Anonymous ID: 21f5e5 April 24, 2021, 8:31 a.m. No.13502079   🗄️.is 🔗kun   >>2116

>>13501335 pb

>>13501277 pb

>>13501538 pb

>>13501789 pb

>>13501929 pb

 

The long life of a quick ‘fix’: Internet protocol from 1989 leaves data vulnerable to hijackers

The theories were many. Did someone at the Defense Department sell off part of the military’s vast collection of sought-after IP addresses as Trump left office? Had the Pentagon finally acted on demands to unload the billions of dollars worth of IP address space the military has been sitting on, largely unused, for decades?

 

An answer, of sorts, came Friday.

 

The change is the handiwork of an elite Pentagon unit known as the Defense Digital Service, which reports directly to the secretary of defense. The DDS bills itself as a “SWAT team of nerds” tasked with solving emergency problems for the department and conducting experimental work to make big technological leaps for the military.

 

Created in 2015, the DDS operates a Silicon Valley-like office within the Pentagon. It has carried out a range of special projects in recent years, from developing a biometric app to help service members identify friendly and enemy forces on the battlefield to ensuring the encryption of emails Pentagon staff were exchanging about coronavirus vaccines with external parties.

 

Brett Goldstein, the DDS’s director, said in a statement that his unit had authorized a “pilot effort” publicizing the IP space owned by the Pentagon.

 

“This pilot will assess, evaluate and prevent unauthorized use of DoD IP address space,” Goldstein said. “Additionally, this pilot may identify potential vulnerabilities.”

 

Goldstein described the project as one of the Defense Department’s “many efforts focused on continually improving our cyber posture and defense in response to advanced persistent threats. We are partnering throughout DoD to ensure potential vulnerabilities are mitigated.”

 

The specifics of what the effort is trying to achieve remain unclear. The Defense Department declined to answer a number of questions about the project, and Pentagon officials declined to say why Goldstein’s unit had used a little-known Florida company to carry out the pilot effort rather than have the Defense Department itself “announce” the addresses through BGP messages — a far more routine approach.

 

What is clear, however, is the Global Resource Systems announcements directed a fire hose of Internet traffic toward the Defense Department addresses. Madory said his monitoring showed the broad movements of Internet traffic began immediately after the IP addresses were announced Jan. 20.

 

These hackers warned the Internet would become a security nightmare

Madory said such large amounts of data could provide several benefits for those in a position to collect and analyze it for threat intelligence and other purposes.

 

The data may provide information about how malicious actors operate online and could reveal exploitable weaknesses in computer systems. In addition, several Chinese companies use network numbering systems that resemble the U.S. military’s IP addresses in their internal systems, Madory said. By announcing the address space through Global Resource Systems, that could cause some of that information to be routed to systems controlled by the U.S. military.

 

The data could also include accidental misconfigurations that could be exploited or fixed, Madory said.

 

“If you have a very large amount of traffic, and someone knows how to go through it, you’ll find stuff,” Madory added.

 

The U.S. government spent billions on a system for detecting hacks. The Russians outsmarted it.

Russell Goemaere, a spokesman for the Defense Department, confirmed in a statement to The Washington Post that the Pentagon still owns all the IP address space and hadn’t sold any of it to a private party.

 

Dormant IP addresses can be hijacked and used for nefarious purposes, from disseminating spam to hacking into a computer system and downloading data, and the pilot program could allow the Defense Department to uncover if those activities are taking place using its addresses.

 

A person familiar with the pilot effort, who agreed to speak on the condition of anonymity because the program isn’t public, said it is important for the Defense Department to have “visibility and transparency” into its various cyber resources, including IP addresses, and manage the addresses properly so they will be available if and when the Pentagon wants to use them.

 

“If you can’t see it, you can’t defend it,” the person said.

 

>https://www.msn.com/en-us/news/us/minutes-before-trump-left-office-millions-of-the-pentagon-s-dormant-ip-addresses-sprang-to-life/ar-BB1fZWdK?ocid=msedgdhp