Eligible Receiver 97

Eligible Receiver 97 was a U.S. Defense Department exercise conducted under what is known as the No-Notice Interoperability Exercise Program. The exercises were held June 9–13, 1997 and included participants such as the National Security Agency (which acted as the Red Team), Central Intelligence Agency, Defense Intelligence Agency, Federal Bureau of Investigation, National Reconnaissance Office, Defense Information Systems Agency, Department of State, Department of Justice, as well as critical civilian infrastructure providers such as power and communication companies. The simulated cyber attack led directly to the formation of the United States Cyber Command.

Eligible Receiver 97 featured mock cyber attacks, hostage seizures, and special operations raids that sought to demonstrate potential national security threats that could be posed through the cyber domain.[1] The joint exercise involved a National Security Agency Red Team which played the role of North Korea, Iran, and Cuba attempting to cause critical civilian infrastructural damage, as well as gain control over the militaries command-and-control capabilities.[2] The NSA Red Team used hacker techniques and software that was freely available on the Internet at that time. The Red Team was able to crack networks and do things such as deny services; change and manipulate emails to make them appear to come from a legitimate source; disrupt communications between the National Command Authority, intelligence agencies, and military commands. Common vulnerabilities were exploited which allowed the Red Team to gain root access to over 36 government networks which allowed them to change/add user accounts and reformat server hard drives.

The National Security Agency Red Team had no inside information to work with, but by engaging in extensive preliminary electronic reconnaissance of target agencies and sites prior to the attacks, they were able to inflict considerable simulated damage. Although many aspects of Eligible Receiver remain classified, it is known that the Red Team was able to infiltrate and take control of U.S. Pacific Command computer systems as well as power grids and 911 systems in nine major U.S. cities.

The mock attack featured three phases. The first two phases were concerned with computer network penetration of civilian infrastructure and military command and control.[3] Recently declassified documents show that the last phase of Eligible Receiver connected cyber attacks to operations in physical domains.[4] Specifically, the mock attack included a hijacking-at-sea of the ship MV National Pride. Documents detailing the last phase of Eligible Receiver remained classified until they were obtained through a Freedom of Information Act request by the nongovernmental National Security Archives at George Washington University.

Quote

Well, we do know that they were very successful in penetrating DOD computers. I mean, we physically got messages from the bad guys on our own computers.

John Hamre, former Deputy Secretary of Defense 97-99, Frontline interview[5]

See also

References

  1. "Eligible Receiver 97: Seminal DOD Cyber Exercise Included Mock Terror Strikes and Hostage Simulations". National Security Archives.
  2. Kaplan, Fred (March 2016). Dark Territory. pp. Chapter 4: Eligible Receiver.
  3. Kaplan, Fred (2016). Dark Territory. pp. Chapter 4: Eligible Receiver.
  4. "Eligible Receiver 97: Seminal DOD Cyber Exercise Included Mock Terror Strikes and Hostage Simulations". National Security Archives.
  5. Frontline interview with John Hamre
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.