News


Pentagon giving cyberwarfare high priority


Stephen Green Copley News Service
December 21, 1999, Tuesday


   Two years ago, the Pentagon gave a team of computer whizzes from the National Security Agency (NSA) a challenge certain to appeal to any self-respecting hacker.

In an exercise code-named ''Eligible Receiver,'' the techies played the role of North Koreans attempting to break into U.S. military computer networks.

The invasions ''were wildly successful,'' said Michael Swetman, a cyberwarfare expert and president of the Potomac Institute for Policy Studies, a military think tank.

In fact, the hackers' success changed the Pentagon's thinking about cyberwarfare. Not only has it bolstered the defense of its own networks, it has honed plans for cyber attacks against potential enemies. Outside experts believe the Pentagon has developed its own arsenal of computer viruses.

And now there are discussions about the need for cyber arms control, along the lines of agreements governing nuclear, chemical and biological weapons.

The intensification of military cyber activities underscores the reality of new millennium warfare: How well the Pentagon can protect its computer systems from attacks may determine what happens on the on the battlefield.

Compelled by that realization as well as the results of Eligible Receiver, the Pentagon has consolidated its cyberwarfare defenses, which previously had been left up to each service.

''We had little capability to detect or assess cyber attacks,'' acknowledged Deputy Secretary of Defense John J. Hamre.

Now, in a secure building near the Pentagon, the Joint Task Force for Computer Network Defense operates a command center around the clock.

Three large overhead screens display computer links of U.S. forces in Europe, the Pacific and the United States, ready to signal an intrusion. The task force was created in June and in October placed under U.S. Space Command at Peterson Air Force Base in Colorado, which has been given responsibility for overseeing all cyberwarfare activities.

''We're concerned because information technology is the key factor that will allow us to do more with less in the 21st century and the technical systems we want to use are susceptible to people who want to do us harm,'' said Air Force Maj. Gen. John H. Campbell, commander of the joint task force.

''It's cheap and easy to put together a credible (attack) capability either in-house, or for hire,'' added the former fighter pilot who has changed his bedroom reading from Tom Clancy novels to computer books.

Cyber weapons have self-descriptive names like logic bombs, Trojan horses, worms, viruses and ''denials of service.''

With such an arsenal, ''even marginal foes can take on a superpower that no longer can be challenged with conventional weapons,'' said former Sen. Sam Nunn, R-Ga., chairman of the Center for Strategic and International Studies.

So far, the military has installed intrusion-detection devises at the entry point of key computer systems, expanded intrusion response-and-repair teams and attempted to improve its ability to analyze intrusion data.

But even though the Pentagon now spends about a billion dollars a year defending against cyber invasions, the vulnerability of its computer systems is underscored by the ease with which invaders still succeed.

An estimated 80 to 100 intrusions occur daily most believed to be harmless. Some 10 percent are investigated. Intruders suspected of serious criminal intent are investigated by the FBI.

No state-sponsored intrusions have been detected, according to Campbell.

The most serious breach, known as ''Moonlight Maze,'' was an intensive series of attacks earlier this year on computers operated by the Pentagon, Energy Department, NASA, defense contractors and several universities.

Intruders downloaded extensive non-classified but sensitive information to Russia, the FBI found, but the agency still is uncertain who was responsible and the investigation continues.

So far, none of the breached military computers have contained classified material, although such sensitive information as troop movements can be obtained from non-classified systems.

A major reason classified computers remain secure is that they are not accessible by outside telephone lines. The downside to this is that commanders in the field cannot easily access classified information that could help them fulfill their missions, said Swetman, who also serves as a cyberwarfare consultant to congressional committees.

While Pentagon officials have talked publicly about efforts to defend against cyber attacks, they say little about the U.S. military's efforts to develop its own offensive capability.

But Campbell stated the military has spent more on cyberwarfare offense than defense. It is believed the military has developed its own computer viruses and other cyber weapons.

Army Gen. Henry H. Shelton, chairman of the Joint Chiefs of Staff, has acknowledged the use of cyberwarfare in the Kosovo campaign but provided no details. There have been unconfirmed reports that U.S. military hackers aboard electronic warfare aircraft invaded computers coordinating Serb air defenses.

John Pike, military expert at the Federation of American Scientists, said one reason little information has been provided about offensive cyberwarfare is the involvement of the super-secret NSA, the agency responsible for the nation's electronic intelligence.

Experts say the United States leads the way in cyberwarfare. Nations trying to catch up include Russia, China, Israel, India, France and England.

Civilian facilities, such as banking and power grid computers, are especially susceptible to cyberwarfare, but civilian targets are supposed to be off limits to military attacks, under international agreements.

John Arquilla, a cyberwarfare expert at the U.S. Navy Post Graduate School in Monterey, Calif., said the potential for cyber weapons to disrupt the civilian infrastructure shows the need for international controls on cyberwarfare.

It's in America's interest to pursue cyber arms control, he said, because ''we are such a broad and rich target.''

The Pentagon's latest cyberwarfare game took place in October with ''Zenith Star,'' an exercise to determine if defenses have improved since Eligible Receiver.

''We've made some progress,'' said Campbell.

But, acknowledged Air Force Maj. Gen. Thomas B. Goslin, space command's director of operations, ''We still have a long way to go.''

Copyright© Copley News Service All rights reserved.