Dark Territory

Dark Territory by Fred Kaplan Page A

Book: Dark Territory by Fred Kaplan Read Free Book Online
Authors: Fred Kaplan
Ads: Link
plan for military action; a second aircraft carrier was steaming to the Persian Gulf; American troops were prepared for possible deployment.
    So when the Solar Sunrise hack expanded to more than a dozen military bases, it struck some, especially inside the Joint Staff, as a pattern. The targets included bases in Charleston, Norfolk, Dover, and Hawaii—key deployment centers for U.S. armed forces. Only unclassified servers were hacked, but some of the military’s vital support elements—transportation, logistics, medical teams, and the defense finance system—ran on unclassified networks. If the hacker corrupted or shut down these networks, he could impede, maybe block, an American military response.
    Then came another unsettling report: NSA and DISA forensics analysts traced the hacker’s path to an address on Emirnet, an Internet service provider in the United Arab Emirates—lending weight to fears that Saddam, or some proxy in the region, might be behind the attacks.
    The FBI’s national intelligence director sent a cable to all his field agents, citing“concern that the intrusions may be related to current U.S. military actions in the Persian Gulf.” At Fort Meade, Ken Minihan came down firmer still, telling aides that the hacker seemed to be “a Middle Eastern entity.”
    Some were skeptical. Neal Pollard, a young DISA consultant who’d studied cryptology and international relations in college, was planning a follow-on exercise to Eligible Receiver when Solar Sunrise, a real attack, took everyone by surprise. As the intrusions spread, Pollard downloaded the logs, drafted briefings, tried to figure out the hacker’s intentions—and, the more he examined the data, the more he doubted that this was the work of serious bad guys.
    In the exercise that he’d been planning, a Red Team was going to penetrate an unclassified military network, find a way in to its classified network (which, Pollard knew from advance probing, wasn’t very secure), hop on it, and crash it. By contrast, the Solar Sunrise hacker wasn’t doing anything remotely as elaborate: this guy would poke around briefly in one unclassified system after another, then getout, leaving behind no malware, no back door, nothing. And while some of the servers he attacked were precisely where a hacker would go to undermine the network of a military on the verge of deployment, most of the targets seemed selected at random, bearing no significance whatever.
    Still, an international crisis was brewing, war might be in the offing; so worst-case assumptions came naturally. Whatever the hacker’s identity or motive, his work was throwing commanders off balance. They remembered Eligible Receiver, when they didn’t know they’d been hacked; the NSA Red Team had fed some of them false messages, which they’d assumed were real. This time around, they knew they were being hacked, and it wasn’t a game. They didn’t detect any damage, but how could they be sure ? When they read a message or looked at a screen, could they trust— should they trust—what they were seeing?
    This was the desired effect of what Perry had called counter command-control warfare: just knowing that you’d been hacked, regardless of its tangible effects, was disorienting, disrupting.
    Meanwhile, the Justice Department task force was tracking the hacker twenty-four hours a day. It was a laborious process. The hacker was hopping from one server to another to obscure his identity and origins; the NSA had to report all these hops to the FBI, which took a day or so to investigate each report. At this point, no one knew whether Emirnet, the Internet service provider in the United Arab Emirates, was the source of the attacks or simply one of several landing points along the hacker’s hops.
    Some analysts in the Joint Staff’s new Information Operations Response Cell noticed one pattern in the intrusions: they

Similar Books

Rainbows End

Vinge Vernor

Haven's Blight

James Axler

The Compleat Bolo

Keith Laumer