[Infowarrior] - The Cyber Defense Perimeter
Richard Forno
rforno at infowarrior.org
Thu Apr 30 18:58:19 UTC 2009
The Cyber Defense Perimeter
Defense contractors are receiving classified information on hacker
threats to their computers.
by Shane Harris
Saturday, May 2, 2009
http://www.nationaljournal.com/njmagazine/id_20090502_5834.php
In response to an unprecedented wave of attacks on the Defense
Department's computer networks, and possible theft of information
about U.S. weapons systems by foreign governments, the Pentagon has
quietly begun sharing classified intelligence about hackers and online
threats with the country's biggest defense contractors. The
intelligence-sharing program began almost two years ago, after top
Pentagon leaders realized that hackers were trying to steal
information not just by breaking into government computers but also by
going after corporations that contract with the government. These
private computers and networks often contain the same sensitive and
classified information found in the government's systems.
The new intelligence partnership, which has not been previously
reported, is known as the Defense Industrial Base initiative, or "the
DIB." The department formally launched the program in September 2007,
but it took a year to work out a legal arrangement by which the
contractors and the government could confidentially share information.
In mid-2008, the effort ramped up after what was described as a hair-
raising meeting in a secured facility at the Pentagon in which
officials gave temporary security clearances to chief executives from
the biggest defense firms and delivered a no-holds-barred briefing on
the range of successful cyberattacks launched against the government
and their companies. The executives "went in with dark hair and came
out with white hair," said James Lewis, a prominent cyber-security
expert and a fellow at the Center for Strategic and International
Studies, who is familiar with the meeting. "I think that was a shocker
for most people."
Weaknesses in corporate defenses can threaten top government secrets.
Last month, The Wall Street Journal reported that cyber-spies targeted
companies helping to build the Joint Strike Fighter and stole design
information that could make it easier for adversaries to defend
against the airplane. The paper reported that the breaches began as
early as 2007 and perhaps continued into 2008, a period that generally
coincides with the intelligence-sharing program's start-up.
Since then, Pentagon leaders have met with "the highest levels of all
the different companies" in the defense industrial base, a senior
Defense official told National Journal. Former Deputy Defense
Secretary Gordon England "took this as a top priority, and he made
sure that we got the highest levels of all the companies aware of the
cyber-threat and the whole circumstances around it," said Robert
Lentz, the deputy assistant Defense secretary who oversees the
intelligence-sharing partnership.
According to a dozen industry and government officials interviewed by
NJ, the pilot DIB has been running largely unnoticed. It is restricted
to companies in the defense sector. But the White House has received a
proposal to expand the program to other economic sectors that are at
risk of cyberattack, such as the electrical power and financial
services industries. In written recommendations to Melissa Hathaway,
President Obama's cyber-security adviser, the Intelligence and
National Security Alliance, a nonpartisan association of intelligence
professionals, called the Pentagon's program a "fledgling effort" that
"should be fully supported." The group's former chairman, John
Brennan, is Obama's top counter-terrorism and homeland-security adviser.
The Pentagon is working with the Homeland Security Department to
broaden the model for other vital infrastructure sectors, Lentz said.
The program has worked out a consistent, if not real-time, process for
sharing cyber-intelligence. Every two weeks, the Defense Department
briefs the 30 companies participating in the DIB on potential
vulnerabilities in computer networks, as well as on specific threats
that the government has found in the course of its regular scouting in
cyberspace. Experts cull the data from a number of intelligence and
military organizations, Lentz said, including the Joint Task Force-
Global Network Operations, which is responsible for protecting
military computer networks, and the National Security Agency's Threat
Operations Center, which monitors global communications networks for
threats to defense and intelligence agencies.
The information comes in two forms, Lentz said: an unclassified report
that executives can share with the technicians who manage their
networks, and a classified report of "contextual information" that the
firms can use to protect themselves.
The Defense Department has a compelling interest in protecting the
data on its contractors' systems. "This is DOD information that is at
risk," Lentz said. The companies may own their networks, but the
information traveling on them belongs to the government and is
considered a vital national defense asset.
Lentz declined to specify what threats have turned up or what attacks
have occurred. But he said that the senior-level attention at the
Pentagon was triggered by a notable increase in attacks. "In the past
18 months, we've seen a significant spike in cyber-criminal activity,"
he said.
A significant portion of that activity appears to be cyber-espionage
-- the theft of restricted information through the Internet. Senior
defense and intelligence officials have been sounding the alarm for
several months about -espionage by computers based in China. They've
also singled out organized cyber-crime rings in Russia. In an
interview with NJ last year, Joel Brenner, the nation's top counter-
intelligence official, named both countries as major sources of
sophisticated and relentless cyberattacks.
Corporations are reluctant to confirm that they are part of the DIB
initiative, and Lentz wouldn't give any names. But sources familiar
with the membership say that it includes the top tier of defense
contractors, and that smaller companies are joining the group as well.
Officials with Raytheon and Northrup Grumman confirmed that their
companies are members.
It's not surprising that some contractors want to remain silent. Some
executives fear that hackers will only try harder to breach their
systems if they know that their networks contain information so
valuable that the military and the intelligence community are helping
to protect it, according to one industry official who works with the
DIB. The program is not classified, but it has created a forum in
which contractors feel safe enough to disclose weaknesses in their
defenses without fear of inviting attack or drawing public attention.
Historically, corporate leaders have been loathe to share this kind of
information with the government for fear of negative press, or because
they think it will limit their opportunities to win future business.
For nearly a decade, cyber-security experts have warned that the lack
of consistent information-flow between government and industry has
weakened overall security.
"This is all about trust," Lentz said of the DIB, "and all about a
mutual understanding of the consequences of not taking immediate
action to find out what's causing a particular event."
The program is not a one-way street. In addition to the regular threat
reports that contractors receive from government, they are expected to
report any intrusions into their systems within 72 hours of the event,
Lentz said. That information goes to a Defense Department cyber-
forensics team that specializes in tracing the source of an attack and
learning how it was done. "When we determine that someone is trying to
attack our networks ... we'll report that very quickly," said Steve
Hawkins, vice president of information security solutions at Raytheon.
"The government in turn can then provide that information out to the
other partners."
Although participants say that the new partnership was not spawned by
one particular incident, its birth closely followed a June 2007 attack
on Pentagon computer systems that surprised senior officials for its
breadth and severity.
As first reported in September 2007 by the Financial Times, the
Chinese military hacked into a Pentagon computer network three months
earlier, in what U.S. officials called "the most successful
cyberattack on the U.S. Defense Department." The attack showed an
alarming level of sophistication and precision. "China had shown it
could disrupt systems at critical times," the newspaper reported.
In September 2007, Forbes reported, "the same spies may have been
combing through the computer systems of major U.S. defense contractors
for more than a year." That same month, the DIB initiative took shape.
The Defense Department was not reacting to an isolated event, Lentz
emphasized. "We've been very much concerned about ... the breadth of
the cyber-movement in terms of their aggressiveness, their skills
sets," he said, calling cyberspace "increasingly volatile"
Lewis of CSIS, who directed a comprehensive cyber-security study for
the Obama administration, agreed that the threat was, and is,
pervasive and persistent. "It wasn't that we got wacked by a two-by-
four; we were getting wacked by a two-by-four every week."
More information about the Infowarrior
mailing list