Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
The Military Networking Security

NSA Takes On West Point In Security Exercise 140

Wired is running a story about a recent security exercise in which the NSA attacked networks set up by various US military academies. The Army's network scored the highest, put together using Linux and FreeBSD by cadets at West Point. Quoting: "Even with a solid network design and passable software choices, there was an element of intuitiveness required to defend against the NSA, especially once it became clear the agency was using minor, and perhaps somewhat obvious, attacks to screen for sneakier, more serious ones. 'One of the challenges was when they see a scan, deciding if this is it, or if it's a cover,' says [instructor Eric] Dean. Spotting 'cover' attacks meant thinking like the NSA -- something Dean says the cadets did quite well. 'I was surprised at their creativity.' Legal limitations were a surprising obstacle to a realistic exercise. Ideally, the teams would be allowed to attack other schools' networks while also defending their own. But only the NSA, with its arsenal of waivers, loopholes, special authorizations (and heaven knows what else) is allowed to take down a U.S. network."
This discussion has been archived. No new comments can be posted.

NSA Takes On West Point In Security Exercise

Comments Filter:
  • by gbutler69 ( 910166 ) on Sunday May 11, 2008 @09:46AM (#23368666) Homepage
    No, the NSA IS NOT part of the DOD. DOD is Department of Defense. There are 3 to 4 branches, depending on how you count: Army, Navy(Marines), Air Force. Yes, technically "The Marines" are part of the Navy.
  • West Point Club (Score:2, Informative)

    by Dak RIT ( 556128 ) on Sunday May 11, 2008 @09:52AM (#23368698) Homepage

    This isn't really an official extension of West Point, but rather a club at West Point known as SIGSAC.

    The club's members every year get a chance to visit the NSA and see some rather interesting stuff, and so has a rather good relationship with the NSA in general.

    The club itself operates out of West Point but has a network connection that isn't attached to West Point's network. It has actually participated in contests in the past as well with other schools/groups, so unless something's changed in the past couple years, that part of the summary is incorrect. If I had to wager a guess I'd say the focus of the group is just being directed purely at defensive measures, rather than actual attacks.

  • by ozmanjusri ( 601766 ) <aussie_bob@hotmail . c om> on Sunday May 11, 2008 @10:05AM (#23368782) Journal
    i cant find any mention of that and i got the impression they were using a Linux & BSD based system?

    But the kernel-level rootkit was much more dangerous. This stealthy operating-system hijacker can open unseen "back doors" into even highly protected networks. When they detected the rootkit's "calls home" the cadets launched Sysinternal's security software to find the hijacker, then they manually scoured the workstation to find the unwelcome executable file.
    Since the article says the West Point team was running Linux/BSD, and specifically mentions that the cadets were running a "Fedora Core 8 Web server", I'm guessing the Windows system was being run by one of the other teams.

    Frankly, I was underwhelmed by the whole story. It was pretty clear the journo doesn't have a clue what was going on. Wired should be able to do better than that.

  • by SoapBox17 ( 1020345 ) on Sunday May 11, 2008 @10:06AM (#23368786) Homepage
    According to wikipedia [wikipedia.org], "The National Security Agency/Central Security Service (NSA/CSS) is a cryptologic intelligence agency of the United States government, administered under the U.S. Department of Defense. " and "The Department includes the Army, Navy, Air Force, Marine Corps, as well as non-combat agencies such as the National Security Agency and the Defense Intelligence Agency."

    Under Secretary of Defense for Intelligence
    * Defense Intelligence Agency
    * Defense Security Service
    * Counterintelligence Field Activity
    * National Geospatial-Intelligence Agency
    * National Reconnaissance Office
    * National Security Agency


  • by Anonymous Coward on Sunday May 11, 2008 @10:13AM (#23368838)
    I was actually part of the exercise, and I would agree that the article is very vague. The main purpose of the exercise was to help cadets learn best security practices of building a network. There were required services we had to run, such as exchange, a web server, DNS, active directory, and a jabber messaging server. The rootkit they speak of was on the box because the other part of the exercise was trying to secure untrusted computers. They riddled two Windows VMs and one Linux VM with as much stuff as they could, and the told us to secure them. Naturally we missed some things, which allowed the callback to go out.

    As for the 'custom tools', I have no idea what they are talking about. We used native Windows logging and a few open source programs to pull logs to a log server, but that was about it for extra programs. I would agree that the article was written for the non-technical person, but those are the kinda of questions they were asking us when the reporter was here.
  • Re:West Point Club (Score:5, Informative)

    by Pinbll ( 1287458 ) on Sunday May 11, 2008 @10:31AM (#23368970)
    Although SIGSAC was involved, this was done for the Information Assurance class that is taught by the CS department there. This was the culminating exercise. The course teaches security practices, and gives cadets a look into why it is important to program securely.
  • by AHuxley ( 892839 ) on Sunday May 11, 2008 @10:45AM (#23369044) Journal
    Read up on the "Millenium Challenge '02" war games.
    Opposing Force Commander, Gen. Paul van Ripen won.
    He was not invited back :-)
    Cadets do not learn, they just get to press the "refloat" icon.
    http://www.nytimes.com/2008/01/12/washington/12navy.html?ex=1357794000&en=a4dbb42d5ad2a700&ei=5088&partner=rssnyt&emc=rss [nytimes.com]
    "The sheer numbers involved overloaded their ability, both mentally and electronically, to handle the attack,.. "
  • ENDEX (Score:2, Informative)

    by sciop101 ( 583286 ) on Sunday May 11, 2008 @10:55AM (#23369094)
    Every agency/party involved in the exercise will publish an ENDEX (End of Exercise) report.

    IF Asked AND IF Unclassified, the agency/party MAY provide a copy of the ENDEX.

    Contact the Acadamies, NSA, even the Departments of Defense, Army, Air Force, Navy.

    ENDEX's have event logs, referee notes, exercise build and teardown plans....

  • Re:Curious (Score:4, Informative)

    by Pinb4ll ( 1287468 ) on Sunday May 11, 2008 @11:36AM (#23369384)
    The tools we used were Nagios for service verification on an external computer (just to make sure we saw what the scorers saw, so we didn't lose points due to their slow network) and one box running Snort through a one way cable. We weren't allowed to let Snort block things, but it let us know who was doing what, allowing us to send up a request to the graders to block the IP. As for checking the untrusted boxes, we were able to run whatever we wanted on them. The root kit that we missed we simply didn't find in the mess of everything else.
  • Re:Rules? (Score:3, Informative)

    by Pinb4ll ( 1287468 ) on Sunday May 11, 2008 @01:30PM (#23370042)
    It all came down to the scenario. Built into the game was a notional 'cost' for different network items, making certain items prohibitively expensive. It mainly came down to the semantics of the rules, but the costs were going to be looked at for next year. The overall effect was eliminating the use of some best practices simply because of cost.
  • Re:Academy academics (Score:1, Informative)

    by Anonymous Coward on Sunday May 11, 2008 @05:30PM (#23371740)

    I've heard the Air Force is the leading branch for network stuff, so I'm surprised the Army did well.
    Heh. In the exercise this year, the Air Force team actually had the worst performance of all. The Coast Guard Academy and the Merchant Marine Academy both put in better performances.
  • by Anonymous Coward on Sunday May 11, 2008 @05:37PM (#23371786)
    I was also in the exercise... from the NSA side ;) (I have to post anonymously). I agree that the article IS very lean on details (as it should be), and geared toward a somewhat nontechnical audience. I have a different perspective from what the cadets at the USMA saw, as I experienced it from the opposition side.

    The network directive given out to the academies had stipulation they had to follow, and a scenario that reflected real world situations (the cadets were setting up a network that included VMs of computers they HAD to include in their network). The network directive also had costs associated with anything the cadets wanted to do. So if they wanted to park a cadet at a Snort terminal for the duration of the exercise, that had a cost associated with it, as did setting up VLANS, using IPSEC, other IDS sensors, firewalls, host/service monitors, etc. Each academy had to submit their network structure for review and approval prior to STARTEX. The scenario reflects real world situations that would come up in most operations that involve other allied nations.

    The NSA was strictly there to attack the networks and document any exploits they succeeded with. I can't go into details as to what our Rules of Engagement were, but suffice to say that we met with success with every school that was actually scored (the two graduate schools that participated were not scored).

    The whole goal of the exercise is to prepare the cadets for SECURING a network against information security threats. It is a DEFENSIVELY ORIENTED exercise. The cadets don't do any hacking (and I honestly think that unless a gifted or experienced cadet was at an academy with the skills to do a network penetration, they would not meet with much success).

  • by Stickney ( 715486 ) on Sunday May 11, 2008 @06:35PM (#23372268) Homepage

    "Fedora Core 8 Web server", I'm guessing the Windows system was being run by one of the other teams.
    Yes, we ran a Fedora 8 LAMP server, but we were also required to run a Windows domain controller, an exchange server, and a Windows DNS server, along with two XP user workstations. The rest of our network, to including logging, traffic monitoring, and XMPP services, ran on FreeBSD (our choice). You're right though; not many of the reporters grasped much of what was going on.

This file will self-destruct in five minutes.

Working...