Cyberdrill carries over to real war

 

Connecting state and local government leaders

Little did the cadets and midshipmen realize how soon they would put to use the skills they learned in the Cyber Defense Exercises hosted each April jointly by the military academies.

Little did the cadets and midshipmen realize how soon they would put to use the skills they learned in the Cyber Defense Exercises hosted each April jointly by the military academies.A number of warfighters now posted in Iraq and at military bases around the world recounted in recent e-mail exchanges with GCN how the annual network face-off drill is helping them manage communications services on the battlefield.'I've been putting what I learned into practice in a real environment for several months now,' 1st Lt. Todd Arnold wrote.'I am writing this from the V Corps main HQ at one of Saddam Hussein's presidential palace compounds in Baghdad,' Arnold, a 2001 graduate of the Army's Military Academy at West Point, N.Y., and member of its first cyberdefense team, added. 'The lessons learned in the exercise have come into play here. I can't go into too much detail about the network, but it has 300-plus routers and is still growing. It is the largest tactical network ever.'Since the original contest between the Army and Air Force academies in 2001, the exercise has grown. Last year, the Naval and Coast Guard academies joined in the drill; this year the Merchant Marine school came on board.The competition itself also has become more realistic. This year, each team pretended it was the headquarters of a military coalition partner. Each designed its own network and had to guard Web, e-mail, Domain Name System and public-key infrastructure registration services against red-team attacks while communicating and cooperating with the other contestants.Another new wrinkle this year was a so-called rogue box in each network that the red team could use to simulate insider attacks against another coalition member.'We could see the traffic go out and see the attack against another network,' said Lt. Col. Daniel Ragsdale, assistant professor of computer science at West Point.That created an ethical dilemma. Should the team notify its 'coalition partner,' thus helping a competing team, or keep quiet and improve its own chances?Last year's attacks took place during the day while cadets were in classes, and they patched and repaired their networks in the evening.'It was a true force-on-force this time around,' Ragsdale said, with attacks and defense going on around the clock. 'It was not supposed to be a 24-hour operation, but I don't believe there was a minute during the four days when there wasn't someone in the operations center.'The Army, Navy, Air Force, Coast Guard and Merchant Marine competitors sought to keep production networks up and communicating under attacks by the National Security Agency red teams.When the dust cleared, the Air Force Academy at Colorado Springs, Colo., won the NSA Information Assurance Director's Trophy, which had been claimed for the past two years by West Point.'We came in fourth last year,' said Capt. Todd Stratton, a computer science instructor who taught the Air Force Academy's network security course. 'We're elated.'Wayne Schepen, NSA visiting fellow at West Point, said, the exercise 'is really making a difference in the academies. We couldn't be happier.'Cadets monitored and responded to attacks in real time. 'At one point it came down to who could type fastest,' Ragsdale said. 'This made for a significant increase not only in the learning but in the excitement.''I had never had a hands-on experience before,' said Cadet Matt Kotowski, a West Point team member from Capel, Calif. 'I was using software and technology that had only been out for a month. It was awesome.''It was really a time to sit down and apply what you have learned over the year,' said Cadet Chris Wren, a West Point team member from Dallas.This year's West Point team was the first to have participated in an information assurance program for all four years of their schooling.'That made a big difference,' Ragsdale said. 'They did work I would expect from professionals. I was astounded that they didn't win.'But the Air Force Academy team was 'relatively flawless,' Stratton said. 'They made no major mistakes, and they worked great as a team.'In the end, a single flaw in West Point's File Transfer Protocol server was decisive.'We gave it a few more privileges than we needed to, and that ended up being counted as an exploit against us,' said Cadet Erik Sarson of Latrobe, Pa.All 14 members of the Air Force team were students in Stratton's course in analysis and design of secure networks.'This is the first year we taught this course,' Stratton said. 'After last year's exercise, it became apparent we needed to expand.'Stratton, who came to the academy from an Air Force base where he had been in charge of a network, said the exercise was realistic.'It's amazing how useful this is going to be to them,' he said. 'I wish I'd had something like this.'The 10 seniors on Stratton's team will go on to become base-level communications and information officers after graduation.Former West Point team members already are serving in Europe, Asia and the Middle East.Lt. Arnold, data officer for V Corps' 22nd Signal Brigade, has been in the Mideast since early February.'A few days into the war, I jumped up to al-Najaf to control the network from the front,' he wrote by e-mail. 'My brigade commander wanted a presence closer to the subscribers who were doing the fighting. I had a few adventures over the next month before moving into Baghdad on April 12, three days after the fall. I have been here since, trying to keep the network stable while it moves north from Kuwait.'Ian MacLeod, a platoon leader with a strategic signal battalion in Stuttgart, Germany, wrote by e-mail that the systems his soldiers operate 'are extremely critical and heavily guarded.' His West Point training in information assurance has been important, he said, because 'as the Army becomes more digitized, the amount of information being passed will increase exponentially.'But the Army might not be as ready to put the training to use as the young soldiers would like.'Unfortunately, the Army seems to want to hire more civilian contractors to do information assurance and network management,' Arnold said. 'I really lucked out in getting this job, because there aren't very many like it in the Army for a first lieutenant.'Another team member, 1st Lt. Matthew Vea, a 2001 West Point graduate, also was frustrated by the lack of opportunities to use his training. In his job as executive officer for the 275th Signal Co. in Yongsan, South Korea, he does paperwork and fixes printers.'The only reason I touch computers is because I volunteered to be the information management officer after I saw the state of our network,' he wrote by e-mail.

Specialist Robert Martel, left'an observer from the Army's North East Operations Command'watches along with Cadets Rain Ottis and Arthur Miceli as Cadet Justin Edgars responds to a cyberattack.

Courtesy of U.S. Military Academy



















Pulling all-nighters











































At the front











NEXT STORY: The lowdown on intrusion-detection

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.