Thanks to William Knowles <erehwon@dis.org> for this info.


Source: Defense Electronics & Electronics report
Edition: February 13, 1998
Page: 1
Title: Pentagon Looks For Answers To Massive Computer Attack
Author: Richard Lardner and Pamela Hess
DOD Confirmation: Col Richard Bridges, Pentagon

As the United States flexes its military muscle in the Persian gulf 
region, Defense Department officials in Washington are scrambling to 
assess the full impact of a widespread and potentially harmful attack 
on a variety of DOD computers, Defense Information and Electronics
Report has learned.

The electronic intrusions, which were detected early last week, serve 
as a stark reminder that despite its warfighting prowess the nation 
remains highly vulnerable to assaults on its ever-growing information
infrastructure. Although the Pentagon says it is investing heavily in 
information security systems, its increasing reliance on electronic
storage and transmission of information is an Achilles' heel. At press 
time, DOD was still assessing what information may have been
lost or compromised, and was also trying to determine the motivation 
for the attacks. Defense sources say 11 DOD sites have been attacked 
-- seven of the locations are operated by the Air Force and four by 
the Navy. So far, investigators believe only systems used for processing 
unclassified information were targeted.  These types of computers are 
used to transmit logistics data as well as pay and personnel information 
-- especially  crucial as DOD mobilizes troops in the Persian Gulf.
A task force in the Joint Staff's operations directorate is looking 
into the intrusions, and sources say the incidents are being taken very 
seriously. While the identity of the attacker or attackers is not yet
known, the current situation with Iraq has investigators eyeing
countries or groups that may have financial or political ties to 
Saddam Hussein.

Sources tell DI&ER that information security experts at the National
Security Agency believe the "language" used in the attacks suggests 
Dutch hackers could be responsible. Allegedly, a group of Dutch hackers 
stole US military secrets during the Persian Gulf war and offered them 
to Iraq.  DI&ER has also learned that US defense officials believe a 
computer system in the United Arab Emirates served as a "waypoint" to 
one of the Navy computers that was attacked. DOD does not believe the 
UAE was responsible for the attack, however.

Publicly, the Defense Department is saying little about the attacks. 
DOD spokesman Col. Richard Bridges told DI&ER only that the Department 
"has detected an increase in the level of activity against selected
DOD computer systems." DOD, he added, is taking Steps to counter that 
activity and protect its information network.  A spokeswoman at the 
Embassy of the Netherlands said she has heard "nothing" about the recent 
outbreak of electronic attacks, nor did she know anything about claims 
that Dutch hackers had attempted to sell purloined US secrets to Iraq 
seven years ago." I would be interested to find out." She said.

The seven Air Force sites hit are Andrews AF Base in Maryland, Columbus 
AF Base in Mississippi, Lackland and Kelly AF Bases in Texas. Gunter
Annex in Alabama, Kirtland AF Base in New Mexico, and Port Hueneme 
Air National Guard weather facility in California. Ironically, the 
attacks at Andrews, Kirtland and Columbus occurred between Feb 3 and 
Feb 5, the first few days of a month-long Air Force campaign aimed 
at improving computer security awareness.  The four Navy sites are 
Pearl Harbor, the Naval Academy, and two systems in Okinawa, where 
the Marine Corps has a substantial presence.  Apparently, most of 
the attacks were concentrated on domain name servers, which translate
common website names like http://www.defenselink.mil into a numeric 
address that a network can understand. It is possible, sources say, 
that passwords to sensitive DOD networks were compromised.  DOD
investigators, however, continue to accumulate new details and are 
not yet sure exactly what has been jeopardized.

The Defense Department's investigation, which involves the Joint Staff,
the Defense Intelligence Agency, the Air Force Office of Special
Investigations and the Naval Criminal Investigative Service, is likely 
to prove more frustrating than fruitful. Sophisticated hackers tend to
"loop" through a variety of other systems before hitting their target, 
so it extremely difficult to know where the attack originated.  On top 
of that, there are myriad legal and political roadblocks that preclude 
tracing a hacker's steps.  "If the attacker is good, it's probably 
impossible to catch him," says Bruce Schneier of Counterpane Systems, 
a Minneapolis-based computer-security and cryptography consulting firm. 
On the other hand, even if the hacker is amateurish he may be operating
from a country with no computer crime laws, leaving the victim with 
little recourse.

It is uncertain just how often military computer systems are attacked
because DOD, like most public and private organizations, does not want 
to announce such events. For starters, it trumpets the fact military 
systems are vulnerable. But going public also lets the electronic 
attackers know they have been discovered and that they are probably 
being pursued. As a result, potential counter-measures intended to 
snare the culprits may not work.  Further, publicity discussing
information attacks opens DOD to claims that it is not doing enough 
to protect its information systems.  A recent Pentagon report to 
Congress notes that DOD will spend roughly $3.6 billion between 
fiscal years 1999 and 2002 on "information assurance" activities 
(DI&ER, Jan 23, p3). At the same time, however, the report 
acknowledges "additional investments" for information security are
required.  Senior defense officials clearly recognize the infosec
problem.  Deputy Defense Secretary John Hamre acknowledged in a 
recent Memo that DOD "has undertaken several exercises that have
confirmed our vulnerability to computer attack in the future" 
(DI&ER, Jan 30, p1). Those information warfare exercises, known as 
Project Eligible Receiver, showed prospective intruders could have 
great Success in gaining unauthorized access to the military's 
unclassified computer systems. DI&ER reported the results of 
the classified exercise last summer.

At an Armed Forces Communications and Electronics Association 
conference this week, acting Assistant Secretary of Defense for 
Command, Control, Communications and Intelligence Tony Valletta  
said DOD may be overreacting to normal hacker activity.  Part of DOD's 
problem is that it is not necessarily the master of its own domain. 
The military's iinformation infrastructure is interlocked with the 
civilian information infrastructure.  This can have have serious
implications, especially on the battlefield where a commander might 
find he no longer controls communications availability and
integrity.  Further, DOD plans to increase its use of commercial
encryption products. But these off-the-shelf products must generally 
conform with federal cryptographic standards and fit within DOD's 
overall infosec architecture.  While the Defense Department takes 
steps to assess this recent electronic broadside, the White House
continues to examine a series of recommendations for guarding against 
cyberattacks that were prepared by the President's Commission on 
Critical Infrastructure protection. Implementation of those
recommendations, coupled with a more aggressive DOD infosec
strategy should improve the military's ability to guard its 
information systems. But experts note that total protection, 
especially for unclassified systems, is virtually impossible.  
"The issue is how much security do you want," says Anthony Hearn, 
a senior information scientist at Rand Corp. "If you never turn your
computer system on, you're safe. But you have to connect with the 
outside world, and when you do, there are risks."
|| back to ntk ||