The Pentagon Wants a Secretive Cyber Arms Dealer To Hack Its Networks. Is this a good idea? https://www.rallypoint.com/answers/the-pentagon-wants-a-secretive-cyber-arms-dealer-to-hack-its-networks-is-this-a-good-idea <div class="images-v2-count-0"></div><a target="_blank" href="http://www.defenseone.com/technology/2015/08/pentagon-wants-secretive-cyber-arms-dealer-hack-its-networks/118928/?oref=d-river">http://www.defenseone.com/technology/2015/08/pentagon-wants-secretive-cyber-arms-dealer-hack-its-networks/118928/?oref=d-river</a><br /><br />Note: This is what those in the IT industry call "ethical hacking." It is a valuable security tool in helping to find bugs and other flaws in networks, software, etc. and in many cases can tell you how to fix those flaws. However it also has the potential to help commit counter-hacking which may not be illegal but can certainly be considered unethical. What are your thoughts?<br /><br />The protection arm of the U.S. Cyber Command says it needs products from Endgame, a company known for crafting hacking tools, but purely to safeguard military networks.<br /><br />The once uber-secretive vendor is part of the cyber arms trade, a legal but controversial industry that sells governments so-called exploits, or “zero days” in information security parlance. Endgame’s traditional goods are tailored to find and exploit bugs in software that developers have not discovered yet. Typically, the malware is deployed to help disrupt or tap an adversary’s systems. <br /><br />The tools for Cyber Command “cyber protection teams,” however, will not be used to attack adversary networks, but rather to find weaknesses in the dot-mil domain, according to the Air Force, which is managing the purchases.<br /><br />“The contract in question does not include any offensive cyber capabilities,” Air Force spokeswoman 1st Lt. Samantha Degnan toldNextgov. “The tools being provided are strictly defensive in nature and allow us to assess the vulnerabilities within our own networks to improve our defenses.” <br /><br />Cyber Command protection teams are divided among various regional combatant commands and all the military branches. The Air Force declined to identify who will use the Endgame technologies because of operational concerns. <br /><br />“In order to achieve an all-inclusive network discovery and defensive awareness,” Degnan said, “the government requires the capability to visualize network scans, keeping us continuously informed of our network status, as well as the targeted web crawl, which is a more thorough and detailed reporting tool that continually crawls through a network reporting network data, architecture, etc.”<br /><br />An Aug. 4 Air Force notice of proposed contract action does not include the deal’s value. In April, the Air Force arranged a similar Endgame agreement for Marine Corps cyber protection teams worth $2.64 million.<br /><br />Over the past year couple of years, Endgame has begun marketing its information security products to businesses and become more open about its government services.<br /><br />Regarding CYBERCOM cyber protection teams, Endgame CEO Nate Fick said, “we empower them to hunt adversaries within their networks and monitor for potential attacks emerging from outside their environment,” adding that, “these are critical capabilities for our clients who seek to take a proactive stance and minimize the impact of any possible attack.”<br /><br />Endgame founder and former CEO Chris Rouland has championed the right of data breach victims to “hack back” with preemptive or retaliatory strikes, journalist Shane Harris wrote in his 2014 book, “@War: The Rise of the Military-Internet Complex.” <br /><br />“Eventually we need to enable corporations in this country to be able to fight back,” Rouland said during a panel discussion at a conference on ethics and international affairs in New York in September 2013. Although Rouland emphasized he was voicing his personal views, he said American companies would never be free from breaches unless they retaliated, Harris reported. <br /><br />Endgame is expected to clinch the new cyber protection team contract without competition, according to the Aug. 4 notice. “A sole source justification will be attached to the subsequent notice of award,” Air Force officials said in the listing.<br /><br />The Best Defense is A Good Offense<br /><br />Some military scholars say Pentagon network logs and sensors are insufficient to safeguard Defense’s information assets, so offensive capabilities such as Endgame’s tried-and-true exploits might be helpful.<br /><br />“Defense is not just about keeping bad guys out of networks and/or ejecting them once in,” said Peter W. Singer, strategist and senior fellow at the New America Foundation. ”It’s also about monitoring them as they build toward an attack or while carrying it out, or even taking away their ability to command, control, and or conduct the attack.”<br /><br />The April justification for buying Endgame systems details the features of two products, Lightstorm and Torchpoint. They have the capability to:<br /><br /> Identify network devices within defended enclaves without privileged access to these systems <br /> Be scalable and interoperable with customized data sets and/or third-party data sources <br /> Command and control cyberspace assets and tools<br /> Remotely deploy agents to nonpermissive environments through a secure command and control infrastructure using a Web-based interface<br /> Operate in an assured manner (both system operations and communication mechanisms) across Windows and Linux platforms<br /> Perform post deployment management, visualization and reporting on all tools via a common Web interface <br /><br />Items on the new shopping list include Endgame’s Torchpoint Application, Command and Control Application Torchpoint Hunt Package, Torchpoint Listening Post, and Torchpoint Agent Stealth Package. No product descriptions were provided. <br /><br />There are three types of Cyber Command teams: cyber protection teams, combat mission teams that can conduct offensive operations against adversaries, and national mission teams that deflect incoming hacks targeting critical U.S. sectors. The CYBERCOM workforce is slated to number 6,200 in 2016, composed of 133 teams.<br /><br />Right now, the command is about halfway full, Cyber Command head Adm. Mike Rogers said July 23, at the Aspen Security Forum in Colorado.<br /><br />(See also: How To Avoid All-Out War in Cyberspace)<br /><br />“The initial teams on the defensive side in that first mission set are deployed literally around the world defending DOD networks,” Rogers said. Right before leaving Washington for the event, “the last thing I did before I left D.C. last night to be honest was I authorized the deployment of one team to work one particular issue somewhere in the world.” He declined to describe the issue. <div class="pta-link-card answers-template-image type-default"> <div class="pta-link-card-picture"> <img src="https://d26horl2n8pviu.cloudfront.net/link_data_pictures/images/000/019/468/qrc/open-graph.jpg?1443050659"> </div> <div class="pta-link-card-content"> <p class="pta-link-card-title"> <a target="blank" href="http://www.defenseone.com/technology/2015/08/pentagon-wants-secretive-cyber-arms-dealer-hack-its-networks/118928/?oref=d-river">The Pentagon Wants a Secretive Cyber Arms Dealer To Hack Its Networks</a> </p> <p class="pta-link-card-description">The company, Endgame, is part of a legal but controversial industry that sells governments hacking tools called &#39;zero days&#39; to pinpoint vulnerabilities.</p> </div> <div class="clearfix"></div> </div> Fri, 07 Aug 2015 07:14:29 -0400 The Pentagon Wants a Secretive Cyber Arms Dealer To Hack Its Networks. Is this a good idea? https://www.rallypoint.com/answers/the-pentagon-wants-a-secretive-cyber-arms-dealer-to-hack-its-networks-is-this-a-good-idea <div class="images-v2-count-0"></div><a target="_blank" href="http://www.defenseone.com/technology/2015/08/pentagon-wants-secretive-cyber-arms-dealer-hack-its-networks/118928/?oref=d-river">http://www.defenseone.com/technology/2015/08/pentagon-wants-secretive-cyber-arms-dealer-hack-its-networks/118928/?oref=d-river</a><br /><br />Note: This is what those in the IT industry call "ethical hacking." It is a valuable security tool in helping to find bugs and other flaws in networks, software, etc. and in many cases can tell you how to fix those flaws. However it also has the potential to help commit counter-hacking which may not be illegal but can certainly be considered unethical. What are your thoughts?<br /><br />The protection arm of the U.S. Cyber Command says it needs products from Endgame, a company known for crafting hacking tools, but purely to safeguard military networks.<br /><br />The once uber-secretive vendor is part of the cyber arms trade, a legal but controversial industry that sells governments so-called exploits, or “zero days” in information security parlance. Endgame’s traditional goods are tailored to find and exploit bugs in software that developers have not discovered yet. Typically, the malware is deployed to help disrupt or tap an adversary’s systems. <br /><br />The tools for Cyber Command “cyber protection teams,” however, will not be used to attack adversary networks, but rather to find weaknesses in the dot-mil domain, according to the Air Force, which is managing the purchases.<br /><br />“The contract in question does not include any offensive cyber capabilities,” Air Force spokeswoman 1st Lt. Samantha Degnan toldNextgov. “The tools being provided are strictly defensive in nature and allow us to assess the vulnerabilities within our own networks to improve our defenses.” <br /><br />Cyber Command protection teams are divided among various regional combatant commands and all the military branches. The Air Force declined to identify who will use the Endgame technologies because of operational concerns. <br /><br />“In order to achieve an all-inclusive network discovery and defensive awareness,” Degnan said, “the government requires the capability to visualize network scans, keeping us continuously informed of our network status, as well as the targeted web crawl, which is a more thorough and detailed reporting tool that continually crawls through a network reporting network data, architecture, etc.”<br /><br />An Aug. 4 Air Force notice of proposed contract action does not include the deal’s value. In April, the Air Force arranged a similar Endgame agreement for Marine Corps cyber protection teams worth $2.64 million.<br /><br />Over the past year couple of years, Endgame has begun marketing its information security products to businesses and become more open about its government services.<br /><br />Regarding CYBERCOM cyber protection teams, Endgame CEO Nate Fick said, “we empower them to hunt adversaries within their networks and monitor for potential attacks emerging from outside their environment,” adding that, “these are critical capabilities for our clients who seek to take a proactive stance and minimize the impact of any possible attack.”<br /><br />Endgame founder and former CEO Chris Rouland has championed the right of data breach victims to “hack back” with preemptive or retaliatory strikes, journalist Shane Harris wrote in his 2014 book, “@War: The Rise of the Military-Internet Complex.” <br /><br />“Eventually we need to enable corporations in this country to be able to fight back,” Rouland said during a panel discussion at a conference on ethics and international affairs in New York in September 2013. Although Rouland emphasized he was voicing his personal views, he said American companies would never be free from breaches unless they retaliated, Harris reported. <br /><br />Endgame is expected to clinch the new cyber protection team contract without competition, according to the Aug. 4 notice. “A sole source justification will be attached to the subsequent notice of award,” Air Force officials said in the listing.<br /><br />The Best Defense is A Good Offense<br /><br />Some military scholars say Pentagon network logs and sensors are insufficient to safeguard Defense’s information assets, so offensive capabilities such as Endgame’s tried-and-true exploits might be helpful.<br /><br />“Defense is not just about keeping bad guys out of networks and/or ejecting them once in,” said Peter W. Singer, strategist and senior fellow at the New America Foundation. ”It’s also about monitoring them as they build toward an attack or while carrying it out, or even taking away their ability to command, control, and or conduct the attack.”<br /><br />The April justification for buying Endgame systems details the features of two products, Lightstorm and Torchpoint. They have the capability to:<br /><br /> Identify network devices within defended enclaves without privileged access to these systems <br /> Be scalable and interoperable with customized data sets and/or third-party data sources <br /> Command and control cyberspace assets and tools<br /> Remotely deploy agents to nonpermissive environments through a secure command and control infrastructure using a Web-based interface<br /> Operate in an assured manner (both system operations and communication mechanisms) across Windows and Linux platforms<br /> Perform post deployment management, visualization and reporting on all tools via a common Web interface <br /><br />Items on the new shopping list include Endgame’s Torchpoint Application, Command and Control Application Torchpoint Hunt Package, Torchpoint Listening Post, and Torchpoint Agent Stealth Package. No product descriptions were provided. <br /><br />There are three types of Cyber Command teams: cyber protection teams, combat mission teams that can conduct offensive operations against adversaries, and national mission teams that deflect incoming hacks targeting critical U.S. sectors. The CYBERCOM workforce is slated to number 6,200 in 2016, composed of 133 teams.<br /><br />Right now, the command is about halfway full, Cyber Command head Adm. Mike Rogers said July 23, at the Aspen Security Forum in Colorado.<br /><br />(See also: How To Avoid All-Out War in Cyberspace)<br /><br />“The initial teams on the defensive side in that first mission set are deployed literally around the world defending DOD networks,” Rogers said. Right before leaving Washington for the event, “the last thing I did before I left D.C. last night to be honest was I authorized the deployment of one team to work one particular issue somewhere in the world.” He declined to describe the issue. <div class="pta-link-card answers-template-image type-default"> <div class="pta-link-card-picture"> <img src="https://d26horl2n8pviu.cloudfront.net/link_data_pictures/images/000/019/468/qrc/open-graph.jpg?1443050659"> </div> <div class="pta-link-card-content"> <p class="pta-link-card-title"> <a target="blank" href="http://www.defenseone.com/technology/2015/08/pentagon-wants-secretive-cyber-arms-dealer-hack-its-networks/118928/?oref=d-river">The Pentagon Wants a Secretive Cyber Arms Dealer To Hack Its Networks</a> </p> <p class="pta-link-card-description">The company, Endgame, is part of a legal but controversial industry that sells governments hacking tools called &#39;zero days&#39; to pinpoint vulnerabilities.</p> </div> <div class="clearfix"></div> </div> PO1 John Miller Fri, 07 Aug 2015 07:14:29 -0400 2015-08-07T07:14:29-04:00 Response by SGT Ben Keen made Aug 7 at 2015 8:08 AM https://www.rallypoint.com/answers/the-pentagon-wants-a-secretive-cyber-arms-dealer-to-hack-its-networks-is-this-a-good-idea?n=871541&urlhash=871541 <div class="images-v2-count-0"></div>Pen Tests are done all the time in every industry. As someone that works in IT, I&#39;ve been on both sides of this coin. These tests are done in a controlled and monitored way and ensures that the security in place actually works. SGT Ben Keen Fri, 07 Aug 2015 08:08:49 -0400 2015-08-07T08:08:49-04:00 Response by SPC Robert Patrick made Aug 7 at 2015 11:54 AM https://www.rallypoint.com/answers/the-pentagon-wants-a-secretive-cyber-arms-dealer-to-hack-its-networks-is-this-a-good-idea?n=872179&urlhash=872179 <div class="images-v2-count-0"></div>Actually this is a really good idea because it will allow coders to figure out where the security protocols are weak and can allow them to make changes where necessary. SPC Robert Patrick Fri, 07 Aug 2015 11:54:02 -0400 2015-08-07T11:54:02-04:00 Response by TSgt David Blakley made Aug 7 at 2015 10:34 PM https://www.rallypoint.com/answers/the-pentagon-wants-a-secretive-cyber-arms-dealer-to-hack-its-networks-is-this-a-good-idea?n=873734&urlhash=873734 <div class="images-v2-count-0"></div>The company &quot;Endgame&quot; isn&#39;t controversial. In fact most people working for them are retired Army and Air Force cyber techs that have VERY HIGH security clearances (OPSEC in mind here). I had a colleague at Vandenberg AFB, Calif. that left the Air Force (as a Captain who didn&#39;t retire) to go work for Endgame because they offered him six figures to start. TSgt David Blakley Fri, 07 Aug 2015 22:34:52 -0400 2015-08-07T22:34:52-04:00 Response by SSgt Alex Robinson made Aug 8 at 2015 2:55 AM https://www.rallypoint.com/answers/the-pentagon-wants-a-secretive-cyber-arms-dealer-to-hack-its-networks-is-this-a-good-idea?n=874041&urlhash=874041 <div class="images-v2-count-0"></div>As long as they are white hat hackers doing it to strengthen the security imagine with it SSgt Alex Robinson Sat, 08 Aug 2015 02:55:26 -0400 2015-08-08T02:55:26-04:00 2015-08-07T07:14:29-04:00