20091112 IO Newsletter v10 no 02

advertisement
Information Operations
Newsletter
Compiled by: Mr. Jeff Harley
US Army Space and Missile Defense Command
Army Forces Strategic Command
G39, Information Operations and Cyberspace Division
The articles and information appearing herein are intended for educational and non-commercial purposes to promote discussion of research in
the public interest. The views, opinions, and/or findings and recommendations contained in this summary are those of the original authors and
should not be construed as an official position, policy, or decision of the United States Government, U.S. Department of the Army, or U.S.
Army Strategic Command.
Table of Contents
ARSTRAT IO Newsletter on OSS.net
Page 1
Table of Contents
Vol. 10, no. 02
1. Balancing Social Networking and Cybersecurity
2. Mi5 Hires Teenagers to Battle Cyber Terrorism
3. National Security Threats in Cyberspace
4. Army's Electronic Warfare Needs Receive Heightened Emphasis
5. Secret Teen Hacker Army Ridiculed
6. Air Force Activates New Cyberspace Defense Unit
7. Terrorists Nearing Ability to Launch Big Cyberattacks against U.S.
8. Cyberspace the Battleground "For Next World War"
9. Operation Phish Phry Nets 100 Suspects
10. Navy Moves to Meet Information Age Challenges
11. Army Explores New Paths to Secure Communications
ARSTRAT IO Newsletter on OSS.net
Page 2
Balancing Social Networking and Cybersecurity
By Michael Hoffman, Air Force Times, Sep 21,
Air Force Space Command tweets. The same command charged with protecting the Air Force’s
computer network has 3,855 followers on Twitter.
How to keep sensitive information safe and still reach out to the public is but one of the
complexities that Gen. Robert Kehler, head of Space Command, is trying to figure out.
This summer, Space Command activated the service’s newest numbered Air Force — 24th Air Force
— to take on the cyberspace domain. U.S. Cyber Command, a new unified effort ordered by
Defense Secretary Robert Gates, stands up Oct. 1.
Kehler talked to Air Force Times about these new units and everything else cyber — from Facebook
to training — Sept. 16 at the Air Force Association Air & Space Conference at National Harbor, Md.,
just outside Washington.
Q: How vulnerable is the Air Force to a cyber attack?
A: Some things are well-protected in cyberspace, but many things are not. When you get into the
places that it touches the public domain, many things are not protected. We are looking at
cyberspace these days as if it was a densely crowded urban area. Not everything is an attack with
a capital “A.” There are criminals in cyberspace. There are spies in cyberspace. There are
determined nation-states in cyberspace conducting their nation-state business. The difficulty here
is protecting yourself from all those problems you could encounter the same as if you tried to
physically protect a military base. ... So, our focus is not on protecting cyberspace as much as it is
assuring our missions. It isn’t about trying to defend every node on the network for us. It’s about
trying to make sure we can complete our missions in the face of attack. ... The 13-year-old down
the street can be just as damaging to you as the determined enemy that is trying to disrupt your
national security activities.
Q: What is the Air Force’s stance on allowing airmen on social networks such as Facebook and
Twitter?
A: The extreme answer to protecting yourself is disconnect. But wait, that’s like saying I have an
Air Force, but they can only fly when the weather is good or you can only fly in an uncontested
domain. Well, that is crazy, that isn’t why the Air Force exists. The Air Force exists to fly, fight and
win. So, my initial thinking here is that we have to come up with ways to exploit the power of these
networks while protecting the mission. Easy to say, difficult to do. …. I don’t know what that means
yet in terms of do we prohibit or ban.
Q: What has changed since the standup of 24th Air Force?
A: The No. 1 thing I have seen has been focus. ... I have seen us now focus on how we intend to
present our capabilities to the other joint war fighters. I have seen us focus on the details of how
we are supposed to train; what our tasks are going to be; how do we train to suit those tasks;
what our capabilities are; and what our future capabilities might have to be.
Q: What priorities and benchmarks do you have for 24th Air Force this year?
A: First, we need to get our arms around the Air Force network, understand it and do what we can
to ensure our missions on that network. The second thing we need to do is make sure we are the
best possible joint partners. U.S. Cyber Command is going to stand up and look at their
components, and I want us to be ready for Cyber Command to look at us and say, “we need you.”
Q: What do airmen working in the cyberspace mission actually do?
A: There is now a joint definition for cyberspace and cyberspace operations. We are using both of
those inside the Air Force. Cyberspace is the collection of things that comprise what the
Department of Defense would call the global information grid. Cyberspace operations, and this will
sound simplistic, are the activities you perform in this domain. ... To operate the network, to
Page 3
defend the network, to exploit information that is on the network and, if we are directed, to
conduct offensive operations. ... So, it is really those things that will comprise the activities that we
expect to see our folks performing in cyberspace. ... Initially, we really want to focus on defense
and protection. In addition to that, because of some of the capabilities that we have put in 24th Air
Force, we also say airmen are constructing access to cyberspace. Combat communications, for
example. If they go out and set up communications someplace, that is constructing entry into the
domain.
Q: How do you grow a cyberspace expert in the Air Force?
A: In cyberspace there is really going to be a combination of expertise. In the enlisted force, we
are still going to require enlisted members who are well-schooled in the technical details in what
we today call the communications disciplines. We need enlisted people who can fix radars, radios
and set up satellite communication links. In addition, though, there is another career path here.
Certainly, as we look for people to enter the enlisted ranks, there are going to be some specialists
here who are so important to us because of their academic backgrounds and their experience levels
that there will be some unique aspects of what we are going to have to train people to do. We
expect that the overall training and education process will follow the standard Air Force model. For
enlisted, there will be basic training followed by tech school. We think that cyber-related training
goes all the way back to basic training, not just tech school.
For officers, we see a very similar process to how we train pilots or space operators. ... Bring them
in for undergraduate training and then send them off to initial qualification training. There will
probably be multiple career pathways. ... There will be some that will be more focused on network
activities and network defense and some of the emerging skills. Some of those people will require
different educational backgrounds. We will, very likely, recruit.
Q: How does an entity as big as the Air Force keep up with the rapidly changing technology?
A: We have put some acquisition programs in place over the years for IT-related things. It allows
us to keep up and refresh with commercial off-the-shelf things. …. We are working, though,
through what is the best way for us to be able to have a dedicated group that goes out and keeps
up with acquisition and what level that should be. We are working with Materiel Command right
now. Do we allow the local units at that level to make some decisions with acquisition or do we
keep all of that at Materiel Command? Do we have a special group do this? We are trying to figure
out how to make this work. ... Buying computers, we have purchasing power for that. ... The real
question is software, how to defend software when it’s happening. That’s where we are going to
have to partner with industry and the Department of Defense and our other services and other
agencies. ... There will have to be oversight for this, and we know that.
Q How big can cyberspace grow in the Air Force? Is there a ceiling?
A: If every organization involved with cyberspace was a ping-pong ball, there is a lot of room in the
box for those ping-pong balls. The question then becomes: How big is our ping-pong ball? How big
does it get? The answer partially depends on what this new joint structure wants us to do. We, like
the rest of the services, want to bring unique capabilities. We don’t want to be duplicative of what
the other services are doing. Just like every service is in the air, we are all doing our own mission
set in the air. It is going to be the same thing in cyber.
Table of Contents
Mi5 Hires Teenagers to Battle Cyber Terrorism
By Gordon Thomas, Daily Express, 20 Sep
MI5 has hired 50 computer-savvy hackers – some of them still teenagers – to work in a newly
formed top secret Cyber Operations Command.
Each has signed the Official Secrets Act forbidding them to tell their parents or girlfriends what
they do in the windowless basement area in the Security Service building beside the Thames.
Page 4
MI5 head Jonathan Evans has told his staff that the recruits were essential to combat cyber
terrorism which has been traced to China, Russia and Pakistan.
The hackers have also intercepted messages from terrorists in Belmarsh maximum security prison.
Cyber Command works closely with the Pentagon.
In a report to Lord West, the Security Minister, Mr Evans has revealed that during the summer over
1,000 hits were made on computers in Whitehall. Other targets have been air traffic control, power
stations and the City of London.
Mr Evans sent a confidential memo to 300 banks and accounting firms warning they “are already
under cyber attack” from Chinese state organisations.
The majority of the teenagers are Asians. They are subjected to the same high level of background
security checks used to clear other intelligence staff.
Lord West called them “youngsters who use their talents to stop other hackers from closing down
this country”.
Table of Contents
National Security Threats in Cyberspace
The last few years have seen a remarkable surge in the degree of concern publicly expressed by
government officials regarding “national security threats” in cyberspace. The Bush Administration
began development of a Comprehensive National Cybersecurity Initiative (CNCI) in January 2008.1
The Obama Administration has followed with a Cyberspace Policy Review and a promise to appoint
a “Cyber Czar” to coordinate a federal government response.2 Funding for initiatives to protect the
cyber domain is likely to increase significantly.
The ferment of ideas is substantial, even by Washington “crisis” standards. Some question whether
a threat exists at all while others deem the threat existential. Novel issues of policy and law surface
on an almost daily basis as technological innovation runs headlong forward, leaving policy‐makers
and concerned legislators trailing in its wake.
As the United States continues the development of its cybersecurity policy, the time is ripe for
reflection and an examination of first principles. To that end the American Bar Association Standing
Committee on Law and National Security, the McCormick Foundation, and the National Strategy
Forum sponsored a two‐day workshop in Annapolis, Maryland on June 4‐5, 2009. The workshop
brought together more than two dozen experts with diverse backgrounds: physicists;
telecommunications executives; Silicon Valley entrepreneurs; Federal law enforcement, military,
homeland security, and intelligence officials; Congressional staffers; and civil liberties advocates.
For those two days they engaged in an open‐ended discussion of cyber policy as it relates to
national security. The discussion was under Chatham House Rules – their comments were for the
public record, but they were not for attribution.
The workshop report you are now reading is the result of that discussion.
National Security
Threats in Cyberspace Sep 2009.pdf
Table of Contents
Army's Electronic Warfare Needs Receive Heightened Emphasis
By Brandon Pollachek, PEO IEW&S Public Affairs, Army News, Sep 23, 2009
FORT MONMOUTH, N.J. (Sept. 22, 2009) -- As the U.S. Army approaches eight years of counterinsurgency operations in two theaters, Iraq and Afghanistan, the enemy use of the electromagnetic
spectrum against U.S. Soldiers has remained a persistent challenge.
Page 5
Protecting Soldiers from improvised explosive devices and providing them with an accurate and
complete understanding of their environment across the spectrum has brought about significant
change in focus for the Army in the area of Electronic Warfare.
Land component commanders and their staffs must now be more adept in their knowledge of how
the electromagnetic spectrum can both positively as well as negatively impact operations, officials
said. They said by tightly integrating EW as a form of non-kinetic fires with existing kinetic
capabilities, the Army can achieve spectrum dominance through an effects-based joint operations
plan.
The Program Executive Office Intelligence, Electronic Warfare & Sensors has stepped to the
forefront in supporting this new direction with a focus on operationalizing EW as an integrated
battlefield capability that will enhance situational awareness, improve force protection, enable
dominant maneuver, and aid in precision lethality.
To meet the emerging demand for the recently established EW vision, PEO IEW&S stood up the
Project Manager Electronic Warfare office Sept. 1 under Col. Rod Mentzer.
PM EW, formerly Project Director Signals Warfare, was established to give the developing areas of
EW a home for all of their integration needs.
"We're changing the name to highlight the core competencies of this project management office as
the Army transitions into an era of increased emphasis on capabilities associated with electronic
warfare," said Brig. Gen. Thomas Cole, program executive officer for IEW&S.
"We have a talented, experienced workforce and synergy of effort among IEW&S, RDECOM, and
CECOM here for doing this type of work. PM EW provides the Army a focal point for providing EW
capability to Soldiers," Cole said.
This change in direction coincides with recent actions within the Army to establish a formal home
for EW requirements.
"As
the
the
the
the Army began to get its fingers back into the fight and electronic warfare scenarios came to
forefront, the Army decided it needed to get back into the EW arena and stood up an office in
G3/5/7 shop," said Mentzer, referring to the establishment of the Electronic Warfare Division in
Pentagon.
In February, an EW military occupation series was created, the 29 series, that will eventually give
the Army the largest electronic-warfare manpower force of all the services. Nearly 1,600 EW
personnel, serving at every level of command, will be added to the Army over the next three years,
officials said.
The Army's EW personnel will not only be experts in fighting the threat of IEDs, but they will be
versed in a much more complex challenge of controlling the electromagnetic environment in land
warfare by tactical employment of the three major EW tenets: electronic attack, electronic
protection, and electronic warfare support -- to gain an advantage in support of tactical and
operational objectives across the full spectrum of operations.
PM EW is poised to supply these Soldiers with the tools they need to operate within the EW
spectrum, Mentzer said.
"PM Electronic Warfare will enable and support these adaptive, versatile and full- spectrum-capable
Electronic Warfare Soldiers with the highest technology possible," Mentzer said.
Product Managers CREW, Prophet and Information Warfare will remain under the EW charter as the
organization poises itself to take the prominent position in fielding and sustaining systems, which
will meet the Army's EW needs.
PM EW currently fields various versions of Counter RCIED Electronic Warfare Systems, Prophetenhanced systems and a multitude of classified systems. In fiscal year 2009, the organization
fielded more than 36,000 CREW devices as well as more than 30 Prophet systems.
Over the near term, Mentzer said he plans on working closely with the G3 as they define the
requirements and the direction the Army will take in the realm of EW.
Page 6
In summarizing the role EW will play in the Army in current conflicts, as well as in the future, Gen.
Raymond Odierno, Multi-National Force-Iraq commander said, "I think by having (EW specialists)
within every unit in Multi-National Corp-Iraq, in Afghanistan and any future operation, it will better
enable our forces to combat the threat that is inside the electronic warfare spectrum."
"This expertise and capacity will obviously help save the lives of our Soldiers and it will also help us
to move forward and understand the spectrum as we continue to develop our operation."
Table of Contents
Secret Teen Hacker Army Ridiculed
By John Leyden, The Register, 24 September 2009
The UK government's reported decision to employ ex-hackers to work at a newly-established Cyber
Security Operations Centre have met with derision from both a high-profile former hacker and an
acknowledged cybersecurity expert.
Lord West, the Home Office security minister, first suggested that former hackers (or "naughty
boys", as he described them) might play a key role in Britain's revamped cyberdefence strategy
back in June. At the time it seemed like just another in the admiral-turned-minister's growing list of
eccentric observations on various aspects of security policy.
For example, he later suggested that a net-flinging entanglement "bazooka" designed to stop
speedboats might be just the job for use on "topless lovelies". This was doubtless surprising to its
developers, who saw it as a weapon against USS Cole-style suicide attacks.
However, last weekend the Sunday Express reported that the MI5 had hired "50 computer-savvy
hackers – some of them still teenagers – to work in a newly formed top secret Cyber Operations
Command." The majority of the teens are Asians, the paper adds. All are subject to the same level
of background security checks used to clear the employment of other intelligence staff. The Sunday
Express helpfully adds that this means they have signed the Official Secrets Act and are forbidden
from "tell[ing] their parents or girlfriends what they do in the windowless basement area in the
Security Service building beside the Thames".
Lord West reportedly described the new hires as "youngsters who use their talents to stop other
hackers from closing down this country".
Mathew Bevan (AKA Kuji), a British hacker arrested and unsuccessfully prosecuted for hacking into
secure US government networks back in 1994, who later became a successful security consultant,
helped us pick apart the many implausibilities of the story.
"These hackers were described as having been 'naughty', but did not have any criminal records,"
Bevan told El Reg. "How on earth they came to the attention of GCHQ without getting caught (as
being caught would suggest that charges would be brought, and if not how come?)."
Bevan noted the lack of buzz about any attempt to recruit hackers by members of the security
service.
"I have not heard of any UK hacker/ex-hacker/naughty boy actually having been approached to
work at this level," he said. "The truth is that of course they couldn't find 50 UK hackers, because
those who are actively hacking are doing their best to not get caught. So they had to outsource to
India or China. This begs the question, how on earth did these people even manage to pass the
stringent security checks which are performed to work within government offices? Even the USA is
saying that due to the amount of hacking coming out of China, that employing Chinese to secure
America's Government machines is perhaps not a good idea."
The Welsh former-hacker turned successful hypnotherapist concludes that the whole MI5 hackerhire story is exaggerated, at best. He speculates that the motive for creating such an elaborate
yarn might be one of gaining bragging rights, a posture full of contradictions.
Page 7
"So this elite team of 'naughty boys', of course, it's not true," Bevan said. "The details have been
exaggerated at the least but most likely have been made up, just another attempt at psyops and a
way of us to look cool to the American administration, which has said it has hired hackers."
"We have to go bragging to the world that we have ex-hackers in our employment whilst at the
same time we are actively trying to extradite or prosecute others. This is sending out a conflicting
message as to whether hacking is wrong or a career choice. When it comes to team size, if you
have to claim that you have such a big and impressive one everyone knows that its probably very
tiny and disappointing," Bevan concludes.
Security consultant Rik Ferguson, someone who has actually worked with GCHQ, said that the idea
of idea of hiring reformed hackers to face off against state-sponsored cyberspies, tech-savvy
terrorists and cybercriminals from eastern Europe is woefully misguided.
"What really upsets me with this story is the implication that *only* young (former) criminals have
the skills required to carry out the work necessary to combat cyber terrorism," Ferguson writes. "I
have not personally met any of the team that have been hired for these posts at Cyber Operations
Command, but I have a feeling that they wouldn’t care too much for the implication either."
Ferguson repeats Bevan's point that the government is sending out mixed messages about the
legality of hacking, more influenced by Hollywood than reality, by suggesting it is both
reprehensibly criminal and simultaneously a useful national security skillset.
"It is entirely unacceptable that our security services and our government are broadcasting the
message that the only qualification necessary for a job in MI5 is being a hacker (one bad enough to
have got caught). People who have been found to have broken the law should not be allowed to
profit from their misdeeds, especially by way of an employment offer in the very field of their
criminal activities. Would you hire a convicted embezzler as a your accountant? How about a
teenage convicted embezzler?"
Ferguson's critique of "schoolboy tales of hiring 'naughty boys' for hi-tech derring-do" can be found
here.
Table of Contents
Air Force Activates New Cyberspace Defense Unit
Air Force combines space and cyberspace under single command
By Amber Corrin, Defense Systems, Oct 06, 2009
The Air Force has activated a new communications organization that will support the Air Force's
Space Command, a new command that combines space and cyber-space operations under one
organization. The new 689th Combat Communications Wing, headquartered at Robins Air Force
Base in Georgia, specializes in deployed communications.
The wing will play a support role in combat theaters where resources are sparse, such as
Afghanistan, and in humanitarian aid operations, according to the Air Force. The dedicated cyber
command, the 24th Air Force, reports to the Air Force Space Command. The Air Force created the
cyber command this year, and it became operational Aug. 18.
“As we activate the Combat Communications Wing, that fills in a critical niche,” Maj. Gen. Richard
Webber, commanding general of the 24th Air Force, said at a commemorative ceremony Oct. 5,
according to a report from local news service macon.com. Webber added that the “cyber warriors”
would have a “high rate of deployment,” the report said.
The 24th Air Force's integration under Space Command represents a landmark in Air Force
operations, combining space and cyberspace under a single organization. Like traditional Air Force
units, the 24th is set to provide forces for combat -- but unlike traditional units, these forces can
also conduct cyber warfare.
The CCW is the newest of three sub-organizations supporting the 24th Air Force; the other two are
the 688th Information Operations Wing and the 67th Network Warfare Wing.
Page 8
Commanded by Col. Theresa Giorlando, the CCW nationwide will comprise roughly 6,000 active
duty, reserve and National Guard airmen, as well as civilian and contractor support from the 3rd
and 5th Combat Communications Groups, ten Air National Guard Combat Communications units
and four Air Force Reserve Combat Communications squadrons.
“We are going to be the cornerstone for dominating cyberspace,” Giorlando said at the ceremony.
Table of Contents
Terrorists Nearing Ability to Launch Big Cyberattacks against U.S.
By Jill R. Aitoro, NextGov, 10/02/09
The biggest threat to U.S. computer networks is terrorist organizations that will purchase software
code from cybercriminals to penetrate sensitive systems, a possibility that could be just a few
years away, information security and former intelligence officials said on Friday.
Although enemy states often are blamed for cyberattacks against the United States, it is not
common because political and financial repercussions dissuade most countries from launching a
widespread effort, James Woolsey, a former CIA director, said during a panel discussion at the
International Spy Museum. The talk was part of the launch of a new gallery on cyber threats.
"We don't have the [degree] of strife [with] those that have these capabilities -- such as China and
Russia," that would cause them to attack the United States, Woolsey said. "The ultimate problem
we face is the possibility that we will have an enemy whose objective is total destruction."
Power plants are a prime target, he said, with the goal being to take down the electric grid. "Would
anyone want to do that?" Woolsy asked. "Yes. We saw their faces on 9/11."
Al Qaeda and other Islamic terrorist organizations are honest about what motivates them, he said.
"They believe God wants to destroy the U.S.," Woolsey added. "That's a different kind of enemy."
While most nation states have the capability to launch a widespread cyberattack, but choose not
to, terrorist organizations have not yet developed the necessary computer programming skills to do
significant damage, according to Mike McConnell, former director of National Intelligence. "When
terrorist groups have the sophistication, they'll use it," he said.
That could happen within the next few years as cybercriminals peddle through the black market the
software programs needed to launch a debilitating cyberattack, said James Lewis, director of the
technology and public policy program at the Center for Strategic and International Studies. "When
does stuff get good enough for al Qaeda to go buy it? That will happen in the next few years," he
said.
McConnell also noted the possibility that enemy nation states will use a terrorist organization as a
proxy, providing the technology but denying involvement.
Among the most effective strategies to combat cybercrime and terrorism is international
engagement to support global criminal investigation and legal action against those tied to
cyberwarfare activities, Lewis said. "We agreed to not sell nuclear weapons to terrorists and that's
worked out pretty well," he said. "Now we need agreement among nations to not supply terrorists
with these capabilities and to support better cybercrime laws" to pursue those that support attacks.
Table of Contents
Cyberspace the Battleground "For Next World War"
By Marc Chacksfield, Tech Radar, 7 October 2009
The telecommunications arm of the United Nations has been discussing the future of cybersecurity, asking nations to batten down their internet hatches and prepare for an online war.
Speaking at the ITU Telecom World 2009 conference, the boss of the UN International
Telecommunications Union (ITU) Hamadoun Touré explained: "The next world war could happen in
cyberspace and that would be a catastrophe.
Page 9
"We have to make sure that all countries understand that, in that war, there is no such thing as a
superpower."
Cyber-sheriff
Outlining the seriousness of a web war, Touré noted that the "loss of vital networks would quickly
cripple any nation, and none is immune to cyber attack."
One way that nations can prepare for cyber-attacks, explains Touré, is the most obvious one –
better online security. "The best way to win a war is to avoid it in the first place," he explained to
delegates at the conference.
It seems the message is getting through, as according to the Associated Foreign Press, US
Secretary for Homeland Security Janet Napolitano has ordered 1,000 cybersecurity bods to look
after America's online security.
Other nations bolstering their security for the web include South Korea, who are to begin training
3,000 'cyber-sheriffs'.
Cyber security has been highlighted this week after it was revealed that thousands of Hotmail
accounts had been hacked into. Google, Yahoo and AOL have also had their security compromised.
Table of Contents
Operation Phish Phry Nets 100 Suspects
By Tony Bradley, PC World, October 07, 2009
United States and Egyptian authorities began rounding up 100 suspects indicted in connection with
a two-year investigation dubbed "Operation Phish Phry."
Operation Phish Phry involved the United States Attorney's Office, FBI, Egyptian authorities and the
Electronic Crimes Task Force in Los Angeles. The 53 suspects in the United States are concentrated
in North Carolina, Las Vegas, and Los Angeles, with the majority being from LA. The FBI stated that
the number of individuals involved in the phishing scam make it the largest number of defendants
ever charged for the same cybercrime.
Phishing itself is a play on words. It is a cyber-attack that relies on social engineering to dupe users
into divulging sensitive information or downloading malicious software. It derives its name from the
use of bait, such as emails and web sites that appear to be from respected, legitimate sources, to
attract victims, similar to the way anglers rely on lures to reel in fish.
Typically, a phishing attack begins with an email that is designed to look like it is from a bank or
financial institution. The email generally contains a message directing the user to respond with
account information or username / password credentials, or provides a link which directs users to a
counterfeit web site designed to look like the authentic site for the financial institution in question.
The information provided by victims is collected by the attackers and later used to steal the victim's
identity or access the victim's accounts and remove funds.
The ring broken up by Operation Phish Phry originated with phishing attack emails from the
Egyptian suspects. Those phishing attacks collected account data and personal information which
was subsequently used to access the victim's accounts at Bank of America and Wells Fargo and
remove money.
The Egyptian hackers enlisted the aid of partners in the United States to assist with moving money
from the compromised accounts to launder the funds. There are three primary ringleaders in the
United States. The other 50 suspects are alleged moles or runners who set up fraudulent accounts
to deposit the stolen money and facilitates transferring funds to Egypt to pay the hackers their cut
of the spoils.
Page 10
The 100 suspects face a 51-count indictment accusing them of conspiracy to commit wire fraud and
bank fraud. The ringleaders face additional charges of aggravated identity theft, money laundering,
and unauthorized access to protected computers. All of the suspects face possible prison terms of
up to 20 years if convicted.
Table of Contents
Navy Moves to Meet Information Age Challenges
By Gerry Gilmore, posted on War on Terror News, 3 Oct 2009
10.02.2009 WASHINGTON - The Navy is merging its information technology, intelligence and
communications operations into one organization to better address Information Age challenges,
including threats to computer networks, the Navy's top officer said here Oct. 1.
"If we as a Navy are to remain dominant in this Information Age or Cyber Age, or whatever
moniker you choose to put on it, I think that we have to take advantage of the new opportunities
that exist, such as the vast stores of collected data -- information and intelligence that often lie at
rest, unrecoverable, unavailable and untapped," Navy Adm. Gary Roughead, chief of naval
operations, said during remarks at a Center for Strategic and International Studies-sponsored
event at the Washington Hilton Hotel.
Because the Navy must capitalize on its ability to access, filter, analyze and then disseminate
information to warfighting commanders for action in real time, Roughead said, it's consolidating its
intelligence directorate, communications networks and related information technology capabilities
to form a single new organization: the deputy chief of naval operations for information dominance.
The reorganization is slated for completion by year's end.
The Navy also is standing up Fleet Cyber Command, Roughead said, to be operated by the
reconstituted U.S. 10th Fleet. The 10th Fleet was involved in efforts to thwart enemy submarines
during World War II. The Air Force and Army also are standing up organizations that focus on
information operations and network security.
Fleet Cyber Command will be a subordinate unit to U.S. Cyber Command, the formation of which
was directed by Defense Secretary Robert M. Gates on June 23.
Cyberspace presents "a huge potential vulnerability for us because of our dependence on the
electronic world for communications – for everything we do," Gates said during a Sept. 16 speech
at the Air Force Association conference at the National Harbor in Maryland. It is important, Gates
said, for the Defense Department and the military services to integrate the different information
technology and communications elements "from exploitation to defense," to achieve unity of effort.
Today's Navy requires "uninhibited access to assured communication capabilities in cyberspace" to
operate, Roughead said. However, he added, ever-present online saboteurs with various allegiances
and intent make cyberspace a daily battlefield.
"We must be prepared to operate in cyberspace when it's denied, and then we must also be able to
deny space when it's required or when it's appropriate," Roughead said.
People are key in cyberspace, Roughead said, and that's why the Navy is moving its information
technology, intelligence, information warfare, oceanography and space cadre specialists into a new
Information Dominance Corps.
Now numbering about 44,000 officers, enlisted members and civilians, the corps is slated to add
1,000 trained technicians in the near future, Roughead said. Military members will retain their
current branches and skill ratings, he added.
The consolidation of information technology, communications, intelligence and other assets moves
away from the Navy's tradition of stove-piped organizations, Roughead said, which "have really
caused us to sub-optimize our ability to aggregate combat capability and the movement of
information in ways that can maximize the effectiveness of a fleet, of a unit or of an individual."
Page 11
Military officials have found that new technology has mitigated concerns that battlefield data
collected by unmanned aerial vehicles and other methods in overseas combat zones would be
overwhelming to commanders, Navy Vice Adm. David J. Dorsett, director of naval intelligence, told
reporters at the Hilton after Roughead's speech.
U.S. forces in Iraq and Afghanistan, Dorsett said, have successfully employed a series of tools that
"enabled operational commanders, down to the brigade and, in several cases, the battalion and
that type of level, to get large quantities of information."
Another aspect of this tool set, Dorsett continued, involves systems that can rapidly "fuse,
synthesize and make sense of this tremendous volume of data" by overlaying or sorting it
according to the category of intelligence, such as technical- or human-based.
"That overlaying then provides clarity and leads to operations against adversaries, insurgents,
terrorists," Dorsett said, noting the system has been "very, very successful" over the past few
years.
The Navy is working with other agencies to apply these proven information-technology tools in the
maritime security environment, Dorsett said.
"We are using the Navy's intelligence structure and the Navy's oceanographers, overlaying
information concerning how pirates operate – trends, activities, et cetera – with what the weather
looks like over a period of time," Dorsett said. That information, he added, is shared with U.S.
partners to determine where anti-pirate forces need to operate.
"And, what we've seen is fairly significant successes in putting forces in the right place -- really
over the last few weeks – to counter pirates in their attempts to hijack ships," Dorsett said.
Table of Contents
Army Explores New Paths to Secure Communications
By Barry Rosenberg, Defense Systems, Oct 01, 2009
Secure communications has arguably been the highest priority for military services since allied
code breakers deciphered the German Enigma encryption and decryption machine during World
War II. Security often comes in two flavors: what can be done now to improve existing networks
and what future network architectures should look like in the long term.
For the latter, the military services were depending on the Transformational Communications
Satellite (TSAT) to provide protected satellite communications. The Army, in particular, was
counting on TSAT to bring protected communications to the fourth increment of the Warfighter
Information Network-Tactical (WIN-T) on-the-move communications program. Earlier this year,
Defense Secretary Robert Gates canceled the TSAT program.
So what is the Army’s plan for protected communications in the 2015 time frame?
“The requirements document calls for Increment 4 to connect with high-bandwidth, protected
satellite transmissions — capabilities the TSAT program was meant to achieve,” WIN-T Project
Manager Col. Chuck Hoppe said. “Following the termination of the TSAT program, the Department
of Defense is re-examining the capabilities required and how best to meet those needs.”
“The Army is investigating how to bring protected, communications-on-the-move into a smallaperture, on-the-move antenna, needed for Increment 4. These investigations currently are looking
at what capabilities can be achieved with the Advanced Extremely High Frequency satellite
program.”
The AEHF program consists of three satellites in geosynchronous orbit, which are being designed to
replace the Milstar satellites. Lockheed Martin and Northrop Grumman are building the satellites,
which are expected to transmit data at about 8 megabits/sec, and each AEHF satellite is said to
have greater capacity than all six Milstar satellites combined. The companies plan to launch one
satellite in 2010, 2011 and 2012.
Page 12
Near-term goals
In the near term, the Army’s plan for the Global Network Enterprise Construct, which will bring
together the Army’s various networks in a single enterprise that connects to the larger Global
Information Grid, depends on secure communications.
“The GNEC concept can’t work without a safe, secure network,” said Maj. Gen. Susan Lawrence,
commanding general of the Army Network Enterprise Technology Command (Netcom) and 9th
Signal Command. “The mission demands it, the warfighter relies on it, and we have an obligation
to deliver it.
“We’ve developed a comprehensive strategy to ensure that the [Secure IP Router Network,
Unclassified but Sensitive IP Router Network] and all the elements of the enterprise network
provide that safe and secure operating environment. Our approach enhances our defensive
capabilities, improves the sustainment of programs, leverages our partnerships with industry, and
develops more effective rapid detection and response capabilities. We're partnering with the
military intelligence community to improve predictive intelligence as well. This strategy will allow us
to dominate and win the Army’s cybersecurity fight.”
Lawrence described the Army’s center of gravity in this fight as its security centers: the Army
Global Network Operations Security Center and Theater Network Operation Security Centers.
“The AGNOSC and TNOSCs are the network’s guardians,” she said. “They work on a daily basis to
detect, analyze and overcome the threat to theater and global network operations, helping our
forces to maintain information dominance. Additionally, the TNOSCs also provide network
operations and service-desk functions, while the AGNOSC serves as the Army’s operational arm
into the world of the Joint Task Force-Global Network Operations. Together, they represent the
Army’s key LandWarNet cyber defense capability.”
That emphasis on security helps to facilitate Netcom’s evolution from being a network and
communications manager to a cyber force.
“In a very real sense, we already are the Army’s cyber force,” Lawrence said. “The Army Global
Network Operations Security Center currently performs or supports around 92 percent of the
missions expected to go to the future Army Cyber Command. They and the TNOSCs perform critical
functions in the operations and defense of the network, enabling and preserving the commander’s
battle command capability, situational awareness and decision superiority.”
“While command and control warfare is the primary focus for cyber operations at the strategic
level, the center of gravity at the operational and tactical levels, as evidenced during Operation
Rampart Yankee, [a computer exercise], is operations and defense of the network — something we
are successfully doing today.”
The evolution continues
Army voice communications are on the threshold of a transformational change, said Steven
Schliesman, chief of the Technical Management Division and project manager of the Network
Service Center at the Program Executive Office for Electronic Information Systems, speaking at the
Army’s LandWarNet Conference 2009. That change involves the evolution of voice over IP to VOIP
for secure networks, which is known as VOSIP.
There are 50,000 users in the DOD VOSIP environment, but the vast majority are at the tactical
level in Iraq and Afghanistan. In the continental United States, the VOSIP disappears, leading to a
breakdown in secure voice communications between the continental United States and operational
theaters.
“Presently, the Army lacks an enterprise-level view for VOSIP that provides centralized
management and appropriate planning, implementation, operation, maintenance and funding that
is also aligned with the Global Network Enterprise Construct,” Schliesman said.
There are a number of additional challenges related to VOSIP, Schliesman said. “VOSIP deployment
is dependent on the availability of the [Secret IP Router Network] infrastructure, which in [the
United States] may not be as far along as it is elsewhere. In addition, VOSIP usage is expanding,
Page 13
and there is a desire to use a single desk phone that would accommodate connectivity to both
classified and wireless networks and would support secure and nonsecure communications.”
Arguably the greatest challenge is that there is no single, authoritative voice for VOIP in the Army.
Unlike the strong vision that has been expressed for data transmission over the network, there is
nothing like that for voice.
“Who is the proponent for voice, and how do we get our architecture solidified, like we’re doing in
the data world?” Schliesman said.
Black key over SIPRnet
Another important secure communications development is the capability to transmit the encrypted
key, sometimes known as the black key, via SIPRnet. Until now, an encrypted key has been a 128bit binary code stored on a CD, floppy disk or USB drive that was necessary to encrypt radio
transmission and scramble voice transmission.
Typically the key had to be physically taken from one place to another, which exposed the courier
to the danger of improvised explosive devices or hostile fire. That reality, combined with the Army’s
recent ban of thumb drives to prevent the spread of viruses and loss of important data, prompted
Army computer engineers to figure out a way to transmit the key electronically.
“We were able to use existing resources to develop a workaround given the ban on USB devices,”
said Ken Maloon, project lead for Encrypted Key Distribution (EKD) over SIPR for Product Director
Network Operations at Program Manager WIN-T.
The application used to download the encrypted key to a SIPRnet terminal is a Tier 3 Download
Utility. The utility runs on a SIPRnet terminal at a higher echelon brigade or above, where the key
is transmitted and then downloaded at the receiving terminal. The utility doesn’t generate any
data. It is basically a pop-up box, similar to one used to attach a file to an e-mail message, and it
is a mechanism to get the data from the higher-end SIPRnet terminal at brigade level down to a
lower SIPRnet terminal at the company level.
Because of the urgent need for the black key, the program can acquire a certificate of
networthiness from Netcom for use of EKD over SIPRnet in two weeks, instead of the 90 days that
the process usually takes, Maloon said.
Table of Contents
Page 14
Download