@War: The Rise of the Military-Internet Complex (18 page)

Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

BOOK: @War: The Rise of the Military-Internet Complex
8.6Mb size Format: txt, pdf, ePub

The analogy isn't perfect. The NSA isn't a law enforcement agency, it's a military and intelligence organization. It operates by a different set of laws and with a different mission. But as the agency drums up talk of cyber war and positions itself as the best equipped to help defend the nation from intruders and attacks, it should act more like a security guard than a burglar.

 

In 2013 the NSA had a budget of more than $25 million to procure zero day exploits, referred to as “covert purchases of software vulnerabilities” in an internal budget document.
But the NSA is not entirely dependent on a shadowy, unregulated market to obtain its cyber weapons. For the most part, the agency builds its own. And why not? It has an in-house production line comprising some of the country's best hackers, many of whom have come up through the ranks of military service and are put through graduate-level computer security courses on the government's dime. Those personnel represent an expensive, long-term investment. The United States relies on their skills and knowledge in a cyber struggle against China, which will probably always have an edge in terms of sheer numbers of hackers.

The problem for the NSA is that its top-flight cyber warriors don't always stay in government service. They can easily triple their salaries in the private sector, and these days, the work they're doing there is in as high demand as it is in the government.

Charlie Miller, a former NSA employee famous for finding hard-to-detect bugs in Apple products, including the MacBook Air and the iPhone, went to work for Twitter in 2012. Miller is what's known in hacker circles as a “white hat.” He tries to break in to systems in order to fix them, before a “black hat” can exploit the flaw and do damage. As the social networking company has grown, it has naturally become a bigger target for spies and criminals. Miller is using his NSA-developed skills, and his innate talent, to protect Twitter—which went public in 2013—and its hundreds of millions of users.

Justin Schuh followed a similar path. He started his career in the mid-1990s as an intelligence analyst, software engineer, and systems administrator in the Marine Corps. In 2001, Schuh joined the NSA, where he enrolled in the agency's System and Network Interdisciplinary Program (SNIP), which is essentially cyber warrior training. “Graduates of the program become invaluable to [the agency] as the solution to universal [computer network operations] problems,” says an NSA brochure, using the technical term for cyber offense.
After less than two years Schuh joined the CIA, where he worked in the agency's technical operations unit, which helps the NSA place surveillance equipment in hard-to-reach places. But soon he was off to the private sector, eventually winding up at Google, where he works as an information security engineer.

Google has set up a team, which includes Schuh, devoted to finding security weaknesses and zero day exploits that could be used against Google's customers and its products, such as its e-mail system and web browser. The company itself has been the target of sophisticated hacking campaigns, most notably one by a Chinese group in 2010, which broke in to a database of proprietary software code.
The hackers stole the code for a password system that allowed users to sign in to many Google applications at once. It was described by researchers as among the “crown jewels” of the company's intellectual property. The theft triggered panic at the highest ranks of Google, a company that prides itself on protecting its users' security and personal data and has built its reputation on that promise.

Google now has its own team of sleuths, several of whom worked for the NSA and other intelligence agencies, looking for threats to the company. “Here's a little secret. Having a huge index of suspected and confirmed malware is really handy for protecting hundreds of millions of users,” Schuh wrote on Twitter in 2012, after Google bought a small company that scans e-mails and websites for viruses. Today Google scans its customers' Gmail for threats and will even alert them with a message, displayed on an arresting red banner, if the system thinks a virus may have been sent by hackers working for a government. The alert doesn't say China, but that's the obvious implication.

Google doesn't have enough employees to find all the zero day vulnerabilities and exploits that might threaten the company and its hundreds of millions of customers around the world. So, it also pays bounties to independent hackers, the same ones selling their discoveries to defense contractors. Google employees say their biggest competition on the zero day gray market is the NSA. It's buying up zero days faster than anyone else, and paying top dollar.

The company also employs middlemen of its own to procure zero days. According to two sources with knowledge of Google's security programs, it uses a boutique firm called Endgame, based just outside Washington, DC, to buy up vulnerability information and known exploits. It is not known precisely what Google intends to do with what it has acquired, but this much is certain: first, having a stockpile of zero day exploits would allow the company to start a private cyber war; and second, that would be illegal. Only the United States government is allowed to conduct offensive cyber operations that result in damage to computer systems.

But governments are not the exclusive targets of hackers—as the United States well knows. Indeed, it was the massive espionage campaign against defense companies that helped prompt US officials to start building up a cyber army. But today, US businesses are starting to realize that this army will never be big enough and strong enough to protect all of them. They have to defend themselves. And one of the first places they look for protection is that same shadowy network of hackers, selling their skills and weapons to the highest bidder.

SIX

The Mercenaries

B
RIGHT-FACED
twenty- and thirty-somethings clad in polo shirts and jeans perch on red Herman Miller chairs in front of silver Apple laptops and sleek, flat-screen monitors. They might be munching on catered lunch—brought in once a week—or scrounging the fully stocked kitchen for snacks, or making plans for the company softball game later that night. Their office is faux loft industrial chic: open floor plan, high ceilings, strategically exposed ductwork and plumbing. To all outward appearances, Endgame, Inc. looks like the typical young tech startup.

It is anything but. Endgame is one of the leading players in the global cyber arms business. Among other things, it compiles and sells zero day information to governments and corporations, and judging by the prices Endgame has charged, business has been good. Marketing documents show that Endgame has charged up to $2.5 million for a zero day subscription package, which promises twenty-five exploits per year. For $1.5 million, customers have access to a database that shows the physical location and Internet addresses of hundreds of millions of vulnerable computers around the world. Armed with this intelligence, an Endgame customer could see where its own systems are vulnerable to attack and set up defenses. But it could also find computers to exploit. Those machines could be mined for data—such as government documents or corporate trade secrets—or attacked using malware. Endgame can decide whom it wants to do business with, but it doesn't dictate how its customers use the information it sells, nor can it stop them from using it for illegal purposes, any more than Smith & Wesson can stop a gun buyer from using a firearm to commit a crime.

The heart of Endgame's business is the ability to ingest huge amounts of data about vulnerable computers and weaknesses in a network and display that information graphically. To do that, Endgame has used a proprietary software tool, internally known as Bonesaw, which the company has described as a “cyber targeting application.”

“Bonesaw is the ability to map basically every device connected to the Internet and what hardware and software it is,” an Endgame employee told a reporter in 2013.
The software shows which systems are infected with viruses that make them vulnerable to attack.

According to security researchers and former government officials, one of Endgame's biggest customers is the NSA. The company is also known to sell to the CIA, Cyber Command, the British intelligence services, and major US corporations. Endgame has four offices, including one in the fashionable Clarendon section of Arlington, Virginia, a ten-minute drive or four Metro stops away from the Pentagon.

For its clients, Endgame has drawn up lists of computers owned and operated by some of the United States' biggest strategic adversaries. In 2010, Endgame compiled a chart showing eighteen Venezuelan government agencies and large state-owned companies running attackable computers, including a water utility, a bank, the Ministry of Defense, the Ministry of Foreign Affairs, and the Office of the Presidency. The chart, which the company noted was “not an inclusive list,” showed the Internet address of each infected system, the city where it was located, and the compromised application it was running. At the end of the chart was a column labeled “EGS Vuln,” apparently indicating whether the applications were vulnerable to attack. The word
yes
appeared next to nearly all of the infected machines.

Endgame has also scouted targets in Russia. Internal documents show that the company found computers open to attack in the Ministry of Finance, as well as an oil refinery, a bank, and a nuclear power plant.
And the company has identified target packages in China, Latin America, and the Middle East.

This kind of intelligence used to be the near-exclusive domain of government intelligence agencies. They alone had the access and the know-how to sniff out vulnerable computers with such precision, as well as the motive and the means to acquire cyber weapons to attack those systems. Not anymore.

Endgame is one of a small but growing number of boutique cyber mercenaries that specialize in what security professionals euphemistically call “active defense.” It's a somewhat misleading term, since this kind of defense doesn't entail just erecting firewalls or installing antivirus software. It can also mean launching a preemptive or retaliatory strike. Endgame doesn't conduct the attack, but the intelligence it provides can give clients the information they need to carry out their own strikes. It's illegal for a company to launch a cyber attack, but not for a government agency. According to three sources familiar with Endgame's business, nearly all of its customers are US government agencies. But since 2013, executives have sought to grow the company's commercial business and have struck deals with marquee technology companies and banks.

Endgame was founded in 2008 by Chris Rouland, a top-notch hacker who first came on the Defense Department's radar in 1990—after he hacked into a Pentagon computer. Reportedly the United States declined to prosecute him in exchange for his working for the government. He started Endgame with a group of fellow hackers who worked as white-hat researchers for a company called Internet Security Systems, which was bought by IBM in 2006 for $1.3 billion. Technically, they were supposed to be defending their customers' computers and networks. But the skills they learned and developed were interchangeable for offense.

Rouland, described by former colleagues as domineering and hot-tempered, has become a vocal proponent for letting companies launch counterattacks on individuals, groups, or even countries that attack them. “Eventually we need to enable corporations in this country to be able to fight back,” Rouland said during a panel discussion at a conference on ethics and international affairs in New York in September 2013.
“They're losing millions of dollars, and it's so challenging for governments to help them, I think we have to enable them to do it themselves.” Rouland was voicing a frustration of many corporate executives who'd been the target of cyber spies and organized criminals. The Pentagon had chosen to provide special protection to defense contractors and seemed more worried about attacks on critical infrastructure like the power grid than on companies that were less vital to the US economy.

Fighting back could take a number of forms. A company could unleash a torrent of traffic on a malicious computer and knock it offline. It could break in to the hard drive of a Chinese cyber spy, find the stolen proprietary documents, and then delete them. Of course, once inside the spy's computer, the company could delete everything else on it, too, and unleash a virus on its network. A single act of self-defense could quickly escalate into a full-fledged conflict. And to the extent that Chinese cyber spies are supported by the Chinese military, an American firm could end up launching a private cyber war against a sovereign government.

It's illegal for a company or an individual to hack back against a cyber aggressor. But it's not against the law to offer the products and services that Endgame does. Endgame has raised more than $50 million from top-flight venture capital firms, including Bessemer Venture Partners, Kleiner Perkins Caufield & Byers, and Paladin Capital. That's an extraordinary amount of money for a cyber security startup, particularly one specializing in such a controversial field.

Rouland stepped down as the CEO of Endgame in 2012, following embarrassing disclosures of the company's internal marketing documents by the hacker group Anonymous. Endgame had tried to stay quiet and keep its name out of the press, and went so far as to take down its website. But Rouland provocatively resurfaced at the conference and, while emphasizing that he was speaking in his personal capacity, said American companies would never be free from cyber attack unless they retaliated. “There is no concept of deterrence today in cyber. It's a global free-fire zone.” One of Rouland's fellow panelists seemed to agree. Robert Clark, a professor of law at the Naval Academy Center of Cyber Security Studies, told the audience that it would be illegal for a company that had been hacked to break in to the thief's computer and delete its own purloined information. “This is the most asinine thing I can think of,” Clark said. “It's my data, it's here, I should be able to delete it.”

Other books

Holiday Wishes by Nora Roberts
Dead Silence by T.G. Ayer
A Taylor-Made Life by Kary Rader
El segundo imperio by Paul Kearney
Emmalee by Jenni James
Deadly Little Secrets by Jeanne Adams
Quantum Times by Bill Diffenderffer