Special Report: The Pentagon's New Cyber Warriors

Published on
by
Reuters

Special Report: The Pentagon's New Cyber Warriors

by
Jim Wolf

2Lt William Liggett (L) talks with a colleague as a map is displayed on one of the screens at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. The Pentagon in recent weeks has begun pushing to put civilian infrastructure under its wing in a proposed cyber realm walled off from the rest of the Internet. (Credit: Reuters/Rick Wilking)

WASHINGTON - Guarding water wells and granaries from enemy
raids is as old as war itself. In the Middle Ages, vital resources were
hoarded behind castle walls, protected by moats, drawbridges and knights
with double-edged swords.

Today, U.S. national security planners are proposing that the 21st
century's critical infrastructure -- power grids, communications, water
utilities, financial networks -- be similarly shielded from cyber
marauders and other foes.

The ramparts would be virtual, their perimeters policed by the
Pentagon and backed by digital weapons capable of circling the globe in
milliseconds to knock out targets.

An examination by Reuters, including dozens of interviews with
military officers, government officials and outside experts, shows that
the U.S. military is preparing for digital combat even more extensively
than has been made public. And how to keep the nation's lifeblood
industries safe is a big, if controversial, aspect of it.

"The best-laid defenses on military networks will matter little
unless our civilian critical infrastructure is also able to withstand
attacks," says Deputy U.S. Defense Secretary William Lynn, who has been
reshaping military capabilities for an emerging digital battlefield.

Any major future conflict, he says, inevitably will involve cyber
warfare that could knock out power, transport and banks, causing
"massive" economic disruption.

But not everyone agrees that the military should or even can take on
the job of shielding such networks. In fact, some in the private sector
fear that shifting responsibility to the Pentagon is technologically
difficult -- and could prove counterproductive.

For the moment, however, proponents of the change seem to have the
upper hand. Their case has been helped by the recent emergence of
Stuxnet, a malicious computer worm of unknown origin that attacks
command modules for industrial equipment.

Experts describe the code as a first-of-its-kind guided cyber
missile. Stuxnet has hit Iran especially hard, possibly slowing progress
on Tehran's nuclear program, as well as causing problems elsewhere.

Stuxnet was a cyber shot heard around the world. Russia, China,
Israel and other nations are racing to plug network gaps. They also are
building digital arsenals of bits, bytes and logic bombs -- code
designed to interfere with a computer's operation if a specific
condition is met, according to experts inside and outside the U.S.
government.

THE WORMS ARE COMING!

In some ways, the U.S. military-industrial complex -- as President
Dwight Eisenhower called ties among policymakers, the armed forces and
arms makers -- is turning into more of a military-cyber-intelligence
mash-up.

The Pentagon's biggest suppliers -- including Lockheed Martin Corp,
Boeing Co , Northrop Grumman Corp, BAE Systems Plc and Raytheon Co --
each have big and growing cyber-related product and service lines for a
market that has been estimated at $80 billion to $140 billion a year
worldwide, depending on how broadly it is defined.

U.S. officials have shown increasing concern about alleged Chinese
and Russian penetrations of the electricity grid, which depends on the
Internet to function. Beijing, at odds with the United States over
Taiwan arms sales and other thorny issues, has "laced U.S.
infrastructure with logic bombs," former National Security Council
official Richard Clarke writes in his 2010 book "Cyber War," a charge
China denies.

Such concerns explain the Pentagon's push to put civilian
infrastructure under its wing by creating a cyber realm walled off from
the rest of the Internet. It would feature "active" perimeter defenses,
including intrusion monitoring and scanning technology, at its interface
with the public Internet, much like the Pentagon's "dot.mil" domain
with its more than 15,000 Defense Department networks.

The head of the military's new Cyber Command, Army General Keith
Alexander, says setting it up would be straightforward technically. He
calls it a "secure zone, a protected zone." Others have dubbed the idea
"dot.secure."

"The hard part is now working through and ensuring everybody's
satisfied with what we're going to do," Alexander, 58, told reporters
gathered recently near his headquarters at Fort Meade, Maryland.

Alexander also heads the National Security Agency, or NSA, the
super-secretive Defense Department arm that shields national security
information and networks, and intercepts foreign communications.

The Pentagon is already putting in place a pilot program to boost its
suppliers' network defenses after break-ins that have compromised
weapons blueprints, among other things. Lynn told Alexander to submit
plans, in his NSA role, for guarding the so-called defense industrial
base, or DIB, that sells the Pentagon $400 billion in goods and services
a year.

"The DIB represents a growing repository of government information
and intellectual property on unclassified networks," Lynn said in a June
4 memo obtained by Reuters.

He gave the general 60 days to develop the plan, with the Homeland
Security Department, to provide "active perimeter" defenses to an
undisclosed number of Pentagon contractors.

"We must develop additional initiatives that will rapidly increase
the level of cybersecurity protection for the DIB to a level equivalent
to the (Department of Defense's) unclassified network," Lynn wrote.

The Pentagon, along with the Homeland Security department, is now
consulting volunteer "industry partners" on the challenges private
sector companies envision, said Air Force Lieutenant Colonel Rene White,
a Pentagon spokeswoman, in a status report.

THROWBACK?

Some see the Pentagon's proposed new ring around certain critical services as a throwback almost to the dark ages.

"Dot.secure becomes new Target One," says Richard Bejtlich, General
Electric Co's director of incident response. "I can't think of an easier
way to help an adversary target the most critical information on
industry computers."

Bejtlich and others say such an arrangement would only be as strong
as its weakest link, vulnerable to compromise in many ways. "I guarantee
users will want to and need to transfer information between their
normal company Internet-connected computers and 'dot.secure'," he says.
"Separation is a fool's goal."

Utilities already use encrypted, password-controlled systems to
handle communication between power plants and large-scale distribution
systems.

Trying to move that traffic off the existing Internet onto an
independent computer network would be expensive, and would not
necessarily guarantee security.

"Even a private network is only so secure," said Dan Sheflin, a vice
president at Honeywell International Inc who works on grid-control
technology. "A big threat is employees walk in, unknowingly or
knowingly, with (an infected) thumb drive, plug it in, put their kids'
pictures on their PC and, oh boy, something's on the network. Those are
things that even a private network could be subject to."

Rather than building a new network, a more practical solution could be improving the security of existing systems.

"The real issue is not letting people in and having layers of defense
if they do get in to isolate them and eradicate them," said Sheflin, of
Honeywell, which makes grid components ranging from home thermostats to
automation systems to run power plants. "This is a very difficult
problem. We are up against well-funded groups who can employ many people
who spend their time trying to do this."

Greg Neichin of San Francisco-based Cleantech Group LLC, a research
firm, says utility companies already are well aware of the need to guard
their infrastructure, which can represent billions of dollars of
investment. "Private industry is throwing huge sums at this already," he
says. "What is the gain from government involvement?"

Companies ranging from Honeywell to General Electric Co -- whose
chief executive, Jeff Immelt, called the U.S. energy grid a relic last
month -- are pushing the drive toward a "smart grid."

That model would permit two-way communication between power producers
and consumers, so a utility could avoid a blackout during a peak demand
time by sending a signal to users' thermostats to turn down air
conditioning, for instance. Such a system could also allow variable
pricing -- lowering prices during off-peak demand times, which would
encourage homeowners to run major appliances like dishwashers and
washing machines in the evenings, when industrial demand declines.

Neichin is worried that efforts to wall off grid-related communication could stifle that kind of innovation.

But even Sheflin of Honeywell argues that private companies are not
likely to solve a problem of this magnitude on their own. "The
government needs to be involved in this," he said. "There is going to
have to be someone that says, 'Wait a minute, this is of paramount
importance.' I don't think it's going to be private industry that will
raise the red flag."

A Pentagon spokesman said he could not address industry concerns
right now, but the Defense Department would do so before long. Still,
the military's proposal faces other complications.

WHO'S IN CHARGE?

The U.S. Department of Homeland Security now leads efforts to secure
federal non-military systems, often described as the Internet's
"dot.gov" domain. It also has the lead in protecting critical
infrastructure. NSA and Cyber Command lend a hand when asked to do so,
including by U.S. companies seeking to button up their networks.

The idea of letting the Defense Department wall off certain
private-sector networks is highly tricky for policymakers, industry and
Pentagon planners. Among the issues: what to protect, who should be in
charge, how to respond to any attack and whether the advent of a
military gateway could hurt U.S. business's dealings overseas, for
instance for fear of Pentagon snooping.

In addition, the 1878 Posse Comitatus Act generally bars federal
military personnel from acting in a law-enforcement capacity within the
United States, except where expressly authorized by the Congress.

Alexander says the White House is considering whether to ask Congress
for new authorities as part of a revised team approach to cyber threats
that would also involve the FBI, the Department of Homeland Security
and the Defense Department.

There are persistent signs of strains between Cyber Command and the
Homeland Security Department over how to enhance the U.S. cybersecurity
posture.

"To achieve this, we have to depart from the romantic notion of
cyberspace as the Wild Wild West," Homeland Deputy Secretary Jane Lute
told the annual Black Hat computer hackers' conference in Las Vegas in
July. "Or the scary notion of cyberspace as a combat zone. The goal here
is not control, it's confidence."

Alexander made a reference to tensions during certain meetings ahead
of Cyber Storm III, a three-day exercise mounted by U.S. Homeland
Security last week with 12 other countries plus thousands of
participants across government and industry. It simulated a major cyber
attack on critical infrastructure.

"Defense Department issues versus Homeland Security issues," he told
the House of Representatives Armed Services Committee on September 23.
"And that's probably where you'll see more friction. So how much of each
do you play? How radical do you make the exercise?"

President Barack Obama's cybersecurity coordinator, Howard Schmidt,
is working with Congress and within the administration to develop
policies and programs to improve U.S. cybersecurity, says a White House
spokesman, Nicholas Shapiro.

Obama, proclaiming October National Cybersecurity Awareness Month,
said protecting digital infrastructure is a "national security
priority."

"We must continue to work closely with a broad array of partners --
from federal, state, local and tribal governments to foreign
governments, academia, law enforcement and the private sector -- to
reduce risk and build resilience in our shared critical information and
communications infrastructure," he said.

VIRTUAL CASTLE WALLS

Active defenses of the type the military would use to shield a
"dot.secure" zone represent a fundamental shift in the U.S. approach to
network defense, Lynn says. They depend on warnings from communications
intercepts gathered by U.S. intelligence.

Establishing this link was a key reasons for the creation of Cyber
Command, ordered in June 2009 by Defense Secretary Robert Gates after he
concluded that the cyber threat had outgrown the military's existing
structures.

"Policymakers need to consider, among other things, applying the
National Security Agency's defense capabilities beyond the ".gov"
domain, such as to domains that undergird the commercial defense
industry," Lynn wrote in the September/October issue of Foreign Affairs.

"The Pentagon is therefore working with the Department of Homeland
Security and the private sector to look for innovative ways to use the
military's cyber defense capabilities to protect the defense industry,"
he said.

U.S. Senator Sheldon Whitehouse, who led a Senate Intelligence
Committee cyber task force that submitted a classified report to the
panel in July, has floated a similar idea, drawing an analogy to
medieval fortresses.

"Can certain critical private infrastructure networks be protected
now within virtual castle walls in secure domains where those
pre-positioned offenses could be both lawful and effective?" he asked in
a July 27 floor speech.

"This would obviously have to be done in a transparent manner,
subject to very strict oversight. But with the risks as grave as they
are, this question cannot be overlooked," said the Rhode Island
Democrat. "There is a concerted and systematic effort under way by
national states to steal our cutting-edge technologies."

The "dot.secure" idea may be slow in getting a full congressional
airing. More than 40 bills on cyber security are currently pending. The
chairman of the House Armed Services Committee, Missouri Democrat Ike
Skelton, told Reuters he was not ready to pass judgment on possible new
powers for Cyber Command.

CYBER WARRIORS

Cyber Command leads day-to-day protection for the more than 15,000
U.S. defense networks and is designed to mount offensive strikes if
ordered to do so.

The command has already lined up more than 40,000 military personnel,
civilians and contractors under Alexander's control, nearly half the
total involved in operating the Defense Department's sprawling
information technology base.

It is still putting capabilities in place from across the military as
it rushes to reach full operational capability by the end of this
month. Reuters has pinned down the numbers involved for each service.

The Air Force component, the 24th Air Force, will align about 5,300
personnel to conduct or support round-the-clock operations, including
roughly 3,500 military, 900 civilian and 900 contractors, said
spokeswoman Captain Christine Millette. The unit was declared fully
operational on October 1, including its 561st Network Operations
Squadron based at Peterson Air Force Base, Colorado, where it operates,
maintains and defends Air Force networks.

The Navy adds about 14,000 active duty military and civilian
employees serving at information operations, network defense, space and
telecommunication facilities around the world. They are now aligned
operationally under the U.S. Fleet Cyber Command, said spokesman
Commander Steve Mavica.

The Army contributes more than 21,000 soldiers and civilians,
including the Army Intelligence and Security Command, for cyber-related
actions, said Lieutenant Colonel David Patterson, an Army spokesman.

The Marine Corps will assign roughly 800 of its forces to "pure"
cyber work, according to Lieutenant General George Flynn, deputy
commandant for combat development.

Cyber Command's headquarters staff will total about 1,100, mostly
military, under a budget request of about $150 million for the fiscal
year that started October 1, up from about $120 million the year before.

Beside guarding Defense Department computers, the nation's cyber
warriors could carry out computer-network attacks overseas with weapons
never known to have been used before.

"You can turn a computer or a power plant into a useless lump of
metal," says a former U.S. national security official familiar with the
development of U.S. cyber warfare capabilities. "We could do all kind of
things that would be useful adjuncts to a balanced military campaign."

Such weapons could blow up, say, a chemical plant by instructing
computers to raise the temperature in a combustion chamber, or shut a
hydro-electric power plant for months by sabotaging its turbines.

Scant official information is available on the development of U.S.
cyber weapons, which are typically "black" programs classified secret.
They are built from binary 1s and 0s -- bits and bytes. They may be
aimed at blinding, jamming, deceiving, overloading and intruding into a
foe's information and communications circuits.

An unclassified May 2009 U.S. Air Force budget-justification document
for Congress lifted the veil on one U.S. cyber weapon program. It
described "Project Suter" software, apparently designed to invade enemy
communication networks and computer systems, including those used to
track and help shoot down enemy warplanes.

"Exercises provide an opportunity to train personnel in combined,
distributed operations focused on the 'Find, Fix and Finish' process for
high-value targets," says the request for research, development, test
and evaluation funds.

The U.S. Air Force Space Command has proposed the creation of a
graduate-level course for "network warfare operations." The proposed
five-and-a-half-month class would produce officers to lead weapons and
tactics development "and provide in-depth expertise throughout the air,
space and cyberspace domains focused on the application of network
defense, exploitation and attack," Lieutenant Colonel Chad Riden, the
space command's Weapons and Tactics branch chief, said in an emailed
reply to Reuters.

GEORGIA ON THEIR MIND

The world got a glimpse of what lower-level cyber warfare might look
like in Estonia in 2007 and in Georgia in 2008 when cyber attacks
disrupted networks amid conflicts with Russia.

Now, the Stuxnet computer virus is taking worries about cyber warfare
to new heights as the first reported case of malicious software
designed to sabotage industrial controls.

"Stuxnet is a working and fearsome prototype of a cyber-weapon that
will lead to a new arms race in the world," said Kaspersky Lab, a
Moscow-based security software vendor. "This time it will be a cyber
arms race."

The program specifically targets control systems built by Siemens AG,
a German equipment maker. Iran, the target of U.N. sanctions over its
nuclear program, has been hit hardest of any country by the worm,
according to experts such as the U.S. technology company Symantec.

Asked about Stuxnet, U.S. Navy Vice Admiral Bernard McCullough, head
of Cyber Command's Navy component, told Reuters: "It has some
capabilities we haven't seen before."

Discovered in June, Stuxnet -- named for parts of its embedded code
-- is capable of reprogramming software that controls such things as
robot arms, elevator doors and HVAC climate control systems, said Sean
McGurk, who has studied it for the U.S. Department of Homeland Security
at an Idaho lab that grabs live viruses from the Internet and serves as a
kind of digital Petri dish.

"We're not looking right now to try to attribute where it came from,"
McGurk told reporters at the National Cybersecurity and Communications
Integration Center that he runs in Arlington, Virginia. "What we're
focusing on now is how to mitigate and prevent the spread," he said on
September 24.

And then there is China. Its cyber clout has been a growing concern
to U.S. officials amid bilateral strains over U.S. arms sales to Taiwan,
Beijing's currency policies, its territorial claims in the South China
Sea and other irritants.

Beijing appears to have thoroughly pierced unclassified U.S.
government networks, said Dmitri Alperovitch, who heads Internet-threat
intelligence analysis and correlation for McAfee, a software and
security vendor that counts the Pentagon among its clients.

"In the U.S. when you're sending an email over an unclassified system
you might as well copy the Chinese on that email because they'll
probably read it anyway because of their pretty thorough penetration of
our network," he says.

Still, Chinese cyber capabilities lag those of the United States,
Russia, Israel and France in that order, adds Alperovitch. He headed
McAfee's investigation into Aurora, a codename for a cyber espionage
blitz on high-tech Western companies that led Google to recast its
relationship with China earlier this year.

Cyber arms entail "high reward, low risk" says Jeffrey Carr, a
consultant to the United States and allied governments on Russian and
Chinese cyber warfare strategy and tactics.

Lynn, the deputy defense secretary steering the military's cyber
overhaul, went to Brussels on September 14 to brief NATO allies on U.S.
cyber defense initiatives. He encouraged them to take action to secure
NATO networks, said Bryan Whitman, a Pentagon spokesman.

Some U.S. computer defenses are already linked with those of its
allies, notably through existing intelligence-sharing partnerships with
Britain, Canada, Australia and NATO. But "far greater levels of
cooperation" are needed to stay ahead of the threat, Lynn says.

NATO's secretary-general, Anders Fogh Rasmussen, "believes that this
is a growing problem and that it can reach levels that can threaten the
fundamental security interests of the alliance," NATO spokesman James
Appathurai said.

A Rasmussen-compiled draft of a new NATO vision statement is due to
be approved by NATO states at a November 19-20 summit in Lisbon and will
endorse a more prominent cyber defense role for the alliance.

They all agree that castle walls alone are no longer an option.

(Additional reporting by Jim Finkle and Scott Malone in Boston; David Brunnstrom in Brussels; editing by Jim Impoco and Claudia Parsons)

Share This Article

More in: