Cyberwar
Basic TrainingComputers, indispensable in peace, are becoming ever more important in political conflicts and open warfare. This is the third article in a series on the growing use of computer power as a weapon.
Notes from a Puerto Rican expatriate in the USA. A bit about everything: books, science and technology, arts, travel, music, and --of course-- politics ! Notas de un puertorriqueño expatriado en los EEUU. Un poco de todo: libros, ciencia y tecnología, artes, viajes, música, y --desde luego-- ¡política!
This is the new face of war ... http://www.nytimes.com/2009/05/11/technology/11cybergames.html?fta=y Cyberwar Cadets Trade the Trenches for FirewallsMichael Falco for The New York Times By COREY KILGANNON and NOAM COHEN Published: May 10, 2009 WEST POINT, N.Y. — The Army forces were under attack. Communications were down, and the chain of command was broken. CyberwarBasic TrainingComputers, indispensable in peace, are becoming ever more important in political conflicts and open warfare. This is the third article in a series on the growing use of computer power as a weapon. RelatedCyberwar: Iranians and Others Outwit Net Censors (May 1, 2009)Cyberwar: U.S. Steps Up Effort on Digital Defenses (April 28, 2009)Pacing a makeshift bunker whose entrance was camouflaged with netting, the young man in battle fatigues barked at his comrades: “They are flooding the e-mail server. Block it. I’ll take the heat for it.” These are the war games at West Point, at least last month, when a team of cadets spent four days struggling around the clock to establish a computer network and keep it operating while hackers from the National Security Agency in Maryland tried to infiltrate it with methods that an enemy might use. The N.S.A. made the cadets’ task more difficult by planting viruses on some of the equipment, just as real-world hackers have done on millions of computers around the world. The competition was a final exam of sorts for a senior elective class. The cadets, who were computer science and information technology majors, competed against teams from the Navy, Air Force, Coast Guard and Merchant Marine as well as the Naval Postgraduate School and the Air Force Institute of Technology. Each team was judged on how well it subdued the threats from the N.S.A. The cyberwar games at West Point are just one example of a heightened awareness across the military that it must treat the threat of a computer attack as seriously as it does an attack carried out by a bomber or combat brigade. There is hardly an American military unit or headquarters that has not been ordered to analyze the risk of cyberattacks to its mission — and to train to counter them. If the hackers were to succeed, they could change information on the network and cripple Internet communications. In the desert outside Las Vegas, in a series of inconspicuous trailers, some of the most highly motivated hackers in the United States spend their days and nights probing the military’s vast computer networks for weaknesses to exploit. These hackers — many of whom got their start as teenagers devoted to computer screens in their basements — have access to the latest in attack software. Some of it was developed by cryptologists at the N.S.A., the nation’s largest intelligence agency, where most of the government’s talent for breaking and making computer codes resides. The hackers have an official name — the 57th Information Aggressor Squadron — and a real home, Nellis Air Force Base. The Army last year created its own destination for computer experts, the Network Warfare Battalion, where many of the cadets in the cyberwar games hope to be assigned. But even so, the ranks are still small. The Defense Department today graduates only 80 students a year from its cyberwar schools, causing Defense Secretary Robert M. Gates to complain that the Pentagon is “desperately short of people who have capabilities in this area in all the services, and we have to address it.” Under current Pentagon budget proposals, the number of students cycled through the schools will be quadrupled in the next two years. Part of the Pentagon’s effort to increase the military’s capabilities are the annual cyberwar games played at the nation’s military academies, including West Point, where young cadets in combat boots and buzz cuts talk megabytes instead of megatons on a campus dotted with statues of generals, historic armaments and old stone buildings. While the Pentagon has embraced the need for offensive cyberwarfare, there were no offensive maneuvers in the games last month, said Col. Joe Adams, who teaches Information Assurance and stood at the head of the classroom during the April exercise. Cadet Joshua Ewing said he and his fellow Blue Team members “learn all the techniques that a hacker would do, and we try to beat a hacker.” These strategies are not just theoretical. Most of these cadets will soon be sent to Afghanistan to carry out such work, Cadet Ewing said. When the military deploys in a combat zone or during a domestic emergency, establishing a secure Internet connection is an early priority. To keep things humming, the military’s experts must fend off the ordinary chaos of the Internet as well as attacks devised to disable the communications system, like flooding e-mail servers with so many junk messages that they collapse. Underscoring how seriously the cadets were taking the April games, the sign above the darkened entranceway in Thayer Hall read “Information Warfare Live Fire Range” and the area was draped with camouflage netting. One group had to retrieve crucial information from a partly erased hard drive. One common method of hiding text, said Cadet Sean Storey, is to embed it in digital photographs; he had managed to find secret documents hidden this way. He was seeking a password needed to read encrypted e-mail he had located on the hard drive. Other cadets worked in tandem, as if plugging a leaky dam, to keep the entire system working as the N.S.A. hackers attacked the engine that runs a crucial database as well as the e-mail server. They shouted out various Internet addresses to inspect — and usually block — after getting clearance from referees. And there was that awkward moment when the cadet in charge, Salvatore Messina, had to act without clearance because the attack was so severe he couldn’t even send an e-mail message. The cadets in this room do get their share of ribbing. But one cadet, Derek Taylor, said today’s soldiers recognize that technological expertise can be as vital as brute force in saving lives. West Point takes the competition seriously. The cadets who helped install and secure the operating system spent a week setting it up. The dean gives a pep talk; professors bring food. Brian McCord, part of the team that installed the operating system, said he was chosen because his senior project was deeply reliant on Linux. The West Point team used this open-source operating system, freely available on the Internet, instead of relying on proprietary products from big-name companies like Microsoft or Sun Microsystems. “It seems weird for the Army with its large contracts to be using Linux, but it’s very cheap and very customizable,” Cadet McCord said. It is also much easier to secure because “you can tweak it for everything you need” and there are not as many known ways to attack it, he said. West Point emerged victorious in the games last month. That means the academy, which has won five of the last nine competitions, can keep the Director’s Cup trophy, which is displayed near a German Enigma encoding machine from World War II. Cracking the Enigma code helped the Allies win the war, and the machine is a stark reminder of the pivotal role of technology in warfare. Thom Shanker contributed reporting from Washington. This article has been revised to reflect the following correction: Correction: May 13, 2009
|
http://www.nytimes.com/2009/05/31/us/31cyber.html?_r=1&em=&pagewanted=all May 31, 2009 Cyberwar Contractors Vie for Plum Work, Hacking for U.S.By CHRISTOPHER DREW and JOHN MARKOFF MELBOURNE, Fla. — The government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The exotic nature of the work, coupled with the deep recession, is enabling the companies to attract top young talent that once would have gone to Silicon Valley. And the race to develop weapons that defend against, or initiate, computer attacks has given rise to thousands of “hacker soldiers” within the Pentagon who can blend the new capabilities into the nation’s war planning. Nearly all of the largest military companies — including Northrop Grumman, General Dynamics, Lockheed Martin and Raytheon — have major cyber contracts with the military and intelligence agencies. The companies have been moving quickly to lock up the relatively small number of experts with the training and creativity to block the attacks and design countermeasures. They have been buying smaller firms, financing academic research and running advertisements for “cyberninjas” at a time when other industries are shedding workers. The changes are manifesting themselves in highly classified laboratories, where computer geeks in their 20s like to joke that they are hackers with security clearances. At a Raytheon facility here south of the Kennedy Space Center, a hub of innovation in an earlier era, rock music blares and empty cans of Mountain Dew pile up as engineers create tools to protect the Pentagon’s computers and crack into the networks of countries that could become adversaries. Prizes like cappuccino machines and stacks of cash spur them on, and a gong heralds each major breakthrough. The young engineers represent the new face of a war that President Obama described Friday as “one of the most serious economic and national security challenges we face as a nation.” The president said he would appoint a senior White House official to oversee the nation’s cybersecurity strategies. Computer experts say the government is behind the curve in sealing off its networks from threats that are growing more persistent and sophisticated, with thousands of intrusions each day from organized criminals and legions of hackers for nations including Russia and China. “Everybody’s attacking everybody,” said Scott Chase, a 30-year-old computer engineer who helps run the Raytheon unit here. Mr. Chase, who wears his hair in a ponytail, and Terry Gillette, a 53-year-old former rocket engineer, ran SI Government Solutions before selling the company to Raytheon last year as the boom in the military’s cyberoperations accelerated. The operation — tucked into several unmarked buildings behind an insurance office and a dentist’s office — is doing some of the most cutting-edge work, both in identifying weaknesses in Pentagon networks and in creating weapons for potential attacks. Daniel D. Allen, who oversees work on intelligence systems for Northrop Grumman, estimated that federal spending on computer security now totals $10 billion each year, including classified programs. That is just a fraction of the government’s spending on weapons systems. But industry officials expect it to rise rapidly. The military contractors are now in the enviable position of turning what they learned out of necessity — protecting the sensitive Pentagon data that sits on their own computers — into a lucrative business that could replace some of the revenue lost from cancellations of conventional weapons systems. Executives at Lockheed Martin, which has long been the government’s largest information-technology contractor, also see the demand for greater computer security spreading to energy and health care agencies and the rest of the nation’s critical infrastructure. But for now, most companies remain focused on the national-security arena, where the hottest efforts involve anticipating how an enemy might attack and developing the resources to strike back. Though even the existence of research on cyberweapons was once highly classified, the Air Force plans this year to award the first publicly announced contract for developing tools to break into enemy computers. The companies are also teaming up to build a National Cyber Range, a model of the Internet for testing advanced techniques. Military experts said Northrop Grumman and General Dynamics, which have long been major players in the Pentagon’s security efforts, are leading the push into offensive cyberwarfare, along with the Raytheon unit. This involves finding vulnerabilities in other countries’ computer systems and developing software tools to exploit them, either to steal sensitive information or disable the networks. Mr. Chase and Mr. Gillette said the Raytheon unit, which has about 100 employees, grew out of a company they started with friends at Florida Institute of Technology that concentrated on helping software makers find flaws in their own products. Over the last several years, their focus shifted to the military and intelligence agencies, which wanted to use their analytic tools to detect vulnerabilities and intrusions previously unnoticed. Like other contractors, the Raytheon teams set up “honey pots,” the equivalent of sting operations, to lure hackers into digital cul-de-sacs that mimic Pentagon Web sites. They then capture the attackers’ codes and create defenses for them. And since most of the world’s computers run on the Windows or the Linux systems, their work has also provided a growing window into how to attack foreign networks in any cyberwar. “It takes a nonconformist to excel at what we do,” said Mr. Gillette, a tanned surfing aficionado who looks like a 1950s hipster in his T-shirts with rolled-up sleeves. The company, which would allow interviews with other employees only on the condition that their last names not be used because of security concerns, hired one of its top young workers, Dustin, after he won two major hacking contests and dropped out of college. “I always approach it like a game, and it’s been fun,” said Dustin, now 22. Another engineer, known as Jolly, joined Raytheon in April after earning a master’s degree in computer security at DePaul University in Chicago. “You think defense contractors, and you think bureaucracy, and not necessarily a lot of interesting and challenging projects,” he said. The Pentagon’s interest in cyberwarfare has reached “religious intensity,” said Daniel T. Kuehl, a military historian at the National Defense University. And the changes carry through to soldiers being trained to defend and attack computer and wireless networks out on the battlefield. That shift can be seen in the remaking of organizations like the Association of Old Crows, a professional group that includes contractors and military personnel. The Old Crows have deep roots in what has long been known as electronic warfare — the use of radar and radio technologies for jamming and deception. But the financing for electronic warfare had slowed recently, prompting the Old Crows to set up a broader information-operations branch last year and establish a new trade journal to focus on cyberwarfare. The career of Joel Harding, the director of the group’s Information Operations Institute, exemplifies the increasing role that computing and the Internet are playing in the military. A 20-year veteran of military intelligence, Mr. Harding shifted in 1996 into one of the earliest commands that studied government-sponsored computer hacker programs. After leaving the military, he took a job as an analyst at SAIC, a large contractor developing computer applications for military and intelligence agencies. Mr. Harding estimates that there are now 3,000 to 5,000 information operations specialists in the military and 50,000 to 70,000 soldiers involved in general computer operations. Adding specialists in electronic warfare, deception and other areas could bring the total number of information operations personnel to as many as 88,700, he said. |
A
The decision Monday helps spur Apple's plans to expand its network of data centers, which are warehouse-sized buildings that house vast numbers of giant computers known as servers. Data centers are usually used to manage the flow of Internet traffic. In Apple's case, the Maiden data center could be used to bolster its iTunes music store business.
"We're looking forward to building a new data in
Apple has already agreed to invest
"There is no commitment beyond the billion dollars," said
Apple shares are up 1.7% to
-By
(END) Dow Jones Newswires07-07-09 1249ET
Copyright (c) 2009 Dow Jones & Company, Inc.
The announcement of Google's Chrome OS plan puts an exclamation point on the challenge faced by Microsoft, but actually doesn't really change the core threat to Microsoft.
In short, Google is aiming to render desktop software irrelevant. To thwart them, Microsoft needs Windows to do things that a browser can't--or do the same things significantly better.
Interestingly, if Microsoft wants some tips on how to do this, it might want to look toward Apple. Essentially, this has been Apple's challenge all along: make the Mac experience enough better than a generic PC that it is worth the added cost.
The Mac's resurgence came when it had a strong OS--Mac OS X--combined with iLife applications that really nailed the experience for the tasks that people wanted to do on their computer at the time.
This is an area where Windows has been languishing in recent years. Although most people wouldn't want to give up their favorite desktop applications (Windows or Mac), the Web has been gaining ground. Even areas that were once squarely in the desktop's domain--such as photo editing, productivity software, and personal finance--are making their way onto the Web. What Windows really needs is a new generation of killer apps.
Microsoft also has to do something that Apple doesn't--aim for the masses. Part of Apple's success story has been about choosing its battles and accepting that it can't win everywhere. The Windows model depends on ubiquity, so it needs answers with nearly universal appeal.
One area where Microsoft has been investing is around the area of doing the same things better. Its focus on touch screens in Windows 7 is an example of this. Although multitouch is likely to remain a niche in the short term, it shows the power that a desktop interface can have.
Microsoft also needs to minimize the downsides associated with Windows. On that score, Microsoft has made significant strides with Windows 7. The operating system boots quicker and behaves better than its predecessor.
On the Office side, Microsoft needs to create software that is enough better than Google's that companies want to pay for it.
Next week, Microsoft is expected to talk more about Office 2010, the next version of Office, which is due out next year. Microsoft is taking a two-pronged approach.
First, it is taking Google Apps head-on with lightweight browser-based versions of Word, Excel, PowerPoint, and OneNote that can run on Safari, Firefox, and Internet Explorer.
It will offer them to consumers via its Windows Live service--a service that today is free--and businesses will also be able to give the browser-based apps to their workers.
But Microsoft is also doing more on the desktop, adding in the kinds of features it hopes will make the Office suite worth paying for.
The path for Microsoft is clear. The big question, though, is whether Google will be able to be "good enough."
Microsoft has some time, but not a ton. Google's operating system won't even arrive on PCs until the second half of next year. Plus, for now, Windows has the advantage of legacy application support--i.e., businesses and consumers want to run their existing programs. But to stay in front for years to come, it will have to do better than that. It needs to figure out--and quick--the next set of tasks users want to do with their computer and how to make those tasks demonstrably better on a PC.
The company also has another option as well. It can work on Windows' successor. It could be that it needs a lightweight browser-based OS of its own.
Indeed, the thinking beyond its Gazelle research project is that the browser needs to be more like an operating system. In that case, the browser doesn't actually take on the operating system's complete role, but rather relies on Windows. However, Microsoft has other operating system work under way as well, including its top-secret Midori project.
My guess is Microsoft will take both approaches, but hold off on the latter unless and until it needs to. That's pretty much what Microsoft has done with Office vis-a-vis Google Apps. It was only after large business customers started threatening to go to Google Apps that Microsoft conceded that it needed to offer full-on browser apps.