[Infowarrior] - USAF Aims to 'Rewrite Laws of Cyberspace'

Richard Forno rforno at infowarrior.org
Mon Nov 3 19:47:57 UTC 2008


Air Force Aims to 'Rewrite Laws of Cyberspace'
By Noah Shachtman EmailNovember 03, 2008 | 12:25:00 PMCategories: Info  
War

http://blog.wired.com/defense/2008/11/air-force-aims.html

The Air Force is fed up with a seemingly endless barrage of attacks on  
its computer networks from stealthy adversaries whose motives and even  
locations are unclear. So now the service is looking to restore its  
advantage on the virtual battlefield by doing nothing less than the  
rewriting the "laws of cyberspace."

It's more than a little ironic that the U.S. military, which had so  
much to do with the creation and early development of internet, finds  
itself at its mercy. But as the American armed forces become  
increasingly reliant on its communications networks, even small,  
obscure holes in the defense grid are seen as having catastrophic  
potential.

Trouble is that even a founding father can't unilaterally change  
things that the entirety of the internet ecosystem now depends on.  
"You can control your own networks, rewrite your own laws," says Rick  
Wesson, CEO of the network security firm Support Intelligence. "You  
can't rewrite everybody else's."

But the Air Force Research Laboratory's "Integrated Cyber Defense"  
program, announced earlier this month, is part of a larger military  
effort to accomplish just that. "The 'laws' of cyberspace can be  
rewritten, and therefore the domain can be modified at any level to  
favor defensive forces," announces the project's request for  
proposals. Some of the rewrites being considered:

     * Making hostile traffic inoperable on Air Force networks.

     * Locating and identifying once-anonymous hackers.

     * Enabling Air Force servers to evade or dodge electronic  
attacks, somehow.

It's part of a larger Air Force effort to gain the upper hand in  
network conflict. An upcoming Air Force doctrine calls for the service  
to have the "freedom to attack" online. A research program, launched  
in May, shoots for "gain access" to "any and all" computers. A new  
division of information warriors is being set up under Air Force Space  
Command. "Our mission is to control cyberspace both for attacks and  
defense," 8th Air Force commander Lt. Gen. Robert Elder told Wired.com  
earlier this year. Apparently.

At the moment, though, online aggressors have the edge on the  
military's network protectors, the Air Force says.

"Defensive operations are constantly playing 'catch up' to an ever- 
increasing onslaught of attacks that seem to always stay one step  
ahead," says the Air Force Research Laboratory's "Integrated Cyber  
Defense" request for proposals. "In order to tip the balance in favor  
of the defender, we must develop a strategic approach to cyber defense  
that transcends the day to day reactive operations."

"[M]ost threats should be made irrelevant by eliminating  
vulnerabilities beforehand by either moving them 'out of band' (i.e.,  
making them technically or physically inaccessible to the adversary),  
or 'designing them out' completely," the request for proposals adds.

"Can we create a cyberspace with different rules?" asks Paul Ratazzi,  
a technical advisor at the AFRL's Information Directorate. "Let's  
challenge those fundamental assumptions on how these things work, and  
see if there's a better way."

For instance, it's extraordinarily difficult to find the hacker behind  
a cyberattack today. Network traffic can be run through dozens of  
different proxies and anonymizers; "botnets" of enslaved computers can  
be controlled from the other side of the world; millions of PCs spew  
out malicious data without their owners ever catching on. AFRL would  
like to see a way to change existing network protocols, to make it  
easier to trace and locate the source of an online threat.

Or perhaps today's protocols can be tailored, to make military  
networks "technically or physically inaccessible" to malicious  
traffic. "We'll start with blue," says Information Directorate chief  
Donald Hanson, using the military term for friendly forces. "If you're  
not blue, you can't come in."

Hanson is also interested in finding ways to dodge electronic attacks,  
rather than figure out new ways to stop them, or lock them out. "A lot  
of our [defenses] up to now have been about defeating an attack," he  
says. "We'd rather avoid it altogether." Digital radios communicate  
today by "frequency-hopping" -- jumping across multiple bands of the  
spectrum. Perhaps the Air Force's online traffic could do something  
similar.

There are some network precedents for the idea, Wesson explains. So- 
called "honeypot" servers are used to lure in hackers with fake  
targets to attack. But the hackers are often aware which IP addresses  
are really honeypots. So hosted servers are used to mask those  
addresses -- and, with a secure network "tunnel," run the traffic back  
to the honeypots. "If you can do that with honeypots, you can do it  
with all kinds of other things," Wesson says.

Hanson refused to comment on that technique. But Ross Stapleton-Gray,  
with the Packet Clearing House research group, isn't sure cyberstrikes  
can be avoided, really. "The way networks work, it's always going to  
be easier for a nimble attacker than a nimble defender," says Ross  
Stapleton-Gray, with the Packet Clearing House research group.  
"There's always a scarcity of bandwidth -- somewhere. There are always  
chokepoints -- somewhere."


More information about the Infowarrior mailing list