OSDN : SourceForgeShop ThinkGeekfreshmeatNewslettersTechJobsSlashdot Broadband Search »   X 
Welcome to Slashdot Linux The Internet Censorship Microsoft Science
 Login
 Why Login?
 Why Subscribe?

 Sections
 Main
 Apache
 Apple
  1 more
 Askslashdot
  1 more
 Books
 BSD
 Developers
  2 more
 Games
  9 more
 Interviews
 Science
 YRO
 
 Help
 FAQ
 Bugs

 Stories
 Old Stories
 Old Polls
 Topics
 Hall of Fame
 Submit Story

 About
 Supporters
 Code
 Awards

 Services
 Broadband
 Online Books
 PriceGrabber
 Product News
 Tech Jobs

 
DOD Kicks Up Cybersecurity Efforts
United States
Technology/IT
Security
News
Posted by michael on Thursday April 22, @11:35AM
from the wargames dept.
codingOgre writes "The US Army will try to secure an entire computer network against a team led by the NSA. They are cadets at West Point competing against military academies and other schools in a four-day Cyber Defense Exercise this week. I would have to think that this would be a lot of fun! I would like to see what the NSA and friends could throw at my network, although one would think they wouldn't reveal all their cards...like the backdoor into any Windows box :)" In a related story, jkinney3 writes: "The feds are wising up to the needs for a verifiable, secure code base for all of the DOD stuff, according to Government Computing News. A proposed solution 'would create a single executive organization responsible for software integrity and information assurance.' Joe Jarzombek, deputy director for software assurance in DOD’s Information Assurance Directorate, said 'DOD possesses so many millions of lines of code in countless thousands of packages, that it would take years of effort and millions of dollars just to identify what was developed where.' I'm envisioning a lot of Bugzilla installations."

 

 
Slashdot Login
Nickname:

Password:

Public Terminal

[ Create a new account ]

Related Links
· secure an entire computer network
· Government Computing News
· Bugzilla
· More United States stories
· Also by michael
 
BayStar Interviewed Regarding SCO Investment | UK Releases Global Warming Report  >  
DOD Kicks Up Cybersecurity Efforts | Log in/Create an Account | Top | 178 comments (Spill at 50!) | Index Only | Search Discussion
Threshold:
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • I feel safer already. by Anonymous Coward (Score:3) Thursday April 22, @11:37AM
    The US Army's Secret Plan? (Score:5, Funny)
    by Anonymous Coward on Thursday April 22, @11:37AM (#8939349)
    They'll be unplugging the network. NSA probably has a work-around, though.
    [ Reply to This ]
    Just remember... (Score:5, Funny)
    by abh (22332) <aaron@hockley.org> on Thursday April 22, @11:38AM (#8939362)
    (http://www.hockley.org/)
    Username is joshua, and you don't need to enter a password.
    [ Reply to This ]
    Easy... (Score:5, Funny)
    by JimDabell (42870) on Thursday April 22, @11:38AM (#8939373)
    (http://www.jimdabell.com/)

    Nowhere in the article does it say that the computers have to be on.

    [ Reply to This ]
  • Where's the challenge? by Anonymous Coward (Score:2) Thursday April 22, @11:38AM
    hacker wargames (Score:4, Interesting)
    by quelrods (521005) * <quelrod.yahoo@com> on Thursday April 22, @11:39AM (#8939381)
    (http://www.quelrod.net/)
    It sounds like a CTF match, except via the government. I somehow doubt they'd publish packet dumps and such of the event, but that'd be even more interesting. Kudos to the nsa/dod for trying to ensure some of our vital infrastructure is secured from attack.
    [ Reply to This ]
    National Security (Score:4, Funny)
    by mfh (56) on Thursday April 22, @11:39AM (#8939386)
    (http://zenbuzz.org/ | Last Journal: http://slashdot.org/~mfh/journal/)
    While we would like to thank you for participating in our security test, we can not further report on this event due to National Security, and we humbly request that all key loggers, camera phones and recording devices remain in the safe hands of our NSA coat-check-girls (for fine tuning).
    [ Reply to This ]
    • Bugzilla? by tcopeland (Score:1) Thursday April 22, @11:40AM
      • Sounds good to me by shadowkoder (Score:3) Thursday April 22, @11:40AM
        Uh oh... (Score:4, Funny)
        by adun (127187) on Thursday April 22, @11:42AM (#8939411)
        I'm sure we all remember the LAST time some snotty smart punks hacked into a military computer!

        "Hello Professor Falken. Would you like to play a game?"

        *shudder*
        [ Reply to This ]
        • duh by Anonymous Coward (Score:1) Thursday April 22, @11:42AM
            Shocking (Score:5, Interesting)
            by thebra (707939) * on Thursday April 22, @11:42AM (#8939421)
            (http://www.yowzer.net/ | Last Journal: http://slashdot.org/~thebra/journal/)
            Army lost last year not because of a successful outside attack but from a self-inflicted wound in which an authorized network user accidentally knocked out service for several hours, costing precious points that helped Air Force prevail.
            Isn't this how most corporate networks are taken down? BTW, I can't access the intranet.
            [ Reply to This ]
              Re:Shocking (Score:5, Informative)
              by ssuppe (773610) on Thursday April 22, @11:56AM (#8939591)
              Army lost last year not because of a successful outside attack but from a self-inflicted wound in which an authorized network user accidentally knocked out service for several hours, costing precious points that helped Air Force prevail.

              Well, that's not exactly what happened. I was a member of the Air Force Academy's team. I don't want to give too much away because you never know who will be reading this, but the Air Force's Team didn't have a SINGLE break-in during the entire excercise. Even when we were ordered to take down our firewalls on the last day, all of our machines were locked down (even the requisite Windows Boxen) that there were no compromises. The Red Team wasn't even able to perform a 100% successful DOS attack

              The exercise was basically run like this. Every team was given more or less the same hardware/# of machines to use to defend their network. You were allowed to use any operating system you felt was necessary, although a certain number of Windows machines had to be on the network. Each team had to provide a variety of services, including local account, local mail for members of the red team, web servers, database services, mail, DNS and FTP. SFTP was not allowed, so you had to be creative in your security.

              Services were measured by downtime - a service could go down for a specific amount of time before points were taken away. The points were on a subjective scale based on amount of downtime, how you remedied it, etc.

              It should ALSO be noted that this is an exercise that resides purely in Academia - it's an exercise between a bunch of different service academies, which is NOT the same thing as the operational United States military

              All in all, it was an EXTREMELY exciting exercise, lots of attacks were thwarted, many cans of Mountain Dew were imbibed. We laughed a little, cried a little, heck we even learned a little.

              [ Reply to This | Parent ]
              • Re:Shocking by advocate_one (Score:1) Thursday April 22, @01:16PM
                • 1 reply beneath your current threshold.
              I hope not (Score:5, Funny)
              by go3 (570471) on Thursday April 22, @11:43AM (#8939433)
              They'll probably just install Norton Internet Security.
              [ Reply to This ]
              And for the winner... (Score:4, Funny)
              by 53cur!ty (588713) on Thursday April 22, @11:43AM (#8939441)
              A lovely 5 year stay in LevinWorth!

              What do we have for the runner-ups John?

              Where the fun is [technicalknow-how.com]

              [ Reply to This ]
              haha (Score:5, Interesting)
              by Anonymous Coward on Thursday April 22, @11:46AM (#8939460)
              We get random netbios traffic from the DoD all the time... looks like something is not locked down over there. Either that or they are scanning other government agencies for open windows computers. hmmmm.
              [ Reply to This ]
                Meanwhile... (Score:5, Funny)
                by Otter (3800) on Thursday April 22, @11:47AM (#8939481)
                (Last Journal: http://slashdot.org/~Otter/journal/)
                ...the former head of the Los Angeles LUG protests this by, uh, ...

                Hmmm, I guess he's run out of cheap ways to get attention. Maybe he could quit the AAA or the Subway Sub Club, or something like that.

                [ Reply to This ]
                Reveal all methods? (Score:5, Funny)
                by KaDOOGAN (171877) on Thursday April 22, @11:48AM (#8939487)
                (http://slashdot.org/)
                As the post states, I don't think NSA will reveal all methods.

                DOD: could you sec-test our network?
                NSA: sure.

                NSA: we've found these holes
                DOD: fixed
                DOD: hey, now even you guys can't get in!
                NSA: Doh!
                [ Reply to This ]
                  Re:Reveal all methods? (Score:4, Funny)
                  by Kjella (173770) on Thursday April 22, @12:03PM (#8939670)
                  (http://slashdot.org/)
                  DOD: could you sec-test our network?
                  NSA: sure.

                  NSA: we've found these holes
                  DOD: fixed
                  DOD: hey, now even you guys can't get in!

                  NSA: riiiiiiiiight...
                  DOD: there's more?
                  NSA: *whistles innocently*
                  DOD: could others have discovered the same exploits?
                  NSA: theoretically, that is, if there were any
                  DOD: so theoretically, if they nuke us with our own nukes, it's your fault
                  NSA: ....*whoops*

                  Kjella
                  [ Reply to This | Parent ]
                  • Re:Reveal all methods? by Elwood P Dowd (Score:2) Thursday April 22, @12:49PM
                    Art of War (Score:5, Funny)
                    by WoodenRobot (726910) on Thursday April 22, @11:48AM (#8939493)
                    (http://buddhism.lioncity.net/)
                    Cyber warfare, a subset of classic information war that goes back as far as ancient Chinese military strategist Sun Tzu, has pushed its way into U.S. military curricula as the Internet has become pervasive.

                    Sun Tzu say "try asking them for their passwords, maybe offering a bar of chocolate in return. [slashdot.org]"
                    [ Reply to This ]
                    • Cyber Rattling by Doc Ruby (Score:2) Thursday April 22, @11:49AM
                    • The US Army will try to secure [...] by Alter Relationship (Score:1) Thursday April 22, @11:51AM
                      • NSAKey by shachart (Score:3) Thursday April 22, @11:53AM
                          Kudos (Score:4, Insightful)
                          by DoubleD (29726) on Thursday April 22, @11:53AM (#8939556)
                          It is good to see the issue of computer security intelligently approached.

                          It is much better to harness the natural competitiveness and curiosity of your geeks than to suppress it by any means possible and depend on security by obscurity.
                          [ Reply to This ]
                            After the exercise (Score:5, Funny)
                            by ch-chuck (9622) on Thursday April 22, @11:56AM (#8939580)
                            (http://slashdot.org/)
                            A sargent is pacing in front of a line of soldiers at attention, bellowing, "I've never seen such a sloppy outfit! Dictionary passwords on the root filesystem - open NetBIOS ports on the security gateway!!"

                            [ Reply to This ]
                          • The DOD actually has very effective security by RhettLivingston (Score:2) Thursday April 22, @11:56AM
                            • 1 reply beneath your current threshold.
                            Hopefully, the NSA does not have (Score:5, Funny)
                            by thisissilly (676875) on Thursday April 22, @11:58AM (#8939602)
                            ...any chocolate bars. [slashdot.org]
                            [ Reply to This ]
                            • The first thing they should do is... by Anonymous Coward (Score:1) Thursday April 22, @11:59AM
                                Useless exercises (Score:5, Insightful)
                                by eyeball (17206) on Thursday April 22, @12:00PM (#8939631)
                                (http://www.spacehaven.com/ | Last Journal: http://slashdot.org/~eyeball/journal/)
                                Unfortunately exercises like this show how our conventional approach to warfare (cyber- or human-) is doomed in the world of increasing unconventional war tactics.

                                With a network or a piece of land, actively defending against a known enemy in a known timeframe is fairly easy. You know the rules for engagement, you can easily account for all the possible outcomes.

                                Putting processes in place to defend against undeterminable attackers in an indefinite timeframe approaches the impossible. In a network, all it takes for hostile code to infiltrate is one human error (i.e.: a race condition when a firewall ACL changes). Same with terrorism: all it takes is a few people with flight training and box-cutters to do some serious damage. There are no rules of engagement.

                                Put another way, conventional warfare (again, cyber- or human-) is like a chess tournament. Predictable rules. For the unconventional, imagine someone winning a chess tournament by pulling out a gun and shooting the opposing player.
                                [ Reply to This ]
                                • Re:Useless exercises by kabocox (Score:2) Thursday April 22, @01:04PM
                                    Re:Useless exercises (Score:4, Insightful)
                                    by nomadicGeek (453231) * on Thursday April 22, @01:19PM (#8940589)
                                    So what do you do? Give up because it is too hard?

                                    You act like conventional warfare is always straightforward. Everyone just lines up and fights a certain way between certain hours. Deception, misdirection, and the element of surprise have always been major factors in warfare. Nothing has changed. Warriors have always had to adjust to new techniques and technologies.

                                    I agree with you that it is impossible to account for all possibilities. I’m sure that the first guy to be shot with a firearm was pretty surprised as his suit of armor was pierced by the bullet. The test of a warrior is how quickly you can adapt. Once you see your people fall with holes in the armor, you better be able to come up with a new strategy for protecting yourself. These types of games can help to tune those skills.

                                    These types of war games are a good way to assess preparedness, test your defenses, and learn from mistakes. You have to practice and constantly test yourself to become and stay good.

                                    Besides, whos says that you just have to sit around on the defensive. The rules didn't change, we just didn't realize that there was a war on before 9/11. You can also go after the attackers and make sure that they have little time to plan because they are doing everything they can just to stay alive.
                                    [ Reply to This | Parent ]
                                    • 2 replies beneath your current threshold.
                                    Revealing cards? (Score:4, Informative)
                                    by IWannaBeAnAC (653701) on Thursday April 22, @12:00PM (#8939637)
                                    I would have to think that this would be a lot of fun! I would like to see what the NSA and friends could throw at my network, although one would think they wouldn't reveal all their cards...

                                    Actually, I don't think it will be much fun at all, simply because I don't think there is any chance either side will reveal any cards. No doubt there will be some already published exploits and/or configuration gaffes that will be used. But I doubt anything new will come out of this.

                                    [ Reply to This ]
                                    • Virtual Sandbox by AmericanInKiev (Score:2) Thursday April 22, @12:01PM
                                    • I win! I got in! by fdiskne1 (Score:2) Thursday April 22, @12:02PM
                                        Windows Boxes... (Score:5, Funny)
                                        by bfg9000 (726447) on Thursday April 22, @12:11PM (#8939742)
                                        (http://bitter-and-impotent-loser-counselling.com/ | Last Journal: http://slashdot.org/~bfg9000/journal/)
                                        ... I personally find that Windows boxes are the hardest to crack, because every time I'm about to get in, the damn thing crashes and the victim reboots and I lose all my work. And then when I finally manage to get on the system, it crashes again, usually when I'm halfway done stealing his copy of Massive Zoomers and the Ladies Who Love 'Em 4. Arrrghghghghhhh!

                                        It's just not worth it, the patented Windows BlueScreen Security System[tm] is foolproof. I'll take the easier road and stick to hacking OpenBSD boxes.
                                        [ Reply to This ]
                                        • poster is inconsistent by anonymous leprechaun (Score:1) Thursday April 22, @12:13PM
                                          • Social Engineering by SpermanHerman (Score:2) Thursday April 22, @12:14PM
                                          • Weakest Link by 4of12 (Score:2) Thursday April 22, @12:24PM
                                            • To win... by Anonymous Coward (Score:1) Thursday April 22, @12:24PM
                                              • 1 reply beneath your current threshold.
                                              Social or just technical? (Score:4, Insightful)
                                              by Johnny Mnemonic (176043) <`moc.cam' `ta' `eromsnidm'> on Thursday April 22, @12:26PM (#8939946)
                                              (http://www.afp548.com/News/index.html | Last Journal: http://slashdot.org/~Johnny%20Mnemonic/journal/)
                                              Does anyone happen to know if social engineering is allowed, or is this just a technical attack?

                                              I would wager than any social engineering would a) be more likely to succeed, and b) be also more likely to occur in the real world. But it's less quantifiable too.
                                              [ Reply to This ]
                                            • Stock Prices by maximilln (Score:1) Thursday April 22, @12:27PM
                                              This is not new. (Score:5, Interesting)
                                              by BeProf (597697) on Thursday April 22, @12:27PM (#8939967)
                                              This has been going on each year for almost 10 years now. Each of the "official" military academies compete, and the best team wins the NSA Information Assurance Directorate Trophy. In the past Army, Navy, and Air Force have all done quite well, while Coast Guard has not.

                                              Contrary to popular belief, the NSA Red Team isn't allowed to use any of the NSA arsenal of dirty tricks. They are only allowed to use software that is freely available off the internet (NMAP, snort, etc.) running on commodity hardware. They can't do anything that violates Federal Law, (other than the intrusion attempts themselves), but social engineering is ok.

                                              Also, break-ins are not an automatic loss, per se. Nor is prevention of break-in an automatic win. The goal of the Red Team is DoS. For every minute a service remains down, the Red Team scores points. The cadet teams win points based on how quickly they detect and respond to the attacks. All judging is done by an NSA White Team.

                                              I'll see if I can find some more info and post it here.
                                              [ Reply to This ]
                                            • Some further info... by warlock138 (Score:1) Thursday April 22, @12:33PM
                                              • 1 reply beneath your current threshold.
                                            • Advice to DOD by Anonymous Coward (Score:1) Thursday April 22, @12:36PM
                                              • My prediction: A Chocolate Bar by strictnein (Score:1) Thursday April 22, @12:36PM
                                              • Oh no! by Syberghost (Score:1) Thursday April 22, @12:43PM
                                                • Army couldn't even... by cuzality (Score:1) Thursday April 22, @12:50PM
                                                  • Protest by Alethes (Score:2) Thursday April 22, @12:53PM
                                                    • Punch cards, anyone? by JThaddeus (Score:2) Thursday April 22, @01:09PM
                                                      • This is a load...... by code_honky (Score:1) Thursday April 22, @01:15PM
                                                        • The New Director Is..... by ericlp (Score:1) Thursday April 22, @01:24PM
                                                          • Federal Law vs. Soldier Training by deliciousmonster (Score:1) Thursday April 22, @02:00PM
                                                            This isn't really that new... (Score:4, Informative)
                                                            by bingbong (115802) on Thursday April 22, @02:34PM (#8941514)


                                                            This really isn’t all that new. The U.S. Naval Postgraduate School [navy.mil] has been
                                                            sending their Infosec students to play Capture the Flag [ghettohackers.net] at Defcon [defcon.org] for the last couple years as well as
                                                            this year’s Interz0ne [interz0ne.com] conference. In
                                                            fact, there was only one team (Anomaly – and they won ironically) that didn’t
                                                            have government personnel or contractors on their team.





                                                            Also, Immunix [immunix.com], a DARPA [darpa.mil] funded hardened Linux version [immunix.com] has also
                                                            been put under fire during CTF for the last couple year. (Their team placed a
                                                            solid second both times).





                                                            The Feds have learned over the last couple years that they
                                                            are behind the ball in terms of normal unclassified security training for their
                                                            personnel. These conferences have been really good at given them some real
                                                            world training that they normally don’t get.





                                                            It’s nice to see my tax dollars being put to a good use for
                                                            a change. Plus it makes the “Spot [defcon.org]
                                                            the Fed” game MUCH easier.



                                                            [ Reply to This ]
                                                            • windows backdoor true? by planckscale (Score:1) Thursday April 22, @04:59PM
                                                            • West Point ACM by Belsical (Score:1) Thursday April 22, @06:44PM
                                                            • Root-Fu by CyberVenom (Score:1) Thursday April 22, @08:38PM
                                                              • Packet Captures and More Information... by rumint (Score:1) Thursday April 22, @09:17PM
                                                                • Previous cyber wargame results by ricksmith (Score:1) Saturday April 24, @02:52PM
                                                                  • Re:Best Method to secure network by essreenim (Score:1) Thursday April 22, @11:47AM
                                                                    • Re:So this is what our tax dollars go to... by be951 (Score:2) Thursday April 22, @11:47AM
                                                                      • Re:A single gov't entity responsible for infosec? by Mattster P. (Score:1) Thursday April 22, @11:50AM
                                                                        • Re:A single gov't entity responsible for infosec? by Anonymous Coward (Score:1) Thursday April 22, @11:53AM
                                                                          • Re:A single gov't entity responsible for infosec? by Anonymous Coward (Score:1) Thursday April 22, @12:01PM
                                                                          • Re:Hackers vs. Crackers by Almond Tree (Score:1) Thursday April 22, @12:05PM
                                                                            • Re:Hackers vs. Crackers by /dev/trash (Score:3) Thursday April 22, @12:06PM
                                                                              • Re:Hackers vs. Crackers by jmays (Score:2) Thursday April 22, @12:06PM
                                                                                • Re:Hackers vs. Crackers by saderax (Score:2) Thursday April 22, @12:06PM
                                                                                    Re:Hackers vs. Crackers (Score:5, Funny)
                                                                                    by NineNine (235196) on Thursday April 22, @12:21PM (#8939879)
                                                                                    (http://ninenine.com/ | Last Journal: http://slashdot.org/~NineNine/journal/)
                                                                                    Then stop beating a dead horse. It's not gonna happen, any more than my active campaign to call "automobiles", "eggplants". For some reason, people just aren't interested in changing the meaning of words they use already. Don't ask me why...

                                                                                    Anyway, I'm off to go get my eggplant registered.
                                                                                    [ Reply to This | Parent ]
                                                                                    • 1 reply beneath your current threshold.
                                                                                    Re:So this is what our tax dollars go to... (Score:5, Insightful)
                                                                                    by rjune (123157) on Thursday April 22, @12:30PM (#8940005)
                                                                                    If I had moderator points, you would be at -1 right now instead of 0.

                                                                                    This is the best way to learn security, by applying the "book learned" concepts to the real world. In fact, this is exactly what we did for the final project in the Computer Security course that I took as part of my MS in Computing program at Marquette.

                                                                                    It also reinforced a very important concept -- people are the weakest link. We got the other group to send us passwords by faking an email in the instructor's name!
                                                                                    [ Reply to This | Parent ]
                                                                                    • Re:Hackers vs. Crackers by carn1fex (Score:1) Thursday April 22, @01:03PM
                                                                                      • Re:Hackers vs. Crackers by Ira Sponsible (Score:1) Thursday April 22, @01:14PM
                                                                                        • 14 replies beneath your current threshold.
                                                                                        •  
                                                                                            Prediction is very difficult, especially of the future. - Niels Bohr
                                                                                          All trademarks and copyrights on this page are owned by their respective owners. Comments are owned by the Poster. The Rest © 1997-2004 OSDN.
                                                                                          [ home | awards | contribute story | older articles | OSDN | advertise | self serve ad system | about | terms of service | privacy | faq | rss ]