Agnostic.com

2 2

LINK The Florida mystery of dormant Pentagon IP addresses - The Washington Post

Minutes before Trump left office, millions of the Pentagon’s dormant IP addresses sprang to life.

HankHunter13 7 Apr 27
Share

Enjoy being online again!

Welcome to the community of good people who base their values on evidence and appreciate civil discourse - the social network you will enjoy.

Create your free account

2 comments

Feel free to reply to any comment by clicking the "Reply" button.

1
1

WP paywalled. Fuck Jeff Bezos.

The Florida mystery of dormant Pentagon IP addresses - The Washington Post
www.washingtonpost.com
By
Craig Timberg and
Paul Sonne
April 24, 2021 at 12:19 p.m. UTC
While the world was distracted with President Donald Trump leaving office on Jan. 20, an obscure Florida company discreetly announced to the world’s computer networks a startling development: It now was managing a huge unused swath of the Internet that, for several decades, had been owned by the U.S. military.

Support our journalism. Subscribe today.
What happened next was stranger still.

The company, Global Resource Systems LLC, kept adding to its zone of control. Soon it had claimed 56 million IP addresses owned by the Pentagon. Three months later, the total was nearly 175 million. That’s almost 6 percent of a coveted traditional section of Internet real estate — called IPv4 — where such large chunks are worth billions of dollars on the open market.

Story continues below advertisement
The entities controlling the largest swaths of the Internet generally are telecommunications giants whose names are familiar: AT&T, China Telecom, Verizon. But now at the top of the list was Global Resource Systems — a company founded only in September that has no publicly reported federal contracts and no obvious public-facing website.

Advertisement
As listed in records, the company’s address in Plantation, Fla., outside Fort Lauderdale, is a shared workspace in an office building that doesn’t show Global Resource Systems on its lobby directory. A receptionist at the shared workspace said Friday that she could provide no information about the company and asked a reporter to leave. The company did not respond to requests for comment.

The only announcement of Global Resource Systems’ management of Pentagon addresses happened in the obscure world of Border Gateway Protocol (BGP) — the messaging system that tells Internet companies how to route traffic across the world. There, messages began to arrive telling network administrators that IP addresses assigned to the Pentagon but long dormant could now accept traffic — but it should be routed to Global Resource Systems.

Story continues below advertisement
Network administrators began speculating about perhaps the most dramatic shift in IP address space allotment since BGP was introduced in the 1980s.

Advertisement
“They are now announcing more address space than anything ever in the history of the Internet,” said Doug Madory, director of Internet analysis for Kentik, a network monitoring company, who was among those trying to figure out what was happening. He published a blog post on the mystery Saturday morning.

The long life of a quick ‘fix’: Internet protocol from 1989 leaves data vulnerable to hijackers

The theories were many. Did someone at the Defense Department sell off part of the military’s vast collection of sought-after IP addresses as Trump left office? Had the Pentagon finally acted on demands to unload the billions of dollars worth of IP address space the military has been sitting on, largely unused, for decades?

Story continues below advertisement
An answer, of sorts, came Friday.

The change is the handiwork of an elite Pentagon unit known as the Defense Digital Service, which reports directly to the secretary of defense. The DDS bills itself as a “SWAT team of nerds” tasked with solving emergency problems for the department and conducting experimental work to make big technological leaps for the military.

Advertisement
Created in 2015, the DDS operates a Silicon Valley-like office within the Pentagon. It has carried out a range of special projects in recent years, from developing a biometric app to help service members identify friendly and enemy forces on the battlefield to ensuring the encryption of emails Pentagon staff were exchanging about coronavirus vaccines with external parties.

Story continues below advertisement
Brett Goldstein, the DDS’s director, said in a statement that his unit had authorized a “pilot effort” publicizing the IP space owned by the Pentagon.

“This pilot will assess, evaluate and prevent unauthorized use of DoD IP address space,” Goldstein said. “Additionally, this pilot may identify potential vulnerabilities.”

Keith J. Krach and Gen. Stanley McChrystal join Washington Post Live on Thursday, April 22 (The Washington Post)
Goldstein described the project as one of the Defense Department’s “many efforts focused on continually improving our cyber posture and defense in response to advanced persistent threats. We are partnering throughout DoD to ensure potential vulnerabilities are mitigated.”

Advertisement
The specifics of what the effort is trying to achieve remain unclear. The Defense Department declined to answer a number of questions about the project, and Pentagon officials declined to say why Goldstein’s unit had used a little-known Florida company to carry out the pilot effort rather than have the Defense Department itself “announce” the addresses through BGP messages — a far more routine approach.

Story continues below advertisement
What is clear, however, is the Global Resource Systems announcements directed a fire hose of Internet traffic toward the Defense Department addresses. Madory said his monitoring showed the broad movements of Internet traffic began immediately after the IP addresses were announced Jan. 20.

These hackers warned the Internet would become a security nightmare

Madory said such large amounts of data could provide several benefits for those in a position to collect and analyze it for threat intelligence and other purposes.

Advertisement
The data may provide information about how malicious actors operate online and could reveal exploitable weaknesses in computer systems. In addition, several Chinese companies use network numbering systems that resemble the U.S. military’s IP addresses in their internal systems, Madory said. By announcing the address space through Global Resource Systems, that could cause some of that information to be routed to systems controlled by the U.S. military.

Story continues below advertisement
The data could also include accidental misconfigurations that could be exploited or fixed, Madory said.

“If you have a very large amount of traffic, and someone knows how to go through it, you’ll find stuff,” Madory added.

The U.S. government spent billions on a system for detecting hacks. The Russians outsmarted it.

Russell Goemaere, a spokesman for the Defense Department, confirmed in a statement to The Washington Post that the Pentagon still owns all the IP address space and hadn’t sold any of it to a private party.

Advertisement
Dormant IP addresses can be hijacked and used for nefarious purposes, from disseminating spam to hacking into a computer system and downloading data, and the pilot program could allow the Defense Department to uncover if those activities are taking place using its addresses.

Story continues below advertisement
A person familiar with the pilot effort, who agreed to speak on the condition of anonymity because the program isn’t public, said it is important for the Defense Department to have “visibility and transparency” into its various cyber resources, including IP addresses, and manage the addresses properly so they will be available if and when the Pentagon wants to use them.

“If you can’t see it, you can’t defend it,” the person said.

Lori Rozsa in Plantation, Fla., and Alice Crites contributed to this report.

You can include a link to this post in your posts and comments by including the text q:592483
Agnostic does not evaluate or guarantee the accuracy of any content. Read full disclaimer.