http://www.slate.com/articles/technology/future_tense/2016/03/inside_the_nsa_s_shockingly_successful_simulated_hack_of_the_u_s_military.single.html
The NSA’s disturbingly successful hack of the American military.
By Fred Kaplan
During its most sensitive drills, the Red Team worked out of a chamber called the Pit, which was so secret that few people at NSA knew it existed.
Excerpted from Dark Territory: The Secret History of Cyber War by Fred Kaplan. Out now from Simon & Schuster. On Wednesday, March 9, Kaplan will discuss his book in New York; for more information and to RSVP, visit the New America website.
On June 9, 1997, 25 officials of the National Security Agency—members of a security squad known as the “Red Team”—hacked into the computer networks of the Department of Defense, using only commercially available equipment and software. It was the first high-level exercise testing whether the U.S. military’s leaders, facilities, and global combatant commands were prepared for a cyber attack. And the outcome was alarming.
The simulated hack was the brainchild of the NSA director, Lt. Gen. Kenneth Minihan, who, before coming to the agency, had been commander of the Air Force Information Warfare Center in San Antonio, Texas. The center’s tech crews had been detecting frequent hackings of U.S. military computer networks, and had come up with ways to counter them—but few senior officers took notice or cared.
Each year, the Pentagon’s Joint Staff held an exercise called Eligible Receiver—a simulation or war game designed to highlight some threat or opportunity on the horizon. Minihan wanted the next exercise to test the vulnerability of the U.S. military’s networks to a cyber attack. The most dramatic way to do this, he proposed, was to launch a realattack on those networks. He’d heard about small-scale exercises of this sort, against battalions or air wings of the Army or Air Force. In these war games, he’d been told, the hackers always succeeded. The NSA Red Team was part of the Information Assurance Directorate, the defensive side of the agency, stationed in FANEX, a drab brick building out near Friendship Airport, a 20-minute drive from NSA headquarters at Fort Meade, Maryland. During its most sensitive drills, the Red Team worked out of a chamber called the Pit, which was so secret that few people at NSA knew it existed, and even they couldn’t enter without first passing through two combination-locked doors. In its workaday duties, the Red Team probed for vulnerabilities in new hardware or software that had been designed for the Defense Department, sometimes for the NSA itself. These systems had to clear a high bar to be deemed secure enough for government purchase and installation. The Red Team’s job was to test that bar.
It took Minihan a year of jumping through the Pentagon bureaucracy’s hoops to get permission to hold the exercise. In particular, the general counsel needed convincing that it was legal to hack into military computers, even as part of an exercise to test their security. NSA lawyers pointed to a document called National Security Directive 42, signed by President George H. W. Bush in 1990, which expressly allowed such tests, as long as the secretary of defense gave written consent. Secretary William Perry signed the agreement form.
The lawyers placed just one restriction on the exercise: The NSA hackers couldn’t attack American networks with any of their top secret gear; they could use only commercially available equipment and software.
On Feb. 16, 1997, Gen. John Shalikashvili, the chairman of the Joint Chiefs of Staff, issued Instruction 3510.01, “No-Notice Interoperability Exercise Program,” authorizing and describing the scenario for Eligible Receiver.
The game laid out a three-phase scenario. In the first, North Korean and Iranian hackers (played by the NSA Red Team) would launch a coordinated attack on the critical infrastructures, especially the power grids and 911 emergency communication lines, of eight American cities—Los Angeles, Chicago, Detroit, Norfolk, St. Louis, Colorado Springs, Tampa, Fayetteville—and the island of Oahu, in Hawaii. (This phase was played as a tabletop game, premised on recent analyses of how easy it might be to disrupt the grid and overload the 911 lines.) The purpose of the attack, in the game’s scenario, was to pressure American political leaders into lifting sanctions that they’d recently imposed on the two countries.
In the second part of the game, the hackers would launch a massive attack on the military’s telephone, fax, and computer networks—first in U.S. Pacific Command, then in the Pentagon and other Defense Department facilities. The stated purpose was to disrupt America’s command-control systems, to make it much harder for the generals to see what was going on and for the president to respond to threats with force. This phase would not be a simulation; the NSA Red Team would actually penetrate the networks.
For the 3½ months between the JCS chairman’s authorization and the actual start of the game, the NSA Red Team prepared the attack, scoping the military’s networks and protocols, figuring out which computers to hack, and how, for maximum effect.
The game, its preparation and playing, was carried out in total secrecy. Gen. Shalikashvili had ordered a “no-notice exercise,” meaning that no one but those executing and monitoring the assault could know that an exercise was happening. Even inside the NSA, only the most senior officials, the Red Team itself, and the agency’s lawyer—who had to approve every step the team was taking, then brief the Pentagon’s general counsel and the attorney general—were let in on the secret.
At one point during the exercise, Richard Marshall, the NSA counsel, was told by an agency higher-up that he was under investigation for espionage; someone on the security staff had noticed him coming in at odd hours and using the encrypted cellphone more than usual.
“You know why I’m here, right?” Marshall asked, a bit alarmed.
“Yes, of course,” the official replied, assuring Marshall that he’d briefed one security officer on what was happening. Even that officer was instructed not to tell his colleagues, but instead to continue going through the motions of an investigation until the game was over.
Eligible Receiver 97 formally got under way on Monday, June 9. Two weeks had been set aside for the exercise to unfold, with provisions for a two-week extension if necessary. But the game was over—the entire defense establishment’s network was penetrated—in four days. The National Military Command Center—the facility that would transmit orders from the president of the United States in wartime—was hacked on the game’s first day. And most of the officers manning those servers didn’t even know they’d been hacked.
The task turned out to be appallingly easy. Many defense computers, it turned out, weren’t protected by passwords. Others were protected by the lamest passwords, like “password” or “ABCDE” or “12345.” In some cases, the Red Team snipped all of an office’s links except for a fax line, then flooded that line with call after call after call, shutting it down. In a few instances, NSA attachés—one inside the Pentagon, the other at a Pacific Command facility in Hawaii—went dumpster diving, riffling through trash cans and dumpsters, looking for passwords. This trick, too, bore fruit.
The team had the hardest time hacking into the server of the J-2, the Joint Staff’s intelligence directorate. Finally, one of the team members simply called the J-2’s office and said that he was with the Pentagon’s IT department, that there were some technical problems, and that he needed to reset all the passwords. The person answering the phone gave him the existing password without hesitating. The Red Team broke in.
In most of the systems they penetrated, the Red Team players simply left a marker—the digital equivalent of “Kilroy was here.” In some cases, though, they did much more: they intercepted and altered communications, sent false emails, deleted files, and reformatted hard drives. High-ranking officers who didn’t know about the exercise found phone lines dead, messages sent but never received (or sent, but saying something completely different upon arrival), whole systems shut down or spitting out nonsense data. One officer who was subjected to this barrage sent his commander an email (which the Red Team intercepted), saying, “I don’t trust my command-control.”
This was the ultimate goal of what was called “information warfare” and would later be called “cyber warfare.” Eligible Receiver revealed that it was more feasible than anyone in the world of conventional combat had imagined.
There was one other surprise about Eligible Receiver, an incident that was revealed to just a handful of officials. When the Red Team members were hacking into the military’s networks, they came across some strangers—traceable to French Internet addresses—hacking into the network for real. In other words, foreign spies were already penetrating vital and vulnerable networks; the threat wasn’t hypothetical.
A few weeks after it was over, an Air Force brigadier general named John “Soup” Campbell put together a postmortem briefing on the exercise.
Campbell’s message was stark: Eligible Receiver revealed that the Defense Department was completely unprepared and defenseless for a cyber attack. The NSA Red Team had penetrated its entire network. Only a few officers had grasped that an attack was going on, and they didn’t know what to do about it; no guidelines had ever been issued, no chain of command drawn up. Only one person in the entire Department of Defense, a technical officer in a Marine unit in the Pacific, responded to the attack in an effective manner: seeing that something odd was happening with the computer server, he pulled it offline at his own initiative.
After Campbell’s briefing, the chief of the NSA Red Team, a Navy captain named Michael Sare, made a presentation, and, in case anyone doubted Campbell’s claims, he brought along records of the intrusion—photos of password lists retrieved from dumpsters, tape recordings of phone calls in which officers blithely recited their passwords to strangers, and much more. (In the original draft of his brief, Sare noted that the team had also cracked the JCS chairman’s password. Minihan, who read the draft in advance, told Sare to scratch that line. “No need to piss off a four-star,” he explained.)
Top Comment
A few years ago I bought a property that had been wired for ADT security. More...
Everyone in the room was stunned, not least John Hamre, who had been sworn in as deputy secretary of defense at the end of July. Before then, Hamre had been the Pentagon’s comptroller, where he’d gone on a warpath to slash the military budget, especially the part secretly earmarked for the NSA. Through the 1980s, as a staffer for the Congressional Budget Office and the Senate Armed Services Committee, Hamre had grown to distrust the NSA: It was a dodgy outfit, way too covert, floating in the gray area between “military” and “intelligence” and evading the strictures on both. Hamre didn’t know anything about information warfare, and he didn’t care.
A few weeks before Eligible Receiver, as Hamre prepared for his promotion, Minihan had briefed him on the threats and opportunities of information warfare and on the need for a larger budget to exploit them. Hamre, numbed by the technical detail, had sighed and said, “Ken, you’re giving me a headache.”
But now, listening to Campbell and Sare run down the results of Eligible Receiver, Hamre underwent a conversion, seized with a sense of urgency. Looking around the room of generals and colonels, he asked who was in charge of fixing this problem.
They all looked back at him. No one knew the answer. No one was in charge.
A Celebration of The Birdcage
The Case for Best Picture: The Martian
The Case for Best Picture: Spotlight
The Case for Best Picture: Room
The Case for Best Picture: Bridge of Spies
The Case for Best Picture: Brooklyn
The Case for Best Picture: The Big Short
The Case for Best Picture: The Revenant
The Case for Best Picture: Mad Max
Is Channing Tatum Really Our Gene Kelly?
C3PO is the Real Hero
An Open Letter to the Producers of the Battlestar Galactica Movie
The Evolution of the Mirror Routine
6 Things the Goonies Sequel Has to Have
Peeping Tom
Good Morning Vietnam
Recurring Features in Scorsese Films
The State of Gay TV
The Simpsons vs. The History of TV Cropping
The Hollywood Guide to Hacking
Tig Notaro on Performing Topless
The Case for Best Picture: The Big Short
The World, the Flesh and the Devil
Improv On the Set of People, Places, Things
Breaking Down the Six Interstellar Viewing Experiences
Sex and Love in Orange is the New Black
Working With Dogs On the Set of White God
Slacker Noir
The Upcoming Deepwater Horizon Film
Ad-Libbing the Last Scene
Tig Notaro on Being the Luckiest Unlucky Person in the World
I Am Michael
The Overnight
The Influence of Roger Ebert
Gordon Gekko
Richard Linklater Talks Directing and Film
Sleepy Hollow vs. Gotham
A Brief History of Godzilla
Gay Subtext in Franklin & Bash
Motherhood in Boyhood
You Just Won an Oscar. Now What?
In Memoriam: Movie Characters We Lost in 2014
Star Wars: Attack of the Quotes
Star Wars Sound Design
The Process of Making "Going Clear"
Shamiek Moore On His Musical Influences
Interview with Dope's Shameik Moore
Shameik Moore: Dichotomy
Dope: Shameik Moore
Disney and Broadway
Why Taraji Deserves the Emmy
The Eternal Appeal of "Bye Felicia"
Breaking Down All the New Avengers Characters
House Slate Episode Seven
House Slate: One Real God
House Slate: Jon Snow’s Parentage
Infinity Stones
The Avengers Rape Joke
House Slate: The 8,000 Year Battle With the White Walkers
Don's Carousel Pitch Reimagined
House Slate: Save Sansa Stark
Screening Room: Tracking Monologues
House Slate: The Very Bad Mistakes Made Edition
The Use of "Bitch" In OITNB
The First Magic Mike Was A Tease
House Slate: Your Questions Answered
Inside Out Emotions in Other Films
Why Clueless Is the Perfect Literary Teen Movie
The Terrence Howard Warble
House Slate: Who Is Azor Ahai?
House Slate: Season Finale
The Slate Cam Newton Guide
Luckiest Unlucky Person in the World
The Spike Lee List
How 'Animals' Gets Made
Television at Sundance
Excerpted from Dark Territory: The Secret History of Cyber War by Fred Kaplan. Out now from Simon & Schuster.
This excerpt is part of the cyberwar installment of Futurography, a series in which Future Tense introduces readers to the technologies that will define tomorrow. Each month from January through June 2016, we’ll choose a new technology and break it down. Read more from Futurography on cyberwar:
Future Tense is a collaboration among Arizona State University, New America, and Slate. To get the latest from Futurography in your inbox, sign up for the weekly Future Tense newsletter.
No comments:
Post a Comment