ad info




CNN.com
 MAIN PAGE
 WORLD
 ASIANOW
 U.S.
 LOCAL
 POLITICS
 WEATHER
 BUSINESS
 SPORTS
 TECHNOLOGY
   computing
   personal technology
   space
 NATURE
 ENTERTAINMENT
 BOOKS
 TRAVEL
 FOOD
 HEALTH
 STYLE
 IN-DEPTH

 custom news
 Headline News brief
 daily almanac
 CNN networks
 CNN programs
 on-air transcripts
 news quiz

  CNN WEB SITES:
CNN Websites
 TIME INC. SITES:
 MORE SERVICES:
 video on demand
 video archive
 audio on demand
 news email services
 free email accounts
 desktop headlines
 pointcast
 pagenet

 DISCUSSION:
 message boards
 chat
 feedback

 SITE GUIDES:
 help
 contents
 search

 FASTER ACCESS:
 europe
 japan

 WEB SERVICES:
COMPUTING

Feds batten down the online hatches

June 9, 1999
Web posted at: 12:09 p.m. EDT (1609 GMT)

by Diane Frank and Doug Brown

From...
Federal Computer Week
hacker graphic

 ALSO
   Insurgency on the Internet

   Sign up for the Computer Connection email service

   For more computing stories

  

(IDG) -- A growing wave of hacker attacks on federal World Wide Web sites, including an attack that resulted in the FBI shutting down its site for more than a week, has raised agencies' awareness of their vulnerabilities and spurred efforts to increase their online security.

As a result, agencies recently have upgraded their security products, set new security policies and changed systems' architectures to keep one step ahead of hackers.

But federal IT and security experts recognize that no system connected to the Web can be completely secure. The threat of hackers wanting to make political statements or cause a nuisance by taking government Web sites down will require constant attention, but that should not sway agencies from moving more public services online, sources say.

"Just as dealing with terrorists, you don't let [hackers] stop you from doing what you believe is in your best interests," said Roger Baker, chief information officer at the Commerce Department. "By putting yourself on the Internet, you have to be much more vigilant about your security."

MORE COMPUTING INTELLIGENCE
IDG.net   IDG.net home page
  Federal Computer Week home page
  Federal Computer Week's Y2K resource page
  Year 2000 World
 Reviews & in-depth info at IDG.net
  IDG.net's personal news page
  IDG.net's products pages
  Questions about computers? Let IDG.net's editors help you
  Subscribe to IDG.net's free daily newsletters
  Search IDG.net in 12 languages
 News Radio
 * Fusion audio primers
 * Computerworld Minute
   

In the past two weeks, a group attacked the FBI site in retaliation for the FBI arresting hackers who have broken into federal systems. Some of the hackers who have broken into the sites have identified themselves as part of a group calling itself F0rpaxe. The FBI took its site down for more than a week to make security improvements, and the site finally went live again on Friday.

Hackers also broke into the Web sites run by the Senate, the Interior Department and a federal supercomputer laboratory in Idaho Falls, Idaho.

Also last month, several cyberattacks successfully took down Web sites at the Defense Department, the White House and other agencies, following the bombing of the Chinese embassy in Belgrade, Yugoslavia. Many other agency sites also were attacked, with four other successful hacks gaining international attention in the last two weeks when the victimized agencies had to take their sites down for at least a day to repair the damage.

In response to increased attacks on DOD systems, the Defense Technical Information Center (DTIC), which oversees more than 90 Defense-related Web sites, has taken several steps to upgrade its security.

Until recently, DTIC maintained those sites through an "all-in-one" server. But in an attempt to foil hackers, "we're stripping these things apart," said Carlynn Thompson, director for research, development and acquisition information support at DTIC. The agency also has installed more servers, creating new layers that hackers must go through to get to the actual content of the sites.

The Department of Health and Human Services last week instructed managers and employees to "change passwords, put in firewalls, do intrusion detection, go over access control and authorizations," said HHS deputy CIO Kerry Weems.

At the Energy Department, IT officials have begun to use more commercial security solutions, including a more robust firewall and patches from software vendors, said Suzanne Nawrot, Webmaster at DOE. The department also split the management and monitoring of its Web servers from the policy and content group to a technical group at another facility.

The Federal Emergency Management Agency also has taken steps to bolster its security, but the agency did not want to disclose any of its activity. "The way the hackers operate, the more we talk about what we're doing, the more chance there is we're going to get hit," said spokesman Mark Wolffson.

But federal IT and security experts are realistic about how successful these devices and plans will be."It's never a question of if your site is going to be hacked, it's when," Nawrot said. "You can put up patches and security, but it's just a matter of time before a smarter, younger kid finds a way in."

Daniel Kuehl, director of the information strategies concentration program at the National Defense University, agreed that no amount of security will wall off a Web site completely. "As with every other age and the technologies that are developed, there are vulnerabilities you have to deal with," he said. "What you can do is [to] mitigate, to the best amount possible, the damage that can come from it."

The Federal Computer Incident Response Capability at the General Services Administration serves as a security resource for agencies, providing a cookbook of available security practices and patches. Agencies that use FedCIRC's resources will not be totally secure, but they will find themselves better prepared, said one agency Web manager, who requested anonymity because of security concerns.

"If you take all the steps that you know to fix known vulnerabilities, you will be much better off," he said. "But people need to follow the steps that they know they need to follow" -- for example, using readily available software patches from vendors and changing passwords often.

But agencies cannot make changes if they do not have the funding, as one of the DOE labs discovered last week. A hacker penetrated a Web site maintained for the Nuclear Regulatory Commission by the National Engineering and Environmental Laboratory, Idaho Falls, Idaho. The site was in the public domain, unprotected by the lab's firewall, though access to it was restricted to registered users.

The hacker was able to penetrate the site because the lab did not have a patch from the application vendor, said Al Lewis, director of information systems with Lockheed Martin Idaho Technologies Co., the contractor that runs the lab. The NRC group sponsoring the site had not provided enough money for system administration, he said. The patch has been added since.

The lab is reviewing whether it has allocated enough money for security for its other public Web pages and is requiring other groups using the lab's site to check the amount of funding they provide "to make sure we have the levels of security that don't compromise the integrity of the lab," Lewis said.

Other agencies in the past year have said they do not have the funding to adequately protect their systems, but some say they have to find the funding.

"The cost of a break-in is much lower than the cost of protection," said a federal security expert working for an agency. "We live in a constant fear of having downtime or having services unavailable."

The fear has escalated lately because to create a "digital government," Congress has pushed agencies to move their services to the Internet with legislation such as the Government Paperwork Elimination Act, which requires by October 2003 all agencies to give the public the option of interacting with the government electronically whenever possible.

But relying on a Web site open to the public automatically opens the agencies to attack.

"It's a balance of do I, by making these systems more accessible to John and Jane Q. Public, also make them vulnerable to anyone that wants to attack them?" Kuehl said. "We are now in an environment where you have to live with that... and the decision is how well you are going to protect those systems."

Elana Varon contributed to this article.


SPECIAL:
Insurgency on the Internet

RELATED STORIES:
Hacked hackers vow vengeance on federal Web sites
June 5, 1999
Computer systems vulnerable when staffing levels drop
June 4, 1999
Feds warn hackers will be prosecuted; pro-Mitnick protest planned
June 2, 1999

RELATED IDG.net STORIES:
Senate Web site latest hacker target?
(Computerworld)
NASA systems are full of holes
(FCW)
Feds must protect against cyberattacks, experts say
(FCW)
Study warns of a new cyberterrorism called 'netwar'
(FCW)
Hack attempt shuts down FBI Web site
(Computerworld)
Study: Most hacks are inside jobs
(PC World Online)
Can government stop hackers?
(PC World Online)
Year 2000 World
(IDG.net)
Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

RELATED SITES:
Federal Bureau of Investigation
Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.
 LATEST HEADLINES:
SEARCH CNN.com
Enter keyword(s)   go    help

Back to the top   © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.