THE
SECRET WAR
Infiltration,
sabotage, hayhem. For years Four-Star general Keuth Alexander has
been building a secret army cabble of launching devastating
cyberattacks.
NOW
IT’S READY TO UNLEASH HELL.
12
June, 2013
INSIDE
FORT MEADE, Maryland, a top-secret city bustles. Tens of thousands of
people move through more than 50 buildings—the city has its own
post office, fire department, and police force. But as if designed by
Kafka, it sits among a forest of trees, surrounded by electrified
fences and heavily armed guards, protected by antitank barriers,
monitored by sensitive motion detectors, and watched by rotating
cameras. To block any telltale electromagnetic signals from escaping,
the inner walls of the buildings are wrapped in protective copper
shielding and the one-way windows are embedded with a fine copper
mesh.
This
is the undisputed domain of General Keith Alexander, a man few even
in Washington would likely recognize. Never before has anyone in
America’s intelligence sphere come close to his degree of power,
the number of people under his command, the expanse of his rule, the
length of his reign, or the depth of his secrecy. A four-star Army
general, his authority extends across three domains: He is director
of the world’s largest intelligence service, the National Security
Agency; chief of the Central Security Service; and commander of the
US Cyber Command. As such, he has his own secret military, presiding
over the Navy’s 10th Fleet, the 24th Air Force, and the Second
Army.
Alexander
runs the nation’s cyberwar efforts, an empire he has built over the
past eight years by insisting that the US’s inherent vulnerability
to digital attacks requires him to amass more and more authority over
the data zipping around the globe. In his telling, the threat is so
mind-bogglingly huge that the nation has little option but to
eventually put the entire civilian Internet under his protection,
requiring tweets and emails to pass through his filters, and putting
the kill switch under the government’s forefinger. “What we see
is an increasing level of activity on the networks,” he said at a
recent security conference in Canada. “I am concerned that this is
going to break a threshold where the private sector can no longer
handle it and the government is going to have to step in.”
In
its tightly controlled public relations, the NSA has focused
attention on the threat of cyberattack against the US—the
vulnerability of critical infrastructure like power plants and water
systems, the susceptibility of the military’s command and control
structure, the dependence of the economy on the Internet’s smooth
functioning. Defense against these threats was the paramount mission
trumpeted by NSA brass at congressional hearings and hashed over at
security conferences.
But
there is a flip side to this equation that is rarely mentioned: The
military has for years been developing offensive capabilities, giving
it the power not just to defend the US but to assail its foes. Using
so-called cyber-kinetic attacks, Alexander and his forces now have
the capability to physically destroy an adversary’s equipment and
infrastructure, and potentially even to kill. Alexander—who
declined to be interviewed for this article—has concluded that such
cyberweapons are as crucial to 21st-century warfare as nuclear arms
were in the 20th.
And
he and his cyberwarriors have already launched their first attack.
The cyberweapon that came to be known as Stuxnet was created and
built by the NSA in partnership with the CIA and Israeli intelligence
in the mid-2000s. The first known piece of malware designed to
destroy physical equipment, Stuxnet was aimed at Iran’s nuclear
facility in Natanz. By surreptitiously taking control of an
industrial control link known as a Scada (Supervisory Control and
Data Acquisition) system, the sophisticated worm was able to damage
about a thousand centrifuges used to enrich nuclear material.
The
success of this sabotage came to light only in June 2010, when the
malware spread to outside computers. It was spotted by independent
security researchers, who identified telltale signs that the worm was
the work of thousands of hours of professional development. Despite
headlines around the globe, officials in Washington have never openly
acknowledged that the US was behind the attack. It wasn’t until
2012 that anonymous sources within the Obama administration took
credit for it in interviews with The New York Times.
But
Stuxnet is only the beginning. Alexander’s agency has recruited
thousands of computer experts, hackers, and engineering PhDs to
expand US offensive capabilities in the digital realm. The Pentagon
has requested $4.7 billion for “cyberspace operations,” even as
the budget of the CIA and other intelligence agencies could fall by
$4.4 billion. It is pouring millions into cyberdefense contractors.
And more attacks may be planned.
Inside
the government, the general is regarded with a mixture of respect and
fear, not unlike J. Edgar Hoover, another security figure whose
tenure spanned multiple presidencies. “We jokingly referred to him
as Emperor Alexander—with good cause, because whatever Keith wants,
Keith gets,” says one former senior CIA official who agreed to
speak on condition of anonymity. “We would sit back literally in
awe of what he was able to get from Congress, from the White House,
and at the expense of everybody else.”
Now
61, Alexander has said he plans to retire in 2014; when he does step
down he will leave behind an enduring legacy—a position of
far-reaching authority and potentially Strangelovian powers at a time
when the distinction between cyberwarfare and conventional warfare is
beginning to blur. A recent Pentagon report made that point in
dramatic terms. It recommended possible deterrents to a cyberattack
on the US. Among the options: launching nuclear weapons
He
may be a four-star Army general, but Alexander more closely resembles
a head librarian than George Patton. His face is anemic, his lips a
neutral horizontal line. Bald halfway back, he has hair the color of
strong tea that turns gray on the sides, where it is cut close to the
skin, more schoolboy than boot camp. For a time he wore large rimless
glasses that seemed to swallow his eyes. Some combat types had a
derisive nickname for him: Alexander the Geek.
Born
in 1951, the third of five children, Alexander was raised in the
small upstate New York hamlet of Onondaga Hill, a suburb of Syracuse.
He tossed papers for the Syracuse Post-Standard and ran track at
Westhill High School while his father, a former Marine private, was
involved in local Republican politics. It was 1970, Richard Nixon was
president, and most of the country had by then begun to see the war
in Vietnam as a disaster. But Alexander had been accepted at West
Point, joining a class that included two other future four-star
generals, David Petraeus and Martin Dempsey. Alexander would never
get the chance to serve in Vietnam. Just as he stepped off the bus at
West Point, the ground war finally began winding down.
In
April 1974, just before graduation, he married his high school
classmate Deborah Lynn Douglas, who grew up two doors away in
Onondaga Hill. The fighting in Vietnam was over, but the Cold War was
still bubbling, and Alexander focused his career on the solitary,
rarefied world of signals intelligence, bouncing from secret NSA base
to secret NSA base, mostly in the US and Germany. He proved a
competent administrator, carrying out assignments and adapting to the
rapidly changing high tech environment. Along the way he picked up
masters degrees in electronic warfare, physics, national security
strategy, and business administration. As a result, he quickly rose
up the military intelligence ranks, where expertise in advanced
technology was at a premium.
In
2001, Alexander was a one-star general in charge of the Army
Intelligence and Security Command, the military’s worldwide network
of 10,700 spies and eavesdroppers. In March of that year he told his
hometown Syracuse newspaper that his job was to discover threats to
the country. “We have to stay out in front of our adversary,”
Alexander said. “It’s a chess game, and you don’t want to lose
this one.” But just six months later, Alexander and the rest of the
American intelligence community suffered a devastating defeat when
they were surprised by the attacks on 9/11. Following the assault, he
ordered his Army intercept operators to begin illegally monitoring
the phone calls and email of American citizens who had nothing to do
with terrorism, including intimate calls between journalists and
their spouses. Congress later gave retroactive immunity to the
telecoms that assisted the government.
In
2003 Alexander, a favorite of defense secretary Donald Rumsfeld, was
named the Army’s deputy chief of staff for intelligence, the
service’s most senior intelligence position. Among the units under
his command were the military intelligence teams involved in the
human rights abuses at Baghdad’s Abu Ghraib prison. Two years
later, Rumsfeld appointed Alexander—now a three-star
general—director of the NSA, where he oversaw the illegal,
warrantless wiretapping program while deceiving members of the House
Intelligence Committee. In a publicly released letter to Alexander
shortly after The New York Times exposed the program, US
representative Rush Holt, a member of the committee, angrily took him
to task for not being forthcoming about the wiretapping: “Your
responses make a mockery of congressional oversight.”
Alexander
also proved to be militant about secrecy. In 2005 a senior agency
employee named Thomas Drake allegedly gave information to The
Baltimore Sun showing that a publicly discussed program known as
Trailblazer was millions of dollars overbudget, behind schedule,
possibly illegal, and a serious threat to privacy. In response,
federal prosecutors charged Drake with 10 felony counts, including
retaining classified documents and making false statements. He faced
up to 35 years in prison—despite the fact that all of the
information Drake was alleged to have leaked was not only
unclassified and already in the public domain but in fact had been
placed there by NSA and Pentagon officials themselves. (As a longtime
chronicler of the NSA, I served as a consultant for Drake’s defense
team. The investigation went on for four years, after which Drake
received no jail time or fine. The judge, Richard D. Bennett,
excoriated the prosecutor and NSA officials for dragging their feet.
“I find that unconscionable. Unconscionable,” he said during a
hearing in 2011. “That’s four years of hell that a citizen goes
through. It was not proper. It doesn’t pass the smell test.”)
But
while the powers that be were pressing for Drake’s imprisonment, a
much more serious challenge was emerging. Stuxnet, the cyberweapon
used to attack the Iranian facility in Natanz, was supposed to be
untraceable, leaving no return address should the Iranians discover
it. Citing anonymous Obama administration officials, The New York
Times reported that the malware began replicating itself and
migrating to computers in other countries. Cybersecurity
detectives were thus able to detect and analyze it. By the summer of
2010 some were pointing fingers at the US.
Natanz
is a small, dusty town in central Iran known for its plump pears and
the burial vault of the 13th-century Sufi sheikh Abd al-Samad. The
Natanz nuclear enrichment plant is a vault of a different kind.
Tucked in the shadows of the Karkas Mountains, most of it lies deep
underground and surrounded by concrete walls 8 feet thick, with
another layer of concrete for added security. Its bulbous concrete
roof rests beneath more than 70 feet of packed earth. Contained
within the bombproof structure are halls the size of soccer pitches,
designed to hold thousands of tall, narrow centrifuges. The machines
are linked in long cascades that look like tacky decorations from a
’70s discotheque.
To
work properly, the centrifuges need strong, lightweight,
well-balanced rotors and high-speed bearings. Spin these rotors too
slowly and the critical U-235 molecules inside fail to separate; spin
them too quickly and the machines self-destruct and may even explode.
The operation is so delicate that the computers controlling the
rotors’ movement are isolated from the Internet by a so-called air
gap that prevents exposure to viruses and other malware.
In
2006, the Department of Defense gave the go-ahead to the NSA to begin
work on targeting these centrifuges, according to The New York Times.
One of the first steps was to build a map of the Iranian nuclear
facility’s computer networks. A group of hackers known as Tailored
Access Operations—a highly secret organization within the NSA—took
up the challenge.
They
set about remotely penetrating communications systems and networks,
stealing passwords and data by the terabyte. Teams of “vulnerability
analysts” searched hundreds of computers and servers for security
holes, according to a former senior CIA official involved in the
Stuxnet program. Armed with that intelligence, so-called network
exploitation specialists then developed software implants known as
beacons, which worked like surveillance drones, mapping out a
blueprint of the network and then secretly communicating the data
back to the NSA. (Flame, the complex piece of surveillance malware
discovered by Russian cybersecurity experts last year, was likely one
such beacon.) The surveillance drones worked brilliantly. The NSA was
able to extract data about the Iranian networks, listen to and record
conversations through computer microphones, even reach into the
mobile phones of anyone within Bluetooth range of a compromised
machine.
The
next step was to create a digital warhead, a task that fell to the
CIA Clandestine Service’s Counter-Proliferation Division. According
to the senior CIA official, much of this work was outsourced to
national labs, notably Sandia in Albuquerque, New Mexico. So by the
mid-2000s, the government had developed all the fundamental
technology it needed for an attack. But there was still a major
problem: The secretive agencies had to find a way to access Iran’s
most sensitive and secure computers, the ones protected by the air
gap. For that, Alexander and his fellow spies would need outside
help.
This
is where things get murky. One possible bread crumb trail leads to an
Iranian electronics and computer wholesaler named Ali Ashtari, who
later confessed that he was recruited as a spy by the Mossad,
Israel’s intelligence service. (Israel denied the claim.) Ashtari’s
principal customers were the procurement officers for some of Iran’s
most sensitive organizations, including the intelligence service and
the nuclear enrichment plants. If new computers were needed or
routers or switches had to be replaced, Ashtari was the man to see,
according to reports from semi-official Iranian news agencies and an
account of Ashtari’s trial published by the nonprofit Iran Human
Rights Voice.
To
read the rest of this excellent article GO
HERE

No comments:
Post a Comment
Note: only a member of this blog may post a comment.