[Infowarrior] - Cadets Trade the Trenches for Firewalls

Richard Forno rforno at infowarrior.org
Mon May 11 03:02:52 UTC 2009


May 11, 2009
Cadets Trade the Trenches for Firewalls
By COREY KILGANNON and NOAM COHEN

http://www.nytimes.com/2009/05/11/technology/11cybergames.html?_r=1&ref=global-home&pagewanted=print

WEST POINT, N.Y. — The Army forces were under attack. Communications  
were down, and the chain of command was broken.

Pacing a makeshift bunker whose entrance was camouflaged with netting,  
the young man in battle fatigues barked at his comrades: “They are  
flooding the e-mail server. Block it. I’ll take the heat for it.”

These are the war games at West Point, at least last month, when a  
team of cadets spent four days struggling around the clock to  
establish a computer network and keep it operating while hackers from  
the National Security Agency in Maryland tried to infiltrate it with  
methods that an enemy might use. The N.S.A. made the cadets’ task more  
difficult by planting viruses on some of the equipment, just as real- 
world hackers have done on millions of computers around the world.

The competition was a final exam of sorts for a senior elective class.  
The cadets, who were computer science and information technology  
majors, competed against teams from the Navy, Air Force, Coast Guard  
and Merchant Marine as well as the Naval Postgraduate Academy and the  
Air Force Institute of Technology. Each team was judged on how well it  
subdued the threats from the N.S.A.

The cyberwar games at West Point are just one example of a heightened  
awareness across the military that it must treat the threat of a  
computer attack as seriously as it does an attack carried out by a  
bomber or combat brigade. There is hardly an American military unit or  
headquarters that has not been ordered to analyze the risk of  
cyberattacks to its mission — and to train to counter them. If the  
hackers were to succeed, they could change information on the network  
and cripple Internet communications.

In the desert outside Las Vegas, in a series of inconspicuous  
trailers, some of the most highly motivated hackers in the United  
States spend their days and nights probing the military’s vast  
computer networks for weaknesses to exploit.

These hackers — many of whom got their start as teenagers devoted to  
computer screens in their basements — have access to the latest in  
attack software. Some of it was developed by cryptologists at the  
N.S.A., the nation’s largest intelligence agency, where most of the  
government’s talent for breaking and making computer codes resides.

The hackers have an official name — the 57th Information Aggressor  
Squadron — and a real home, Nellis Air Force Base.

The Army last year created its own destination for computer experts,  
the Network Warfare Battalion, where many of the cadets in the  
cyberwar games hope to be assigned. But even so, the ranks are still  
small.

The Defense Department today graduates only 80 students a year from  
its cyberwar schools, causing Defense Secretary Robert M. Gates to  
complain that the Pentagon is “desperately short of people who have  
capabilities in this area in all the services, and we have to address  
it.” Under current Pentagon budget proposals, the number of students  
cycled through the schools will be quadrupled in the next two years.

Part of the Pentagon’s effort to increase the military’s capabilities  
are the annual cyberwar games played at the nation’s military  
academies, including West Point, where young cadets in combat boots  
and buzz cuts talk megabytes instead of megatons on a campus dotted  
with statues of generals, historic armaments and old stone buildings.

While the Pentagon has embraced the need for offensive cyberwarfare,  
there were no offensive maneuvers in the games last month, said Col.  
Joe Adams, who teaches Information Assurance and stood at the head of  
the classroom during the April exercise.

Cadet Joshua Ewing said he and his fellow Blue Team members “learn all  
the techniques that a hacker would do, and we try to beat a hacker.”

These strategies are not just theoretical. Most of these cadets will  
soon be sent to Afghanistan to carry out such work, Cadet Ewing said.

When the military deploys in a combat zone or during a domestic  
emergency, establishing a secure Internet connection is an early  
priority. To keep things humming, the military’s experts must fend off  
the ordinary chaos of the Internet as well as attacks devised to  
disable the communications system, like flooding e-mail servers with  
so many junk messages that they collapse.

Underscoring how seriously the cadets were taking the April games, the  
sign above the darkened entranceway in Thayer Hall read “Information  
Warfare Live Fire Range” and the area was draped with camouflage  
netting.

One group had to retrieve crucial information from a partly erased  
hard drive. One common method of hiding text, said Cadet Sean Storey,  
is to embed it in digital photographs; he had managed to find secret  
documents hidden this way. He was seeking a password needed to read  
encrypted e-mail he had located on the hard drive.

Other cadets worked in tandem, as if plugging a leaky dam, to keep the  
entire system working as the N.S.A. hackers attacked the engine that  
runs a crucial database as well as the e-mail server.

They shouted out various Internet addresses to inspect — and usually  
block — after getting clearance from referees. And there was that  
awkward moment when the cadet in charge, Salvatore Messina, had to act  
without clearance because the attack was so severe he couldn’t even  
send an e-mail message.

The cadets in this room do get their share of ribbing. But one cadet,  
Derek Taylor, said today’s soldiers recognize that technological  
expertise can be as vital as brute force in saving lives. West Point  
takes the competition seriously. The cadets who helped install and  
secure the operating system spent a week setting it up. The dean gives  
a pep talk; professors bring food.

Brian McCord, part of the team that installed the operating system,  
said he was chosen because his senior project was deeply reliant on  
Linux. The West Point team used this open-source operating system,  
freely available on the Internet, instead of relying on proprietary  
products from big-name companies like Microsoft or Sun Microsystems.

“It seems weird for the Army with its large contracts to be using  
Linux, but it’s very cheap and very customizable,” Cadet McCord said.  
It is also much easier to secure because “you can tweak it for  
everything you need” and there are not as many known ways to attack  
it, he said.

West Point emerged victorious in the games last month. That means the  
academy, which has won five of the last nine competitions, can keep  
the Director’s Cup trophy, which is displayed near a German Enigma  
encoding machine from World War II. Cracking the Enigma code helped  
the Allies win the war, and the machine is a stark reminder of the  
pivotal role of technology in warfare.

Thom Shanker contributed reporting from Washington.


More information about the Infowarrior mailing list