Archive for the ‘NSA’ Category

Mysterious group posts more alleged NSA hacking tools; Russia link suspected – Wichita Eagle

Mysterious group posts more alleged NSA hacking tools; Russia link suspected
Wichita Eagle
One document appeared to show that NSA spyware had been placed on servers in South Korea, Russia, Japan, China, Mexico, Taiwan, Spain, Venezuela and Thailand, among other countries. The dump included details of how the NSA purportedly had ...

More:
Mysterious group posts more alleged NSA hacking tools; Russia link suspected - Wichita Eagle

In slap at Trump, Shadow Brokers release NSA EquationGroup files – Ars Technica

On April 8, as part of a long, awkwardly worded rant about President Donald Trump's betrayal of his "base," the individual or individuals known as the Shadow Brokers posted the password to an encrypted archive containing what appear to be components of a toolkit associated with the National Security Agency's alleged Equation Group hacking campaign. But those hoping for even more spectacular exploits than those leaked earlier by the Shadow Brokers willlikely be disappointed. However, the files do include a number of tools that may still be usable, as well as significant amounts of information about systems that appear to have been hacked by the NSA.

Many information security analysts were unimpressed.

The archive, which the Shadow Brokers previously attempted to auction off, contains just over 300MB of files. It does not appear to contain the entire archive of Equation Group tools. Many of the tools apparently date back to the 1990s, targeting platforms like the Digital Equipment Corp., Alpha, Sun Solaris 2, the defunct Chinese Red Flag Linux, and other older Linux distributions. Other tools are apparently focused on telecom targets, including tools for getting into GSM cellular networks and breaking DES encryption.

The dates rangebetween August of 2000 and August of 2010, referencing code names including Incision, Orangutan, Reticulum, Jackladder, and Patchicillin.Based on the files, a majority of the systems targeted appear to be Sun Solaris systems running on SPARC architecture.

The post from Shadow Brokers, entitled "Don't Forget Your Base," is (like previous posts) in strangely wordedEnglish and delivers a white-supremacist, isolationist, anti-"globalist" message, offering "constructive criticism" on Trump's recent policy moves, including the strike on Syria, and offering the password to the encrypted archive previously upfor auction as "our form of protest."

Ars is continuing to examine the contents of the files and will post a more complete report soon.

Go here to see the original:
In slap at Trump, Shadow Brokers release NSA EquationGroup files - Ars Technica

NSA gives military students a leg up on cyber with real-time exercise … – FederalNewsRadio.com

The National Security Agency is amping up its game when it comes to challenging young, college-age students in military academies on their cyber skills.

The agency is hosting its 17th annual Cyber Defense Exercise (CDX), but with a few new twists.

The exercise challenges students at the U.S. Military, Naval, Coast Guard and Merchant Marine academies, as well as undergraduate and graduate students from the Royal Military College of Canada.

Their mission is to defend networks they have created from a red team comprised of U.S., Canadian and industry cyber warriors.

Sponsored Content: Why Governance, Risk and Compliance is Everyones Business - Download the Executive Brief Today.

Along with defending the network, the teams have certain challenges they need to secure as well.

What this does is challenges them to look into forensics and see where malware lies and where things happen, said James Titcomb technical lead for CDX said April 12.

The challenges consist of reverse engineering and malware analysis, network forensics, offensive ethical hacking and control of a simulated drone.

The graduate students are testing two new challenges that involve securing a space satellite and an unmanned ground vehicle.

This year whats new is we have two cadets from the Air Force academy participating in the red team, said Shirley McMonigle, CDX program lead. This is also the first year the undergraduates will participate in the drone challenge.

This year teams will have to deal with ransomeware as well. The teams can either pay points to get out of the hack or try to fix it.

March TSP returns: In like a lamb, out like a lion

Teams are scored on network confidentiality, usability, integrity and on the challenges.

NSA uses a red team to interfere with students networks and their ability to complete the challenges. Much of the intrusions find their way into the students networks through a gray team, which acts as a network user.

The gray team may fall for social engineering tactics.

Most of our access is done through the gray cell. We call it the user that clicks on everything. What we do is we purposely throw things and have the gray cell open those links so that we can own their work stations. [The teams] have to go in and mitigate that, Titcomb said.

The red teams are a way for those in the military to keep their skills sharp too.

Air Reservist Lt. Tim Li said he works in cybersecurity for J.P. Morgan. He said acting as a hacker helps him understand the other side of the cybersecurity coin.

Its fun, its the opposite for me of what I do on the outside. Its learning what the attacker would do, so it will definitely be beneficial for me once I return to my civilian job, Li said.

The students embedded this year with the red team said they were taking in a lot from the experience.

Nick Co, a 22-year-old midshipman, said he could see himself working for U.S. Cyber Command or the NSA at some point in the future.

Thats good news for the military, which is strapped for people with cyber talent in the service.

I think for us some of it is trying to understand the basics first. We are still hugely learning, but we know that the field is really growing and we definitely know they could use some officers out there, Co said. These guys are the real professionals so its fun to really learn from them and take this back and hopefully when we graduate implement this.

Read more here:
NSA gives military students a leg up on cyber with real-time exercise ... - FederalNewsRadio.com

Mysterious group posts more alleged NSA hacking tools; Russia link suspected – News & Observer


Ars Technica
Mysterious group posts more alleged NSA hacking tools; Russia link suspected
News & Observer
One document appeared to show that NSA spyware had been placed on servers in South Korea, Russia, Japan, China, Mexico, Taiwan, Spain, Venezuela and Thailand, among other countries. The dump included details of how the NSA purportedly had ...
In slap at Trump, Shadow Brokers release NSA EquationGroup filesArs Technica
'NSA malware' released by Shadow Brokers hacker groupBBC News
Shadow Brokers slam Trump, expose additional NSA cyber toolsSC Magazine
Forbes -TechCrunch -InfoWorld -Medium
all 55 news articles »

Go here to read the rest:
Mysterious group posts more alleged NSA hacking tools; Russia link suspected - News & Observer

To Split or Not to Split: The Future of CYBERCOM’s relationship with NSA – Lawfare (blog)

U.S. Cyber Command (CYBERCOM) is the U.S. armed forces command charged with offensive and defensive cyber operations. Since 2010, it has coexisted with NSA as two organizations under one director. It is simultaneously embedded within U.S. Strategic Command (STRATCOM), a functional (i.e., non-geographic) command with broader responsibility for detecting and deterring strategic attacks against the United States. Both arrangements are likely coming to an end in the near future.

In a move set up by the 2017 National Defense Authorization Act (NDAA), CYBERCOM will be elevated from a sub-unified command under STRATCOM to a fully independent unified combatant command. The 2017 NDAA also maintains a more hotly contested opportunity for CYBERCOM to be split from the NSA as early as October 2018.

Below is a brief primer on those two impending issues.

The Debate over Splitting CYBERCOM from NSA

Defense Secretary Jim Mattiss deputy principal cyber advisor, Maj. Gen. Burke Ed Wilson, recently said that he is 99 percent sure well elevate [CYBERCOM to a full combatant command] and do it fairly quickly.

Cutting the umbilical cord from NSA may be a longer process, but momentum seems strong within the new administration. In the 2017 NDAA, Congress mandated that CYBERCOM must reach full operational capacity (FOC) before the dual-hat leadership arrangement can be terminated. FOC is achieved when a command has the institutional capability and expertise to independently carry out any mission within its ambit of responsibility. CYBERCOM reached initial operational capabilitya threshold level of capability to accomplish mission objectiveslast October and is on track to reach FOC by the end of fiscal year 2018. Once the Secretary of Defense and the Chairman of the Joint Chiefs of Staff determine that the separation will not pose risks to the military effectiveness of CYBERCOM, the president may decide to initiate the split.

CYBERCOM was created as a sub-unified command within U.S. Strategic Command in 2009, absorbing the Joint Task Force for Global Network Operations and the Joint Functional Component Command for Network Warfare. Its mission has both defensive and offensive components. Per a Department of Defense fact sheet:

USCYBERCOM plans, coordinates, integrates, synchronizes, and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

The decision to locate CYBERCOM at the NSA headquarters in Fort Meade was a logical choice at the commands inception. NSA ensured that CYBERCOM had the necessary resources, infrastructure, and expertise with signals intelligence to develop its own capabilities. Though CYBERCOMs mission is distinct from that of NSA, many of the tools needed to conduct cyber operations are virtually the same as those necessary for cyber surveillance and espionage. As former NSA Director General Michael Hayden puts it, in the cyber domain the technical and operational aspects of defense, espionage, and cyberattack are frankly indistinguishable. Moreover, similar skillsets are required for NSA and CYBERCOM activities, and personnel with the appropriate levels of expertise are reportedly in short supply.

Despite significant technological overlap, NSA and CYBERCOM largely operate under different legal authorities. NSAs authority to conduct espionage, including cyber surveillance, comes from Title 50 of the U.S. code, while CYBERCOM would typically take offensive action pursuant to Title 10 authorities. General Hayden explains: NSA does not have the authority to destroy someone elses information, to change someone elses information, to harm someone elses network, or to take control of someone elses computers in order to create physical destruction, as these actions constitute a warmaking Title 10 function. However, NSA personnel may conduct intelligence gathering to support a Title 10 military operation, and existing law does not preclude CYBERCOM from conducting a Title 50 operation. Dual-hatting personnel between the two organizations, as has become common practice, further muddies the unclear line between Title 10 and Title 50 authorizations. Though this close coordination has benefits, there are concerns about mission distortion. A presidential panel convened by President Obama to evaluate the NSA after the Snowden leaks reported a pressing need to clarify the distinction between the combat and intelligence collection missions, and recommended appointing separate heads to remedy this line-blurring problem.

Supporters of the split also point to other potential advantages. The creation of a fully independent command dedicated to cyber operations denotes a level of seriousness and dedication to the development of U.S. cyber capabilities appropriate for an era in which cyber offense and defense are critical to U.S. national security interests. For some in the government, the slow pace at which CYBERCOM has developed effective offensive tools has been a source of frustration, particularly as the military tackles threats like ISIS. Some predict that an independent CYBERCOM would be better positioned to aggressively, and sometimes more openly, pursue its mission, particularly for situations in which military and intelligence goals may be unaligned. For example, it might be of strategic benefit that a Title 10 action be attributable to the United States, whereas for intelligence purposes, avoiding detection for the same action is essential. In addition, a commander dedicated solely to cyber military operations may be able to advocate more effectively for resources and personnel than would be possible in a dual-hatted role, and CYBERCOM has struggled with resource constraints under current joint leadership. The separation could also allow CYBERCOM-dedicated personnel to specialize and develop advanced cyber capabilities. Finally, there is the simple fact that leading either of these organizations alone is a more than fulltime job and it is untenable to expect a single person to accomplish both simultaneously.

Others, however, have argued that the benefits of shared infrastructure and dual-hatting NSA and CYBERCOM employees outweigh any gains from separation. Even assuming CYBERCOM reaches FOC by October 2018, there are questions about the additional resources, financing, and capabilities that would need to come online such that CYBERCOM could be weaned off of its reliance on NSA. Some key players, including Senator John McCain, argue that it would be foolish to separate organizations that must be closely coordinated to ensure success. The NSA has the advantage of over 50 years of experience with signals intelligence, which will continue to be the foundation for seven-year-old CYBERCOMs operations even after the separation. Furthermore, it takes far longer than the typical three-year military billet to develop the expertise needed to conduct cyber operations. In addition, dividing responsibility between two wholly separate cyber-focused entities increases the risk that they will work at cross-purposes.

Steps Towards a Unified, Separate CYBERCOM

Notwithstanding these concerns, separating NSA from CYBERCOM has become more a question of when rather than if. As mentioned above, the 2017 NDAA establishes that CYBERCOM will be elevated to a unified combatant command. Taken together, these changes may increase the risk of disruption to CYBERCOMs mission effectiveness. As such, military leaders can learn from the formation and dismantling of past functional combatant commands as they plan for both elevating and separating CYBERCOM from STRATCOM and NSA.

One such functional unified combatant command is U.S. Special Operations Command (SOCOM), which Congress created in 1987. SOCOM is tasked with synchronizing and carrying out Special Operations (e.g., hostage rescues, counterinsurgency actions) in support of missions in global combatant commands. It was created after Congressional and DoD investigations determined that a clearer organizational focus and chain of commandas well as dedicated fundingwere needed for special operations in low-intensity conflicts.

Frank Cilluffo of George Washington University has recommended that CYBERCOM adopt a collaborative operations style similar to that employed by Joint Strategic Operations Command (JSOC)a subunified division of SOCOM responsible for quick, high-profile strikes like the mission to capture or kill Osama bin-Laden. Like JSOC, CYBERCOM would draw on intelligence assets (i.e., from NSA) to quickly harmonize and implement cyber operations. Ideally, this model of collaborative operations would preserve the important relationship that has developed between NSA and CYBERCOM while allowing each to pursue a distinct mission set.

Even if a collaborative model, similar to JSOC, is adopted, the potential for redundant responsibilitieswhich has led to the downfall of past COCOMswould still loom large. U.S. Strategic Command, for example, has a broad set of capacities, including tailored nuclear, space, cyberspace, global strike, joint electronic warfare, missile defense, and intelligence capabilities. While formal responsibility for cyberspace may be removed, preventing overlap between these two commands will likely be difficult. If not adequately deconflicted, one could imagine CYBERCOM being reintegrated into STRATCOM just as U.S. Space Command was rolled into STRATCOM in 2002 to facilitate integrated command for C4ISR (command, control, communications, computers, intelligence, surveillance, and reconnaissance). Does a C3ISR model make sense for STRATCOM? After all, cyber, just like military space capacities, is fundamental to U.S. command and control.

Expansive mandates, unsupported by commanders of existing COCOMs, have also proved fatal to functional combatant commands. U.S. Strike Command, later U.S Readiness Command, was tasked with providing a reserve of general purpose forces, training reserve forces, developing joint doctrine, and planning for contingency operations. It was then expanded to include planning for operations in the Middle East, sub-Saharan Africa, and Southern Asia. Criticized for becoming a world-wide General Purpose Forces Command, it was disbanded in 1986 to allow for a more narrowly-tailored commandSOCOM. This bears out a central lesson that General Duane Cassidy, the first commander of U.S. Transportation Command (TransCom), derived from TransComs success: it is essential to have (1) buy-in from leadership of the other combatant commands and (2) support from civilian leadership.

Though the debate over CYBERCOMs independence and institutional design will no doubt continue, a complete separation now seems inevitable. While CYBERCOMs shift away from reliance on NSA will be necessarily gradual, General Hayden estimates the transition could be achieved in as little as nine months. This means that a fully independent CYBERCOMwith all its potential benefits and liabilitiescould be just a few years away.

Follow this link:
To Split or Not to Split: The Future of CYBERCOM's relationship with NSA - Lawfare (blog)