is much better to harness the natural competitiveness and curiosity of your geeks than to suppress it by any means possible and depend on security by obscurity.
  • by ch-chuck ( 9622 ) on Thursday April 22, 2004 @11:56AM (#8939580) Homepage
    A sargent is pacing in front of a line of soldiers at attention, bellowing, "I've never seen such a sloppy outfit! Dictionary passwords on the root filesystem - open NetBIOS ports on the security gateway!!"

  • that is based on the simple premise of limiting the impact that any attack can possibly have instead of trying to do the impossible and prevent all attacks. So, how do they do it? Simple really. In fact, its so simple that is even be accidental. Their systems are so diverse, numerous, both antiquated and modern at the same time, that even they don't know what they have. Much of the time, there are several completely separate systems based on different technologies from different decades that can be cho

  • by thisissilly ( 676875 ) on Thursday April 22, 2004 @11:58AM (#8939602)
    ...any chocolate bars. [slashdot.org]
  • by Anonymous Coward
    post a link to the webserver on /. that ought to be a good stress test.
  • Useless exercises (Score:5, Insightful)

    by eyeball ( 17206 ) on Thursday April 22, 2004 @12:00PM (#8939631) Journal
    Unfortunately exercises like this show how our conventional approach to warfare (cyber- or human-) is doomed in the world of increasing unconventional war tactics.

    With a network or a piece of land, actively defending against a known enemy in a known timeframe is fairly easy. You know the rules for engagement, you can easily account for all the possible outcomes.

    Putting processes in place to defend against undeterminable attackers in an indefinite timeframe approaches the impossible. In a network, all it takes for hostile code to infiltrate is one human error (i.e.: a race condition when a firewall ACL changes). Same with terrorism: all it takes is a few people with flight training and box-cutters to do some serious damage. There are no rules of engagement.

    Put another way, conventional warfare (again, cyber- or human-) is like a chess tournament. Predictable rules. For the unconventional, imagine someone winning a chess tournament by pulling out a gun and shooting the opposing player.
    • More like having this thing scheduled for 3-4 months in advance, but having some one sneak in a month early and connect some custom embeded server directly to a "secured" network jack. Maybe they just replace the network jack with another that is the custom server. How many users would notice if there computers still worked? I wonder how long it would take before the admins noticed. Would the NSA guys remember to pick it up after the contest?

    • by nomadicGeek ( 453231 ) * on Thursday April 22, 2004 @01:19PM (#8940589)
      So what do you do? Give up because it is too hard?

      You act like conventional warfare is always straightforward. Everyone just lines up and fights a certain way between certain hours. Deception, misdirection, and the element of surprise have always been major factors in warfare. Nothing has changed. Warriors have always had to adjust to new techniques and technologies.

      I agree with you that it is impossible to account for all possibilities. I'm sure that the first guy to be shot with a firearm was pretty surprised as his suit of armor was pierced by the bullet. The test of a warrior is how quickly you can adapt. Once you see your people fall with holes in the armor, you better be able to come up with a new strategy for protecting yourself. These types of games can help to tune those skills.

      These types of war games are a good way to assess preparedness, test your defenses, and learn from mistakes. You have to practice and constantly test yourself to become and stay good.

      Besides, whos says that you just have to sit around on the defensive. The rules didn't change, we just didn't realize that there was a war on before 9/11. You can also go after the attackers and make sure that they have little time to plan because they are doing everything they can just to stay alive.
  • Revealing cards? (Score:4, Informative)

    by IWannaBeAnAC ( 653701 ) on Thursday April 22, 2004 @12:00PM (#8939637)
    I would have to think that this would be a lot of fun! I would like to see what the NSA and friends could throw at my network, although one would think they wouldn't reveal all their cards...

    Actually, I don't think it will be much fun at all, simply because I don't think there is any chance either side will reveal any cards. No doubt there will be some already published exploits and/or configuration gaffes that will be used. But I doubt anything new will come out of this.

  • I would propose the army build a virtual sandbox in which to run applications safely - in the sandbox - external requests go through a mother-may-i query in which a real user - or a centralized database is queried as to the permissabiity of (deleting the file "some file x") etc. Once the application has run for a period of time under scrutiny - the repetitious requests can be quashed, and only new requests for external data raise flags - managing a list of valid external requests should be much more practic
  • Wait. It was only for military? Uh...Nope, wasn't me. Hold on a sec'. Someone's at the door. DD0002111873A627F87DDE13B{}}|{|{00000000[NO CARRIER]
  • by bfg9000 ( 726447 ) on Thursday April 22, 2004 @12:11PM (#8939742) Homepage Journal
    ... I personally find that Windows boxes are the hardest to crack, because every time I'm about to get in, the damn thing crashes and the victim reboots and I lose all my work. And then when I finally manage to get on the system, it crashes again, usually when I'm halfway done stealing his copy of Massive Zoomers and the Ladies Who Love 'Em 4. Arrrghghghghhhh!

    It's just not worth it, the patented Windows BlueScreen Security System[tm] is foolproof. I'll take the easier road and stick to hacking OpenBSD boxes.
  • "I would like to see what the NSA and friends could throw at my network" One could suppose the poster has skills in security, and is somewhat proud about it. yet ... "into any Windows box :)"
  • Here is how you win:

    NSA phone rings...

    NSA-Person: "hello?"

    Caller: "This is the deputy secretary for Condoleezza Rice. We are having a problem viewing the 'cyber war game' and are sending someone over right away."

    NSA-Person: "umm, that isn't possible sir..."

    Caller: "Listen son, This comes right from the top. Do you want to find yourself cleaning the latrines in the chinese resturaunt down the street?"

    NSA-Person: "well, umm, no but.."

    Caller: "No buts! We are sending our personal network specialist o

  • My money is on using social engineering techniques to determine everything possible before launching an attack.

    Even the attack itself would be more successful if it were tripped by an insider doing something stupid (clicking on an Outlook attachment with some local context softcore pr0n hint).

    Given the current software environment, it's the people that leak like sieves.

  • To win... (Score:1, Funny)

    by Anonymous Coward
    ... all the Army has to do is call in an airstrike on the NSA team: "All systems secure, SIR!!"

    A C-130 gunship will halt a DOS attack PDQ.
  • by Johnny Mnemonic ( 176043 ) <mdinsmore@gm a i l . com> on Thursday April 22, 2004 @12:26PM (#8939946) Homepage Journal
    Does anyone happen to know if social engineering is allowed, or is this just a technical attack?

    I would wager than any social engineering would a) be more likely to succeed, and b) be also more likely to occur in the real world. But it's less quantifiable too.
  • This is not new. (Score:5, Interesting)

    by BeProf ( 597697 ) on Thursday April 22, 2004 @12:27PM (#8939967)
    This has been going on each year for almost 10 years now. Each of the "official" military academies compete, and the best team wins the NSA Information Assurance Directorate Trophy. In the past Army, Navy, and Air Force have all done quite well, while Coast Guard has not.

    Contrary to popular belief, the NSA Red Team isn't allowed to use any of the NSA arsenal of dirty tricks. They are only allowed to use software that is freely available off the internet (NMAP, snort, etc.) running on commodity hardware. They can't do anything that violates Federal Law, (other than the intrusion attempts themselves), but social engineering is ok.

    Also, break-ins are not an automatic loss, per se. Nor is prevention of break-in an automatic win. The goal of the Red Team is DoS. For every minute a service remains down, the Red Team scores points. The cadet teams win points based on how quickly they detect and respond to the attacks. All judging is done by an NSA White Team.

    I'll see if I can find some more info and post it here.
  • Following this guy's example [slashdot.org], I am not going to use security on my network because the DOD does.
  • The thing that worries me about any government computer security activity is that many managers who will have the final say have no practical experience beyond MS Word and a bit of COBOL as a undergrad. I once worked in a SCIF where the regs spoke of "zeroing core memory". Magnetic media was not allowed out once inside yet we had an internet connection and dozens of Macs running System 7 file sharing.
  • by bingbong ( 115802 ) on Thursday April 22, 2004 @02:34PM (#8941514)


    This really isn't all that new. The U.S. Naval Postgraduate School [navy.mil] has been
    sending their Infosec students to play Capture the Flag [ghettohackers.net] at Defcon [defcon.org] for the last couple years as well as
    this year's Interz0ne [interz0ne.com] conference. In
    fact, there was only one team (Anomaly - and they won ironically) that didn't
    have government personnel or contractors on their team.





    Also, Immunix [immunix.com], a DARPA [darpa.mil] funded hardened Linux version [immunix.com] has also
    been put under fire during CTF for the last couple year. (Their team placed a
    solid second both times).





    The Feds have learned over the last couple years that they
    are behind the ball in terms of normal unclassified security training for their
    personnel. These conferences have been really good at given them some real
    world training that they normally don't get.





    It's nice to see my tax dollars being put to a good use for
    a change. Plus it makes the "Spot [defcon.org]
    the Fed" game MUCH easier.



"Don't drop acid, take it pass-fail!" -- Bryan Michael Wendt

Working...