Free Essay

Operation Eligible Receiver

In:

Submitted By SCMLH
Words 563
Pages 3
Operation Eligible Receiver
Operation Eligible Receiver, an interesting attempt by the DOD to show how easily our military computer systems can be hacked into. This exercise was first run in 1997, the intention was to see exactly how vulnerable our military computer systems actually were and “if” with tools readily available on the open internet to accomplish this task, short answer yes. As it turns out there were numerous systems hacked during those two weeks in June 1997. It was a group of National Security Agency officials, which played the role of hacker it was determined that they “could have shut down the U.S. electric-power grid within days and rendered impotent the command-and-control elements of the U.S. Pacific Command” (Gertz). This is the least actually of the concern, if they had truly wanted to they could have disabled computer systems responsible for controlling approximately 100k military troops. The attackers were also able to cover their tracks for the most part, only one of the teams involved was discovered. Most noteworthy would be that the invaders were able to able to “breach the Pentagon’s unclassified global computer network using Internet service providers…” (Gertz). What seems interesting is that there were no special tools used to accomplish any of these breaches. The exercise was handled with standard internet practices and there was nothing released ahead of time. That is what makes these breaches so troubling. Any hacker from any location at any time could have done the same type of damage that the NSA agents did in 1997. Specifically, “their targets included: the National Military Command Center (NMCC) in the Pentagon, USPACOM, USSPACECOM, USTRANSCOM, and USSOCOM” (globalsecurity.org). Given these targets and that they were able to gain “superuser access to in over 36 computer systems which meant they could create new accounts, delete accounts, turn the system off or reformat the server hard drives” (globalsecurity.org), is troubling. It is understandable that there are people in the world who want to see the United States suffer and it is understandable that at the time of this exercise this was a new concern for all involved. The outcome of this exercise showed the flaws in the United States military security structure. A prime example of this is the fact that the common security password for U.S. military systems was “password”. John Hamre, former Secretary of Defense 1997-1999, said in an interview with PBS that “cyber security awareness today is thousands of times stronger than it was five years ago, when we first conducted Eligible Receiver...”. He is right, since the initial exercise, we have learned quite a bit and we now take cyber security much more seriously. Given that the United States is a leader in many arenas on the world stage it stands to reason that we learn from our mistakes at least in this area. Seeing firsthand how vulnerable we truly were at a core level has afforded us an opportunity to tighten up and take much more seriously our cyber security. Reference

Eligible Receiver. Retrieved from http://www.globalsecurity.org/military/ops/eligible- receiver.htm

Hamre, J. Eligible Receiver. Retrieved from http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/hamre.html

Gertz, B. April 16, 1998. NSA's Operation Eligible Receiver. The Washington Times. Retrieved from http://www.infosecnews.org/hypermail/9804/0217.html

Similar Documents

Premium Essay

Zone Blitz Research Paper

...How to Properly Use the Zone Blitz Zone Blitzes are a five man rush package that feature a zone coverage behind them. The starting point for a zone blitz package is a blitz with four defensive linemen and a linebacker (if you are an even front) or three defensive linemen and two linebackers (for odd fronts). Most Zone Blitz packages use a three under, three deep zone coverage behind them. This creates safety because you always have players behind the receivers to make a tackle and line up again if the offense does have success. In man blitz schemes, you are subject to the deep ball and big plays, more so than the Zone Blitz. Some teams also use a 4 under, 2 deep zone coverage behind their Zone Blitzes. Coupling this with the 3 deep zone...

Words: 472 - Pages: 2

Free Essay

Issc361 Assignment 8

...Operation Eligible Receiver was a test conducted by our government utilizing what is called the Red Team, which are basically hackers that are on our side trying to gain entry into our computer network via publicly available tools such as metasploit. It was conducted in 1997, and was the first of its kind (Global Security, 2014). John Hamre, which was the deputy secretary of defense from 1997-1999 said that one of the biggest issues that was shown in operation eligible receiver is the fact that for the first three days, nobody thought that the computers were even under attack even given the pop ups that were showing outside people accessing the computers people were using (Hamre, 2003). I would agree in this aspect in that if users don’t report malicious activity that is being seen at their level, cyber network defenders can’t be expected to just know what is happening at a client level if it isn’t happening to them or being reported. From the information gathered in the interview with Mr. Hamre, it seems that it was relatively easy for the Red Team to gain entry to the physical infrastructure of the computers they were attacking, and also entry into the network itself. The Red Team was able to send emails from outside sources, using credentials of people from inside the network, and create denial of service attacks. The most common targets of the Red Team were intelligence agencies, the national command authority, and military commands. Mainly it was an assessment of our...

Words: 373 - Pages: 2

Free Essay

Operation Receiver

...I found some details on Operation Eligible Reciever 97. Operation Eligible Receiver was a government exercise that was funded by the United States of America government ("C4I.org - The meaning of Eligible Receiver", n.d.). The exercise was planned and executed with little to no notice to the participants ("C4I.org - The meaning of Eligible Receiver", n.d.). The participants were the National Security Agency (NSA), the Central Intelligence Agency (CIA), the Department of Justice (DOJ), the National Reconnaissance Office, the Federal Bureau of Investigation (FBI), the Defense Intelligence Agency (DIA), the Defense Information Systems Agency, and the Department of State (DOS) ("C4I.org - The meaning of Eligible Receiver", n.d.). The National Security Agency was playing as the Red Team. Civilian providers that are critical to the government’s power and communication were also participants. The exercise took place in 1997 and the was a no-notice Joint Staff exercise designed to test DoD planning and crisis action capabilities when faced with attacks on DoD information infrastructures ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). The Red Team was played by the National Security Agency which used hacker techniques and software programs that were freely available on net ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). All of the software or programs they used to hack were available to the public. The National Security Agency had no inside information...

Words: 607 - Pages: 3

Free Essay

Workplace Misunderstandings

...get our point across to another human without sometimes having “crossed wires” and hurt feelings. This paper will discuss two such episodes that I personally encountered in the workplace. I will discuss how the misunderstanding occurred as well as what I learned from the experiences. Did you call me irresponsible? In my current job, I work as a supervisor of tech support personnel for a wireless service provider in an inbound call center. Recently I had a customer that called in at around 3 a.m. and demanded to speak to a supervisor because his device had been lost and he wanted to order a new device. We were willing to make an exception to accommodate him even though he was not eligible for an upgrade, however the customer did not have a credit card with which to pay for the order and was not eligible to bill the order to his account due to his very poor payment history (he had two returned checks within 90 days and his service had been temporarily disconnected for non-payment four times within the past year). As I attempted to explain to the customer that our options were limited and I would not be able to override the inability to bill to account, he asked me to put myself “in his shoes” and understand that “I make my money the same way you do. I’m just a working guy, and if you were in this situation, you would want an exception made.” My response was, “Sir, as a working guy, I too have to ensure that I pay my bill on time in order to keep my account in good standing, and...

Words: 991 - Pages: 4

Premium Essay

Business Courses

...MASENO UNIVERSITY ABA 302:- COMPANY LAW WINDING UP DAVE LUNG’AHO SIGANGA This is the legal process by which a company’s legal existence is brought to an end. It is carried through by a person known as a liquidator who wraps up the company operations by taking control of the Company, collecting the company’s assets, pays the Company’s debts, and then distributes the surplus among the members of the company. The liquidation process involves inter alia; A] Settling the list of contributories B] Collecting the company’s assets; C] Paying the company’s debts and other liabilities D] Distributing the surplus assets among other contributories Priority of Payment 1. Liquidators/ official receivers fees 2. Expenses incurred by the liquidator/ official receiver 3. Petitioner’s expenses 4. Preferential debts 5. Unsecured Creditors 6. Repayment of share capital as per the Company’s Articles of Association 7. The residue will be distributed to the members of the Company Relevant Law The process of winding up is governed by the Company Act Chapter 486 Section 212 [1] provides that the winding up may be either; A] A compulsory winding up by the court or 1 B] A voluntary winding up, which may be either a member’s voluntary winding up, or a creditors voluntary winding up; or C] A winding up subject to the supervision of the High Court. Who may petition? a) The Company Itself: - The Company may by special resolution commence winding up proceedings. It is a Company decision to wind up, not a...

Words: 3046 - Pages: 13

Premium Essay

Hrm Practice

...1.0 Introduction South East Bank Limited has a long and relished heritage. It is second generation banking which was established in 1995 with the vision to stand out as pioneer banking institution in Bangladesh and contribute significantly to the national economy. It was incorporated on March 12, 1995 as a Public Limited Company. Certificate of commencement of business of the bank issued by the Registrar of Joint Stock Companies and Firms was also dated March 12, 1995. The Banking license for the bank was issued by Bangladesh Bank on March 23, 1995. The bank and its first branch at the busiest commercial hub of the country at 1, Dilkusha C/A, Dhaka was opened on May 25, 1995 by Mr. Saifur Rahman. The authorized capital of the bank is BDT 2500 million. It’s paid up capital and reserve reached BDT 2236.84 million as on December 31, 2005. 1.1 Purpose of the Report The manpower is the lifeblood of any service oriented organization. As a private commercial bank, South East Bank Ltd. is playing a very significant role in development of various sectors in Bangladesh economy. In the field of deposit mobilization, Loans and advances, Import and export business, foreign remittance South East Bank is showing best growth performance year after year through its highly skilled human resource. At present a large number of banking and non banking financial institutions are doing their business i.e. the banking business is more competitive for the existence and smooth running of the banking...

Words: 4540 - Pages: 19

Free Essay

Frame Relay Congestion Control

...Frame Relay Congestion Control CIS532004016-201003: Network Architecture and Analysis TABLE OF CONTENTS Chapter 1- Introduction …………………………………………………………. 3 Chapter 2- Background …………………………………………………………. 4 Chapter 3- Review and Findings ………………………………………………. 11 Chapter 4- Conclusion …………………………………………………………. 12 References ……………………………………………………………………... 13 Frame Relay Congestion Control This document is a study of the principles of congestion control within the frame relay protocol. From examining existing congestion management efforts to up and coming possible solutions there are a multiplicity of efforts intent on solving network congestion issues. These efforts include work by independent research groups as well standards groups like the Internet Engineering Task Force (IETF) and IEEE (802.1Qau - Congestion Notification). Congestion is defined as the condition in which demand exceeds available network resources (i.e., bandwidth or buffer space) for a sustained period of time. Congestion control deals with the resource allocation and traffic management mechanisms that avoid or recover from conditions causing congestive situations. (McDysan, Spohn (1999). The methods for congestion control in frame relay involve congestion management and avoidance. Congestion management attempts to make sure the network never experiences congestion. One method of management attempts to avoid congestion entirely. This involves network designers allocating proper resource...

Words: 2007 - Pages: 9

Premium Essay

Dismissal Meeting

...most difficult tasks an office manager can face. There should be steps taken to make sure the process proceeds smoothly. The last thing you want is for a dismissal meeting to end badly. I will propose three ways a manager can cope with negative emotions that may arise with an employee layoff. I will provide a step-by-step process of conducting the dismissal meeting. I will also take a look at the compensation the company may provide to the separated employee and create a chart to depict the timeline of the disbursement of the compensation. Last, I will predict three ways the layoff may affect the company. Three ways to cope with negative emotions Managers may have distinctive reactions to layoffs because they are mediators and receivers of change. “Their reactions are important because they can affect employee morale. Employees pay close attention to manager’s behaviors and messages they send out. The first way to cope with negative emotions is to thoroughly communicate (Dewitt, Trevino, & Monica, Spring 2003)”. Be private and honest with the employee. There is nothing wrong with giving the employee time to vent. They may experience a high level of depression, anxiety, stress, or loss of identity and self-esteem. They may have questions or feel like they deserve an explanation. The second way to cope with negative emotions is by providing help. Have an outplacement program in place that will help displaced employees create a...

Words: 1674 - Pages: 7

Premium Essay

Legal System

...The legal system of the Hong Kong Special Administrative Region (HKSAR) is based on the rule of law and the independence of the judiciary. The constitutional framework for the legal system is provided by the Basic Law sanctioned by the National People’s Congress of the PRC. Under the principle of ‘one country, two systems’, the HKSAR legal system, which is different from that of Mainland China, is based on the common law, supplemented by local legislation. All legislation in force in the HKSAR is accessible on the internet at www.legislation.gov.hk. Law in the HKSAR: The laws in force in the HKSAR include: (1) the Basic Law; (2) national laws listed in Annex III to the Basic Law; (3) the laws, including the common law and the rules of equity, in force before July 1, 1997, apart from a small number of statutory provisions which were declared by the Standing Committee of the National People’s Congress to contravene the Basic Law; and (4) laws enacted by the legislature of the HKSAR. National laws relating to defence, foreign affairs and other matters outside the limits of the autonomy of the HKSAR may be listed in Annex III to the Basic Law for application in the HKSAR by way of promulgation or legislation by the HKSAR. Currently, 12 national laws are included in Annex III to the Basic Law. The Judiciary: It is fundamental to Hong Kong’s legal system that members of the judiciary are independent of the executive and legislative branches of government...

Words: 2594 - Pages: 11

Free Essay

End to End Congestion Control for Tcp

...IJCST Vol. 3, Issue 4, Oct - Dec 2012 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) End-to-End Congestion Control for TCP 1 1 K. Pavan Kumar, 2Y. Padma Dept. of CSE, Usha Rama College of Engineering and Technology, Telaprolu, AP, India 2 Dept. of IT, PVP Siddhartha Institute of Technology, Kanuru, Vijayawada, AP, India Abstract Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. However, networks with wireless and other lossy links also suffer from significant losses due to bit errors and handoffs. TCP responds to all losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance in wireless and lossy systems. The proposed solutions focus on a variety of problems, starting with the basic problem of eliminating the phenomenon of congestion collapse, and also include the problems of effectively using the available network resources in different types of environments (wired, wireless, high-speed, long-delay, etc.). In a shared, highly distributed, and heterogeneous environment such as the Internet, effective network use depends not only on how well a single TCP based application can utilize the network capacity, but also on how well it cooperates with other applications transmitting data through the same network. Our survey shows that over the last 20 years many host-to-host techniques have been developed...

Words: 3640 - Pages: 15

Premium Essay

Thesis

...of Northern University of Bangladesh. This report focuses three months working experiences in National Credit and Commerce Bank Limited, Foreign Exchange Branch. This report will give a clear idea about the activities and operational strategies of National Credit and Commerce Bank Limited.The whole working process of NCCBL is divided into 3 sections-(1) General Banking, (2) Credit Section, (3) Foreign Exchange. Here first chapters basically discuss about the background of the report, objectives and methodologies used in preparation of the report and limitation faced at preparation. The main objective is to identify the various activities provided to customers by National Credit and Commerce bank Ltd. and descriptive analysis about their operation. Next I have tried to concentrate on Internship duties and banking function (general banking, loan and advances and foreign exchange business) and marketing part on the basis of some specific topics.The objective of the internship program was to familiarize the student with the practical implementation of the knowledge provides the theoretical aspects of the practical life. It is a pleasure for me to submit the internship report titled “Overall Banking System of the National Credit and Commerce Bank Limited” While preparing this report; I have tried to gather as much information as possible. 1.1 Introduction: Bachelor of Business...

Words: 11059 - Pages: 45

Premium Essay

Zigbee Case Study

...Network Management using ZigBee” Ms. Bhoomi Gupta Senior Lecturer, Maharaja Agrasen Institute of Technology, GGSIPU, Delhi guptabhoomi@gmail.com Amit Goel Student, B.Tech (CSE) Maharaja Agrasen Institute Of Technology GGSIPU, Delhi amit_goel86@yahoo.com Dheryta Student, B.Tech (CSE) Maharaja Agrasen Institute Of Technology GGSIPU, Delhi dheryta@gmail.com ABSTRACT Currently implemented vehicular management systems are using RFID and other such type of technologies and thus suffer from various flaws, inefficiencies and disadvantages.[7] We hereby propose an application of ZigBee wireless protocol for vehicle to vehicle management in the applications like toll deduction, collision detection etc. We have studied principles of ZigBee network operations and simulated the traffic scenario using NS2, generated various graphs on the basis of simulations obtained from NS2 and finally using the statistics generated, we have concluded that ZigBee is an highly efficient wireless network protocol and is capable of overcoming the discrepancies of existing methodologies. KEYWORDS Zigbee, Vehicle Management, IEEE 802.15.4, Beacon Frames BACKGROUND AND MOTIVATION As the technology is advancing, we are entering into an era where there is no space for waiting time and errors. We require a system that is capable of handling heavy traffic on the high-tech roads, especially toll deduction roads. Currently implemented systems are either manual or they use technologies like RFID that fail under certain...

Words: 2038 - Pages: 9

Premium Essay

Aca1 Task 2 Individual Federal Tax Return

...ACA1 Task 2 Write an essay in which you recommend the most advantageous tax filing status for Spouse A and Spouse B on their federal tax return. The filing statuses available to the taxpayer couple are married filing jointly, and married filing separately. The best filing status for Spouse A and B is married; filing jointly. Both spouse A and B have separate income for the year and so could file separate returns but they would also have to file at a higher tax rate schedule because their income is not combined. They would be required to claim any exemptions, deductions, and credits available separately. The couple is also precluded from filing a dependent twice so if A were to file for one of their 3 dependents then B could not claim the same dependent. The couple will qualify for 5 exemptions if filing together: 1 for spouse A, 1 for spouse B, 2 for the minor children, and 1 for the student adult child. Spouse B’s mother (whom lives with the couple) receives social security benefits in the amount of $750 per month she contributes all but $90 a month to the household. Since this amounts to $7920 and the couple contributed $7000 to the mother, they provided less than half of her support and so cannot claim her as an exemption. (Hoffman, et al, 2011). When addressing taxable and non-taxable income, it is mandatory that all income be reported on the return but only the portions subject to tax will be tax assessed. Spouse A has a K-1 from the partnership which shows $142,000...

Words: 3310 - Pages: 14

Free Essay

Faa Noise Control & Compatibility Planning

...Federal Aviation Authority Advisory Circular (AC) 150/5020-1 Noise Control and Compatibility Planning Eric v. Walker Embry Riddle Aeronautical University ASCI-617 Airport Safety and Certification 01 October, 2012   ABSTRACT This paper attempts to summarize key points such as the purpose, intent, and contents of the Federal Aviation Authority (FAA) Advisory Circular 150/5020-1 on Noise Control and Compatibility planning for Airports. The effect of noise on communities around the United States and has been a well-publicized concern of both airport managers and legislatures from both local and national levels. The federal government has been addressing the issue from as early as the 1920’s, but demand for change in the effects of airport and airplane related noise truly came to the forefront with the growth of use in jet engine driven aircraft and vast increases in air travel across the country. Today, the primary objective is to create a cooperative environment where airports, communities, professionals, and legislatures work as a team in utilizing the available mitigating options to ensure noise is much less of an irritant and well-managed in relation to land use in and around airports.   Advisory Circular (Ac) 150/5020-1 Noise Control and Compatibility Planning Federal Aviation Regulation (FAR) Part 150 is the governing document provided to establish and sustaining guidelines to be used by airports in planning for expansion and development. The FAR Part 150...

Words: 2731 - Pages: 11

Premium Essay

Data Security

...I. ------------------------------------------------- Chapter 2: Context and Background I n this chapter, we introduce the main concepts related to the problem we are addressing, in order to provide the casual reader with the necessary background information for this dissertation. As the title of this thesis is “Analysis of Security and QoS in Network with time constraints”, it is clear that our work requires a deep understanding of three main topics: security, Quality of Service (QoS) and network applications with time constraints. These three fundamental topics will be addressed in this chapter. 2.1. Security In today's business environment, users demand seamless connectivity and stable access to servers and networks wherever they are: hotels, airports, homes, or remote offices. While these functionalities are useful for business, they can only be diffused as such if we can minimize the security risks of transmitting sensitive data across the Internet. 2.2.1. Security Definition (Security Properties) Protecting information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction in order to provide confidentiality, integrity, and availability is the main goal of information security [NIST 2009]. Security is the ability of a computer system to withstand external physical stresses (fire, flooding, bombs, etc.) or logic (input errors, intrusions, hacking, malicious logic, etc.); this is generally the direction...

Words: 8305 - Pages: 34