advertising information

CNN.com
 MAIN PAGE
 WORLD
 ASIANOW
 U.S.
 LOCAL
 POLITICS
 WEATHER
 BUSINESS
 SPORTS
 TECHNOLOGY
   computing
   personal technology
   space
 NATURE
 ENTERTAINMENT
 BOOKS
 TRAVEL
 FOOD
 HEALTH
 STYLE
 IN-DEPTH

 custom news
 Headline News brief
 daily almanac
 CNN networks
 CNN programs
 on-air transcripts
 news quiz

  CNN WEB SITES:
CNN Websites
 TIME INC. SITES:
 MORE SERVICES:
 video on demand
 video archive
 audio on demand
 news email services
 free email accounts
 desktop headlines
 pointcast
 pagenet

 DISCUSSION:
 message boards
 chat
 feedback

 SITE GUIDES:
 help
 contents
 search

 FASTER ACCESS:
 europe
 japan

 WEB SERVICES:
COMPUTING

DOD leaders mull Internet disconnect

April 20, 1999
Web posted at: 4:00 p.m. EDT (2000 GMT)

by Bob Brewin and Daniel Verton

From...
Federal Computer Week
pentagon graphic
  

(IDG) -- Hammered by relentless hacker attacks against its unclassified network for years, the Defense Department may back away from using the Internet, which it invented, in favor of relying on intranet enclaves, according to a top Army official.

Lt. Gen. William Campbell, Army director of information systems for command, control and communications, who last year ordered all Army World Wide Web sites shut down pending a security review of their contents, said last week that all military networks connected to the Internet are "inherently vulnerable.... We don't have a prayer or a hope of defending ourselves unless we move large portions of the '.mil' [domain] onto a protected network" such as an intranet not connected to the Internet.

Campbell, speaking at a conference sponsored by the Association of the United States Army and the Association of Old Crows, suggested that DOD move its electronic commerce networks and publicly accessible Web sites to the ".com" domain, which is used by businesses.

The vulnerability of DOD networks has captured the attention of senior members of all four armed services as well as DOD, Campbell said. "We would be remiss if we left these network connections out there," he said. "We need sufficient protection so no one can get into our networks and damage the defense of the United States."

To handle its most sensitive traffic, DOD uses its Secret Internet Protocol Router Network, an intranet-like global network. Much of DOD's day-to-day business -- including logistics, personnel and pay -- is conducted on the Non-Classified Internet Protocol Router Network, which is connected to the Internet and looms as a DOD electronic Achilles' heel, Campbell said.

"The openness of these networks makes us vulnerable to attacks by a hostile agent," Campbell said. "Vulnerabilities are of such a magnitude that to ignore them would be a dereliction of duty."

Detected hacker attacks against DOD worldwide unclassified networks occur at a rate of 250,000 a year -- plus an untold number of undetected attacks, according to Air Force Maj. Gen. John "Soup" Campbell, director of the recently formed Joint Task Force for Computer Network Defense. Speaking at the AUSA/Old Crows conference, the Air Force's Campbell said these attacks threaten DOD's "basic logistics systems which run on the Internet."

MORE COMPUTING INTELLIGENCE
IDG.net   IDG.net home page
  Federal Computer Week home page
  Federal Computer Week's Y2K resource page
 Reviews & in-depth info at IDG.net
  IDG.net's personal news page
  IDG.net's products pages
  Questions about computers? Let IDG.net's editors help you
  Subscribe to IDG.net's free daily newsletters
  Search IDG.net in 12 languages
 News Radio
 * Fusion audio primers
 * Computerworld Minute
   

Philip Loranger, a civilian Army official who works for the Army's Campbell as chief of the service's Command and Control Protect Division, said the number of publicly accessible Web sites the Army operates poses a security risk. "We still have more public Web pages than necessary," he said.

Loranger said the Army continues to shut down Web sites for security reasons. He recently closed to the public the Army's information assurance Web site. "In our zealousness to share information [with the American public], we are disclosing targeting information" that a terrorist or enemy state could use, Loranger said.

John Hamre, deputy secretary of Defense, sounded a cautionary note about security vulnerabilities posed by the information posted on DOD Web sites and the ability of hackers to exploit the connections. But he warned that "we are far too connected to unplug ourselves [from the Web]."

Hamre added that the Pentagon made a mistake in turning control of its Web activities over to its public relations department without considering security risks. The Pentagon has made strides in the past two years in terms of securing its critical information infrastructure, Hamre said. "The foundation is in place, but it is a dramatically more complicated problem."

Hamre believes that vendors' e-commerce practices present a scenario ripe for exploitation.

"The best way to attack the U.S. is to become someone's customer," he said. "They'll give you the software" to enter sensitive systems, with few checks and balances imposed on the distribution or use of that software.

Tactical battlefield networks under development by the Army and Marines to support operations on future digitized battlefields have vulnerabilities, according to Maj. Gen. Robert Nabors, commander of the Army's Communications-Electronics Command. Army tactical battlefield networks, Nabors said, "do not have the bandwidth to handle commercial [information assurance] tools."


MESSAGE BOARD:
How do you define a hacker?

RELATED STORIES:
DOD confirms cyberattack 'something new'
March 6, 1999
Pentagon 'at war' with computer hackers
March 5, 1999
Pentagon hackers traced to Russia
March 5, 1999
Who's running the government's Web sites?
January 14, 1999

RELATED IDG.net STORIES:
Advanced hacks sting Pentagon (March 8, 1999)
(Federal Computer Week)
DOD detects internationally coordinated hacker attack (September 28, 1998)
(Federal Computer Week)
Cyberattacks on the rise
(Computerworld)
Being a hacker is easier than you think
(Network World Fusion)
Melissa tests DOD procedures
(Federal Computer Week)

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.


RELATED SITES:
DefenseLINK
The Official Web Site of the Department of Defense

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

 LATEST HEADLINES:
SEARCH CNN.com
Enter keyword(s)   go    help

Back to the top   © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.