Free Essay

Operation Receiver

In: Computers and Technology

Submitted By blue12345
Words 607
Pages 3
I found some details on Operation Eligible Reciever 97. Operation Eligible Receiver was a government exercise that was funded by the United States of America government ("C4I.org - The meaning of Eligible Receiver", n.d.). The exercise was planned and executed with little to no notice to the participants ("C4I.org - The meaning of Eligible Receiver", n.d.). The participants were the National Security Agency (NSA), the Central Intelligence Agency (CIA), the Department of Justice (DOJ), the National Reconnaissance Office, the Federal Bureau of Investigation (FBI), the Defense Intelligence Agency (DIA), the Defense Information Systems Agency, and the Department of State (DOS) ("C4I.org - The meaning of Eligible Receiver", n.d.). The National Security Agency was playing as the Red Team. Civilian providers that are critical to the government’s power and communication were also participants. The exercise took place in 1997 and the was a no-notice Joint Staff exercise designed to test DoD planning and crisis action capabilities when faced with attacks on DoD information infrastructures ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). The Red Team was played by the National Security Agency which used hacker techniques and software programs that were freely available on net ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). All of the software or programs they used to hack were available to the public. The National Security Agency had no inside information to work with but they were very diligent in extensive electronic reconnaissance of the participants. They were able to conflict much damage to the National Command Authority, Intelligence Agencies, and the military commands involved. Many of the vulnerabilities that were exploited were common among the participants ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). The National Security Agency gained root access to government agencies networks which allowed them to mess around with user accounts and access server hard drives ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). Specifically, the National Security Agency infiltrated and taken control of the U. S. Pacific Command computer systems along with 911 systems in major cities around the United States ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). The majority of the Operation Eligible Receiver remains classified but what was demonstrated was the lack of consciousness about cyber warfare ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). For the first three days, no one in the agencies knew anything about the attacks that were taking place ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). The agencies being attacked were completely unaware of the attacks. The National Security Agency did a very good job at masking their identity and the attacks ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). The bad thing about the agencies that were attacked was that they did not know the attacks were actual attacks ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). A lot of people say that the National Security Agency attacked and gained control of only a fraction of 1 percent of the network, but that fraction was what they needed to gain superuser rights to access the entire network ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). They could then infiltrate other networks connected and that would be more damaging. Our nation has come a very long way since then because there have been many other attacks on government agencies that the agencies have recovered remarkably from.

C4I.org - The meaning of Eligible Receiver. (n.d.). Retrieved from http://c4i.org/eligib.html

Interviews - John Hamre | Cyber War! | FRONTLINE | PBS. (n.d.). Retrieved from http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/hamre.html

Similar Documents

Free Essay

Operation Eligible Receiver

...Operation Eligible Receiver Operation Eligible Receiver, an interesting attempt by the DOD to show how easily our military computer systems can be hacked into. This exercise was first run in 1997, the intention was to see exactly how vulnerable our military computer systems actually were and “if” with tools readily available on the open internet to accomplish this task, short answer yes. As it turns out there were numerous systems hacked during those two weeks in June 1997. It was a group of National Security Agency officials, which played the role of hacker it was determined that they “could have shut down the U.S. electric-power grid within days and rendered impotent the command-and-control elements of the U.S. Pacific Command” (Gertz). This is the least actually of the concern, if they had truly wanted to they could have disabled computer systems responsible for controlling approximately 100k military troops. The attackers were also able to cover their tracks for the most part, only one of the teams involved was discovered. Most noteworthy would be that the invaders were able to able to “breach the Pentagon’s unclassified global computer network using Internet service providers…” (Gertz). What seems interesting is that there were no special tools used to accomplish any of these breaches. The exercise was handled with standard internet practices and there was nothing released ahead of time. That is what makes these breaches so troubling. Any hacker from any location...

Words: 563 - Pages: 3

Premium Essay

Electronic Communication

...Electronic Communication Changed Human Life Surya Prakash Gutha Madhusudhanan Rahul Manthapuram Jessika Basnet KC Course: ESL writing Professor: Margaret Anne Shaw DATE: May 9th, 2015 Abstract Electronic communication had revised a lot from last decade, which is helping individual to do work in easy and comfortable manner to complete their task in time and they can also send huge data for person to person within seconds from any point of the world is also time saving and helping to get instant communication and saving time by clear conversation through emails other than phone conversation, this is possible because of maintaining ample coverage in all over the world, there is also economical advantage of this electronic communication which is cheap and liable to every person helped to stay connected to people in all over the world, whereas this kind of positive reasons helped to increase video calling, mobile, e-mails, tele-conferencing and social media. Many Multi-National companies are accessing data from employee related to different localities in all over the world with the help of electronic communication helping to improve employment around the globe named as outsourcing employment and increasing global economy, in some places electronic communication is playing major between politician and people. Although electronic communication has many benefits its effecting face to face conversations in society leading to communication gaps between person to person. ...

Words: 1861 - Pages: 8

Free Essay

Commnication

...Introduction Electronic communications have come a long way. It began in 1867 with the invention of the typewriter. Today we have various types of new technology, which makes us to do business faster and more efficient than ever before. Furthermore,  electronic communication media such as TV, telephone and Internet have a variety of advantages such as higher speed instant transfers and the ability to send a large amount of data when compared with traditional methods such as mail, newspaper etc .Significantly, the various threats to this technology also increases day by day. And these threats can be categorized into various sections. Anyhow, as an Electrical Engineering student I can say that basically, Electrical vulnerabilities are seen in things such as spikes in voltage to different devices and hardware systems, or brownouts due to an insufficient voltage supply. Electrical threats also come from the noise of unconditioned power and, in some extreme circumstances, total power loss. And route (reason) to these situations can be divided into two categories. 1. NATURAL PROBLEMS. 2.HUMAN ACTIVITIES. http://henapcblog.blogspot.co.uk/(picture) Threats to the electronic communication Natural problems Natural effects have been a huge trouble for many technologies and for businesses then and now. This effects the electronic communication in a big level as well. Natural effects such as...

Words: 1549 - Pages: 7

Free Essay

Statement of Purpose

...Statement of Purpose In the constantly evolving world of Science and technology, where there is an outbreak of new concepts that soon become obsolete, I wish to gain a competent level of education and expand my scale of learning. With my keenness, I am devoted to continue my academic pursuit in this direction. With a definitive purpose to gain a fine understanding in the segment of Electrical and Computer Engineering, I desire to convert my intention into logic supplemented by an MS degree in Electrical and Computer Engineering. Trying to grasp the basics of science in my secondary learning, an interest in the field generated. To understand it in detail, I took up science as my major in my higher secondary. With a certainty to adopt Engineering as my career stream, I focused on Physics, Mathematics and Chemistry. A reasonable performance was the result of my interest in the subjects. Working in the direction of my focus, I sat for the competitive IIT entrance examinations and thereafter, secured an admission in Indian Institute of Technology, Roorkee.IIT Roorkee is one of the top-ranking Engineering institutions in India. I joined IIT Roorkee in 2008 cracking Joint Entrance examination to pursue my Bachelor of Technology in Electronics and Communication, which I completed in 2012. During this under graduate program, I understood the basics of Electronics and Communication Engineering, which coupled with their practical applications, strengthened my interest in the field. During...

Words: 879 - Pages: 4

Free Essay

Subprime

...Division 250 South 4th St. Room 300 Minneapolis MN 55415-1316 612-673-3000 ADMINISTRATIVE REVIEW OF TELECOMMUNICATION TOWERS, ANTENNAS AND TRANSMISSION BASE SITES APPLICATION 535.470. Purpose. Regulations governing communication towers, antennas and base units are established to provide for appropriate locations for communication towers, antennas and base units, to ensure compatibility with surrounding uses, to promote the co-location of communication antennas, and to preserve the city’s ability to provide a public safety communication system. 535.480. Definitions. As used in this article, the following words shall mean: Base unit. An unstaffed single story structure or weatherproofed cabinet used to house radio frequency transmitters, receivers, power amplifiers, signal processing hardware and related equipment. Communication antenna. A device intended for receiving or transmitting television, radio, digital, microwave, cellular, personal communication service (PCS), paging or similar forms of wireless electronic communication, including but not limited to directional antennas such as panels, microwave dishes and satellite dishes, and omnidirectional antennas, such as whip antennas. Communication antenna, facade mounted. A communication antenna mounted on the facade of a structure such as a building, water tower, clock tower, steeple, stack or existing light pole or communication tower. Public safety communication system. A communication system owned or operated by a governmental...

Words: 3209 - Pages: 13

Premium Essay

Gillette Srd: Blank Cassette

...Gillette Safety Razor Division: Blank Cassette Project 9/3/13 Sydney Jones 1. Who is the protagonist? The protagonist in this situation is Ralph Bingham. Ralph serves as the vice president of new business development for the Gillette Safety Razor Division (SRD). As vice president – new business development it is Bingham’s job to identify new business opportunities for the division, evaluate their feasibility, and develop plans for execution. 2. What is the situation or problem he is facing? After the removal of the toiletries division from the SRD’s jurisdiction, the division was left without the product lines that had the greatest potential for growth such as Right Guard, Foamy, and Gillette’s other toiletry division. In seeking new ventures with high growth markets, where SRD’s already established strength can be used to their advantage Bingham has become highly interested in the blank-cassette market. 3. What decision does he have to make? * Should the cassettes be marketed under the Gillette name, more specifically, “Gillette Cassette?” While using the Gillette name in the promotion would be advantageous due to its high connotation of quality and reliability, would it have the same effect with a new, seemingly unrelated product such as the cassette? While Bingham is sure the Gillette name would ensure a high quality product, he is aware that the new cassettes would have no functional advantage over other brands at this point. * While distribution...

Words: 766 - Pages: 4

Free Essay

Blackmore User Manual

...Blackmore Mp3 Car stereo CD-RECEIVER INSTRUCTION MANUAL Table of Contents Hazard alerts …………………………………… Step by step ……………………………………. Accessories …………………………………….. Installation procedure ………………………….. Installation ……………………………………... Technical description …………………………... Introduction A car stereo is the focus of any car audio system. Also known as a radio, receiver, or head unit, today's car stereo performs a variety of complex functions. To understand these functions, it's helpful to think of a car stereo as having 3 different sections: Source — this is the part that "plays" the music. Sources may include a standard AM/FM tuner, CD player, MP3/WMA/AAC decoding, satellite radio, iPod connections, USB inputs, DVD player, or even cassette. Preamp — this is where all sound adjustments are made. The preamp section includes controls ranging from simple volume, balance, fader, source selection, and tone adjustments to sophisticated crossovers, equalizers, and time correction. Amplifier — the amplifier section boosts the small (low-voltage) audio signal coming from the pre-amp section into a larger (high-voltage) audio signal that's sent out to the speakers. Why would I want/need a new car stereo? A new stereo will give you better sound and more playback options than the typical factory stereo. Better sound quality — Superior built-in power and better circuit design mean that a brand-name car stereo...

Words: 1234 - Pages: 5

Premium Essay

Tyrod Taylor Case Analysis

... the Bills' running back coach took over. Will Lynn be Taylor's offensive coordinator next season? Or the better question is will Rex Ryan be back as head coach next season? A quarterback is only as good his head coach. If there is no stability at head coach or offensive coordinator, Taylor or any quarterback at that will have a rough time. Another reason why the Bills should stick with Taylor is because he does not have the best weapons. This season, his top wide receiving target, Sammy Watkins has been battling with a foot injury and has only played in five games. Outside of Watkins, none of the others Bills' wide receivers have taken their game to the next level. Robert Woods has 43 receptions for 522 receiving yards and a touchdown, while Marquise Goodwin only has 24 receptions for 364 receiving yards and a touchdown. Buffalo needs to make wide receiver a position of need in free agency or in the draft to give Taylor some help. The Bills' offensive line also needs to do a better job of protecting Taylor. According to Football Outsiders, Buffalo's offensive line is ranked 32nd in the league in pass protection, giving up 40 sacks with an adjusted sack rating of 10 percent. Finally, the last reason why the Bills should stick with Taylor is because he is the best option at quarterback going forward. Despite, the rookie success of Dak Prescott, complied with how good Carson Wentz has played, Cardale Jones is not ready to be a starting NFL quarterback. He still needs some...

Words: 738 - Pages: 3

Premium Essay

Zone Blitz Research Paper

...How to Properly Use the Zone Blitz Zone Blitzes are a five man rush package that feature a zone coverage behind them. The starting point for a zone blitz package is a blitz with four defensive linemen and a linebacker (if you are an even front) or three defensive linemen and two linebackers (for odd fronts). Most Zone Blitz packages use a three under, three deep zone coverage behind them. This creates safety because you always have players behind the receivers to make a tackle and line up again if the offense does have success. In man blitz schemes, you are subject to the deep ball and big plays, more so than the Zone Blitz. Some teams also use a 4 under, 2 deep zone coverage behind their Zone Blitzes. Coupling this with the 3 deep zone...

Words: 472 - Pages: 2

Free Essay

Issc361 Assignment 8

...Operation Eligible Receiver was a test conducted by our government utilizing what is called the Red Team, which are basically hackers that are on our side trying to gain entry into our computer network via publicly available tools such as metasploit. It was conducted in 1997, and was the first of its kind (Global Security, 2014). John Hamre, which was the deputy secretary of defense from 1997-1999 said that one of the biggest issues that was shown in operation eligible receiver is the fact that for the first three days, nobody thought that the computers were even under attack even given the pop ups that were showing outside people accessing the computers people were using (Hamre, 2003). I would agree in this aspect in that if users don’t report malicious activity that is being seen at their level, cyber network defenders can’t be expected to just know what is happening at a client level if it isn’t happening to them or being reported. From the information gathered in the interview with Mr. Hamre, it seems that it was relatively easy for the Red Team to gain entry to the physical infrastructure of the computers they were attacking, and also entry into the network itself. The Red Team was able to send emails from outside sources, using credentials of people from inside the network, and create denial of service attacks. The most common targets of the Red Team were intelligence agencies, the national command authority, and military commands. Mainly it was an assessment of our...

Words: 373 - Pages: 2

Premium Essay

Term Paper

...Algebra 1: Simplifying Algebraic Expressions Lesson Plan for week 2 Age/Grade level: 9th grade Algebra 1 # of students: 26 Subject: Algebra Major content: Algebraic Expressions Lesson Length: 2 periods of 45 min. each Unit Title: Simplifying Algebraic Expressions using addition, subtraction, multiplication, and division of terms. Lesson #: Algebra1, Week 2 Context This lesson is an introduction to Algebra and its basic concepts. It introduces the familiar arithmetic operators of addition, subtraction, multiplication, and division in the formal context of Algebra. This lesson includes the simplification of monomial and polynomial expressions using the arithmetic operators. Because the computational methods of variable quantities follows from the computational methods of numeric quantities, then it should follow from an understanding of basic mathematical terminology including the arithmetic operators, fractions, radicals, exponents, absolute value, etc., which will be practiced extensively prior to this lesson. Objectives • Students will be able to identify basic algebraic concepts including: terms, expressions, monomial, polynomial, variable, evaluate, factor, product, quotient, etc. • Students will be able to simplify algebraic expressions using the four arithmetic operators. • Students will be able to construct and simplify algebraic expressions from given parameters. • Students will be able to evaluate algebraic expressions. • Students...

Words: 692 - Pages: 3

Free Essay

Constructing Formulas for Mathematical Operations in Excel (Basic Tips and Techniques)

...Constructing Formulas for Mathematical Operations in Excel (Basic Tips and Techniques) Michelle A. Applequist Computer Information Systems (CIS105) Professor Hari Dhungana Strayer University September 1, 2009 Constructing Formulas for Mathematical Operations in Excel Microsoft Excel uses formulas to construct mathematical operations in a worksheet. After data have been entered into the worksheet, you can perform calculations, analyze data, and create charts. An Excel formula (calculations you create) and functions (formulas pre-existing in Excel) calculates the data entered in the worksheet. Formulas calculate numbers in a particular order. “Excel has one of the most comprehensive set of formulas, not only to perform calculations but also to manage data and records. It also has the ability to instantaneously re-calculate the results as the raw data changes” (Khoo, 2006-9, para. 2). To construct a formula after you have entered data, you must click in the cell that you want the results to appear in, and then type the formula. You can construct formulas by using the sum function, and editing numbers in a cell. It is stated that: Sum is an Excel function—a prewritten formula. Sum indicates the type of calculation that will take place (addition). When the sum function is activated, Excel looks above the active cell for a range of cells to sum. If there is no range above the cell, Excel will look to the left for a range of cells to...

Words: 694 - Pages: 3

Free Essay

Mathematical Operations of Gs1140 Numbers and Simplifying Algebraic Expressions

...Mathematical Operations of Numbers and Simplifying Algebraic Expressions Section A.: Mathematical Operations of Numbers 1.) 8+((12+5) x 4)/2= 8+(17x4)/2= 8+68/2= 8+34= 42 2.) ((3+4)²+4)-2= (7²+4)-2= (49+4)-2= 53-2= 51 3.) ((12+7)+(8/4)²) (19)+(2)² 19+4 23 4.) ½ + ¼ - ⅓= 6/12+3/12-4/12= 9/12-4/12= 5/12 5.) 2/3 x 3/5 = Multiply straight across 2/3 x 3/5 = 6/15 Find common denominator Reduce to lowest term 6/15 ÷ 3/3 = 2/5 6.) ⅓ ÷ ½ = Multiply by reciprocal ⅓ x 2/1= 2/3 7.) 3/2 ÷ ( 1/5 + 6/10) = 3/2 ÷ (2/10 + 6/10) = 3/2 ÷ 8/10 = Multiply by reciprocal 3/2 x 10/8 = 30/16 = 15/8 = 1 7/8 Section B.: Simplifying Algebraic Expressions 1.) 2x + 3x - 5x + x = 5x - 5x + x = 0 + x = x 2.) 2(6x + 5) = 2(6x) + (2x5) = 12x + 10 = 3.) (14x - 7) /7 = 14x - 7 ÷ 7 = 14x ÷ 7 = 2x -7 ÷ 7 = -1 2x - 1 4.) -(-15x) - 3x = 15x - 3x = 12x 5.) 5(3x+4) - 4 = 15x + 20 - 4 = 15x + 16 = 6.) 5(3x-2)+12x = 15x -10+12x = 27x - 10 = 7.) 4(2y-6)+3(5y+10) = 8y-24+15y+30 = 23y-24+30 = 23y+6= 8.) (x+1) (x-2) = Multiply the first 2, outside 2, inside 2, last 2 xx - 2x + 1x - 2 = xx - 2x + x - 2...

Words: 252 - Pages: 2

Premium Essay

Pt1420 Unit 6 Assignment

...This week’s material is pretty easy to learn. My learning strategy stayed the same from last week; read the reading material, look at the optional video lectures, answer the discussion question, program the programming assignment, take the self-quiz, etc. … I appreciate learning about the for … each loop. I’m plenty familiar with the for loop, which iterates for a set number of loops, uses initialization, a continue condition, and updating at the top of its block; but, the for … each control structure is a alternative to for. The for .. each loop control structure does not have as complicated continue conditions, and iterates the length of the data structure. I want to master the for .. each loop because it processes a data structure better then the for loop. I interacted with people in the discussion forum. This week’s question asked students to detail the for , and for … each control structure, and include the enum data structure in the explanation. I posted a discussion post, complete with programming examples of each data structure, but there are not enough other student responses to assess. I’ll keep looking for other students to post their discussion assignment, as I need to assess three student discussion posts. This week, I feel it will be helpful to master the for .. each, while, and do … while control structures. Often, I use the for loop, and select case / switch, but the other loops escape my programming toolbox. This week, I learned how to program with while...

Words: 601 - Pages: 3

Premium Essay

Business

...Aaron Sura June 2, 2014 Wiley plus exercise Question 1. (a). $181,500 (b). $41,200 (c). 38,000 (d). 19,200 (e). 9,500 (f). 63,400 Question 3. In its first month of operation, Maze Company purchased 100 units of inventory for $6, then 200 units for $7, and finally 150 units for $8. At the end of the month, 180 units remained. Compute the amount of phantom profit that would result if the company used FIFO rather than LIFO. The company uses the periodic method. FIFO: $1,410 150 units multiplied by $8 equals $1,200 30 units multiplied by $7 equals $210 $1,200 plus $210 equals $1,410 LIFO: $1,160 100 units multiplied by $6 equals $600 80 units multiplied by $7 equals $560 $600 plus $560 equals to $1,160 Therefore, the phantom profit would be $250 if the company were to use the FIFO rather than LIFO. Question 4. Compute the lower of cost or market valuation for O'Connor's inventory. 12,500(camera)+9,000(camcorders)+12,800(DVD’s)= $34,300 Question 5. Establishment of responsibilities: Only cashiers may operate registers. Segregation of duties: The duties of receiving cash, recording cash, and having custody of cash are assigned to different individuals. Independent and internal verifications: Daily cash counts are made by cashier department supervisors. Human resource control: All cashiers are bonded Physical controls: All over-the-counter receipts are registers. Question 6. Segregation of duties: 3 Establishment of responsibilities:...

Words: 259 - Pages: 2