General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsBonesaw and Velocity
Endgame hunts for hidden security weaknesses that are ripe for exploitation.
Thus, in the parlance of the trade, these vulnerabilities are known as zero-day exploits, because it has been zero days since they have been uncovered and fixed. They are the Achilles heel of the security business, says a former senior intelligence official involved with cyberwarfare. Those seeking to break into networks and computers are willing to pay millions of dollars to obtain them.
According to Defense News C4ISR Journal and Bloomberg Businessweek, Endgame also offers its intelligence clientsagencies like Cyber Command, the NSA, the CIA, and British intelligencea unique map showing them exactly where their targets are located. Dubbed Bonesaw, the map displays the geolocation and digital address of basically every device connected to the Internet around the world, providing whats called network situational awareness. The client locates a region on the password-protected web-based map, then picks a country and city say, Beijing, China. Next the client types in the name of the target organization, such as the Ministry of Public Securitys No. 3 Research Institute, which is responsible for computer securityor simply enters its address, 6 Zhengyi Road. The map will then display what software is running on the computers inside the facility, what types of malware some may contain, and a menu of custom-designed exploits that can be used to secretly gain entry. It can also pinpoint those devices infected with malware, such as the Conficker worm, as well as networks turned into botnets and zombies the equivalent of a back door left open.
Bonesaw also contains targeting data on US allies, and it is soon to be upgraded with a new version codenamed Velocity, according to C4ISR Journal. It will allow Endgames clients to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed. But such access doesnt come cheap. One leaked report indicated that annual subscriptions could run as high as $2.5 million for 25 zero-day exploits.
The buying and using of such a subscription by nation-states could be seen as an act of war. If you are engaged in reconnaissance on an adversarys systems, you are laying the electronic battlefield and preparing to use it, wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war. The question is, who else is on the secretive companys client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. It should be illegal, says the former senior intelligence official involved in cyberwarfare. I knew about Endgame when I was in intelligence. The intelligence community didnt like it, but theyre the largest consumer of that business.
http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/all/
Really long and in-depth article. Worth the read.