Government and defense contractors play a crucial role in protecting sensitive information. But the evidence suggests they are losing the battle.
In the best of times, the federal government and private-sector companies work in a delicate synergy to make the products and services required to sustain government operations, develop advanced systems, and enhance systems currently in use. The government also looks to the private sector to support military dominance on the battlefield and protect closely held information. But that arrangement can lead to serious risks when contractors fail to protect their operations adequately from cyber-attacks.
Many of the contractors working with government handle terabytes of data peppered with personally identifiable information, including medical data covered under Health Insurance Portability and Accountability Act (HIPAA) provisions, as well as financial information related to civilian and military personnel. The prevalence and scope of cyber-attacks on this information via contractors is significant, as is the potential danger.
US-CERT reports the number of incidents reported by federal agencies in 2012 was 48,562, up more than 700 percent since 2006. In general, within government, we simply cannot wrap our minds around this problem because it is both very large and highly pervasive.
What’s troubling is that in a number of cases, these companies have had prior indications, warnings and even outright formal notices before or immediately after these attacks, leaving little to the imagination regarding what happened. All that is left afterwards is to assess the damage, build the wall higher, and find innovative ways to track down and neutralize the culprits’ abilities to gain access and “exfiltrate” data.
For three years, one defense contractor was compromised by an advanced persistent threat attack. As InformationWeek reported, investigators hired by the contractor company said that despite ongoing warnings from numerous organizations, including NASA and the Naval Criminal Investigative Unit, the contractor's networks had been compromised. They also found that company officials failed to realize that attackers were maintaining a persistent presence in their network and react accordingly.
The attackers allegedly captured cutting-edge US military drone and robot weapons-systems design and technical specifications and brought competing products to market, according to a subsequent report from Bloomberg. The report cited several firms hired by the defense contractor to investigate apparent intrusions. Investigators told Bloomberg that the ongoing attacks were launched by the Shanghai-based Comment Crew.
Determined adversaries Earlier this year, security firm Mandiant reported targeted attacks had compromised 141 businesses, none of which it named, across 20 industries. According to Mandiant, the attackers weren't just supported by China, but were actually part of the People's Liberation Army (PLA) Unit 61398, which is an elite military hacking unit. Chinese officials have denied these allegations.
The threats had reached the point that the Pentagon, in its annual report to Congress, accused the Chinese military of mounting cyber-attacks on the US government and various defense contractors. It marked the first time that the Obama administration has explicitly blamed Chinese officials for the country's offensive cyber-activities, according to a May 7, 2013, report in Foreign Policy. The report, which called the cyber-attacks a "serious concern," said that US government computer systems "continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military."
China's primary objective appears to be the theft of industrial technology, but according to the report the information gathered by Chinese hackers could easily be used for "building a picture of U.S. network defense networks, logistics, and related military capabilities that could be exploited during a crisis." The diplomatic, economic, and defense industrial sectors that form the basis of US defense programs are all being targeted, the report said. China rejected the accusations saying that it "resolutely oppose[s] all forms of hacker attacks."
But a 2012 Defense Security Service report found that many of these computer network exploitations (CNE to cyber-professionals), were targeting critical systems, including unmanned vehicles (air and ground); networks and sensors; command, control, communications, and computers (C4I) systems; aircraft systems; ground combat systems; and nanotechnology.
Also of concern were the methods used by adversaries, including encryption of data and masking of data to get around both the built-in security systems and to limit the ability of investigators to track down the specific attacker.
Inadequate reporting Defense contractors are given guidelines that clearly lay out the rules, policies, and procedures for reporting suspicious network contacts. However, many such reports contain too little information to classify the nature of the attack and the targeted technology of such attacks appropriately.
Given the lack of full and complete information in the reporting provided by the contractor community, we in the military do our best to figure out exactly who is coming after critical program information and how successful those adversaries are in capturing targeted research, design, and technical information, as well as associated documents, such as training, security classification guides, operating manuals, and other information.
What should the government, and more specifically the Department of Defense, do in response to the growing threat and perceived lack of serious efforts to curb the intrusions?
Moving email to the cloud has lowered IT costs and improved efficiency. Find out what federal agencies can learn from early adopters. Also in the The Great Email Migration issue of InformationWeek Government: Lessons from a successful government data site. (Free registration required.)
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.