[Infowarrior] - DOD, Industry Join to Protect Data
Richard Forno
rforno at infowarrior.org
Mon May 25 19:04:17 UTC 2009
Defense Dept., Industry Join to Protect Data
By Ellen Nakashima
Washington Post Staff Writer
Monday, May 25, 2009
http://www.washingtonpost.com/wp-dyn/content/article/2009/05/24/AR2009052402140_pf.html
LINTHICUM, Md. -- At 2:42 p.m. one recent Wednesday, on the fourth
floor of a squat brick office building under the flight path of jets
landing at Baltimore-Washington International Marshall Airport, a
Pentagon analyst skilled in parsing malicious computer code e-mailed a
threat alert to 28 of the nation's largest defense contractors.
That morning, a defense company had told the Defense Department Cyber
Crime Center about a significant probe of its computer network. The
Pentagon analysts determined the code was present in several
companies' networks and raised the alarm.
This information exchange took place, government and industry
officials said, because the companies and the Pentagon have begun to
trust one another. They are joining forces to stem the loss of
important defense industry data -- by some estimates at least $100
billion worth in the past two years, reflecting the cost to produce
the data and its value to adversaries.
For two years, the Defense Department has been collaborating with
industry to try to better protect the firms' computer networks. Now,
as the Obama administration ponders how to strengthen the nation's
defenses against cyberattacks, it is considering ways to share the
Pentagon's threat data with other critical industries, such as those
that handle vastly larger amounts of data, including phone calls and
private e-mails. The threat scenarios, experts say, are chilling: a
months-long blackout of much of the United States, wide-scale
corruption of electronic banking data, a disabling of the air traffic
control system.
The Pentagon's trial program with industry illuminates the promise and
the pitfalls of such partnerships. The goal is a swifter, more
coordinated response to threats facing the defense industry. But
intelligence and law enforcement agencies have been reluctant to
release threat data they consider classified. And the companies have
been reluctant to share intrusion data, for fear of losing control
over personal or proprietary information.
"This isn't just about national security. It's about the economic well-
being of the United States. It's that fine line of ensuring that you
have security without unnecessarily compromising privacy," said
Barbara Fast, vice president of Boeing Cyber Solutions.
The pilot program has prompted the Department of Homeland Security to
consider extending the model to other industries, officials said. And
the Defense Department is in preliminary talks with telecommunications
and Internet service providers about creating a similar partnership,
industry officials say.
The Defense Department's Cyber Crime Center, whose 277 employees are
mostly contractors, is a clearinghouse for threat data from the
National Security Agency, military agencies, the DHS and industry.
Some alerts go out quickly, such those flagging the "Internet
protocol" address of a potential hacker.
Other reports based on classified data take on average three weeks to
compile. They tell a company who might be behind an attack and what
the attacker's tactics are, such as infected e-mail. One reason
vetting such material takes time is that sources must approve
dissemination of the information to ensure that disclosure will not
jeopardize an investigation.
"Clearly this needs to be a lot quicker than it is today," Boeing's
Fast said in an interview last month.
Several firms said they share with the Cyber Crime Center technical
information about viruses and suspicious probes that they feel can
help the industry broadly. But Northrop Grumman, for instance,
generally reports breaches to the military branch that owns the
contract, company officials said, and the branch decides whether it
should be reported elsewhere.
"There is this natural inclination to not highlight that you've had a
problem, an incursion into your system," said Ellen E. McCarthy,
president of the Intelligence and National Security Alliance, which
includes the defense industry. "It highlights to your customers, to
your board of directors, that you've had a problem."
Though Lockheed Martin's agreement allows the firm to send samples of
breach data to the crime center, the firm prefers to do its own
intrusion investigations, said Mike Gordon, senior manager of
Lockheed's Computer Incident Response Team. "We've got the most
talented team, the most advanced technologies," he said during an
interview at the firm's Security Intelligence Center in Gaithersburg.
At the touch of a button, a wood-paneled wall slid up and revealed an
operations center -- barely a year old -- with 24 workstations, 15
analysts scrutinizing code on their monitors, a wall of giant video
screens showing network traffic, and a map of the firm's global
Internet links. Each day, 4 million e-mails enter Lockheed's networks,
and analysts monitor hundreds of millions of actions, including clicks
on the company Web site, for suspicious activity.
In 2006, Lockheed officials contacted government investigators about a
suspicious intrusion into an unclassified network that handles data on
the F-35 Joint Strike Fighter. The Wall Street Journal reported about
that incident last month.
Senior Air Force officials became concerned that other systems were
vulnerable and directed that the breach investigation be broadened to
include the F-22 fighter program, although no evidence was found that
F-22 data had been stolen, according to sources who spoke on the
condition of anonymity because of the matter's sensitivity.
Both jets rely on computer networks for operation and maintenance,
which makes them vulnerable to hacking that can affect flight
operations. Gaining access to unclassified data about design and
maintenance can allow an adversary to more easily design
countermeasures, the sources said.
In early 2007, the Air Force launched a partnership with about a dozen
companies that work on the F-35 and F-22, and that served as the
nucleus for the broader partnership. In August 2007, Deputy Defense
Secretary Gordon England gathered the top executives of major
contractors for a classified briefing.
"We shared with them the fact that we've got a very, very aggressive
cyber threat," said Robert Lentz, a Pentagon official who heads the
partnership. The Pentagon soon will seek to amend defense acquisition
rules to require cybersecurity standards for firms seeking contracts.
"The sooner we all understand what's required to protect the
information in our networks, and we teach this in universities and in
businesses, the better off we all will be, down to the Internet user
at home," Lentz said.
More information about the Infowarrior
mailing list