Army rebuilds network defenses after hacks

CIO responds with enterprise consolidation initiative

HHS Health IT Standards RFP

The Army has spent millions of dollars in the past year and a half to rebuild networks at major U.S. bases after hackers penetrated its systems, Army and industry officials said.

The incidents at the bases were serious enough that Army information technology officials pulled the plug on the connection to the Defense Department's Non-classified IP Router Network (NIPRNET).

As a result of the Army's network intrusions, Pentagon officials instructed the service to devise a plan to improve network security. Army IT officials have worked to improve network security and operations and to rebuild the networks at the facilities that were attacked.

The Army is developing an enterprise consolidation plan for next year that will reduce the number of networks and help improve the service's network defenses, Army and industry officials said.

The Army could spend millions of dollars repairing and upgrading the networks at two Army installations, said George Hermalik, Continental U.S. risk mitigation team leader in the Enterprise Systems Technology Activity (ESTA) in the Army's Network Enterprise Technology Command (Netcom). He spoke last week at the 2005 Army IT conference in Las Vegas.

Hermalik declined to specify what installations were involved in the effort. But Maj. Gen. Dennis Moran, director of information operations, networks and space in the Army's Office of the Chief Information Officer, said in a speech at the conference that Fort Hood, Texas, has a huge information security problem.

An industry official familiar with the situation said there have been hackings at Fort Hood, home of the 4th Infantry Division and the service's first digitized division, and Fort Bragg, N.C., the location of the 82nd Airborne Division and the service's elite paratroop forces. An Army IT official with knowledge of the events confirmed the hackings at Fort Hood, but would not comment on the other installation. He said remediation efforts have been ongoing at Fort Hood for the past two years.

Army IT officials declined to comment on the hackings' location and nature because that could give enemies insight about perceived or actual vulnerabilities in the service's networks. Fort Hood officials deferred comment to Army headquarters at the Pentagon.

Army IT executives took bold measures to improve network operations and rebuild networks after the events at the two bases. At one installation, leaders ignored concerns and advice from the Army's IT staff, so the IT executives cut the base's NIPRNET connection.

An Army IT official, who spoke on the condition of anonymity, said Gen. Richard Cody, the Army's vice chief of staff, the service's second highest officer, urged the bases to follow Army headquarters policy. The installation's connection to NIPRNET was restored after officials at the base complied with the Army's security regulations.

The effort to upgrade networks shows that service IT leaders take network operations seriously, Army and industry officials said. They said Lt. Gen. Steve Boutelle, CIO; Maj. Gen. James Hylton, Netcom commanding general; and Joe Capps, ESTA director, have been "brilliant and ruthless" in dealing with the Army's computer security problems.

"We are a nation at war, and although protection of our networks has always been a high priority, we are even more vigilant now, and the less the enemy knows, the better it is for the people who protect our networks and the soldiers they serve," said Vernon Bettencourt Jr., the Army's deputy CIO, in a statement. "I will not go into specifics on what types of defensive measures we have in place. However, I will say that great emphasis is placed on constant vigilance."

Remediation of the networks involves scanning networks for vulnerabilities, applying patches to operating systems and applications, and establishing appropriate security measures, Bettencourt said.


Streamlining for security

The Army plans to consolidate servers and networks servicewide to create a more secure, manageable environment, Army officials say.

The service will reduce the number of servers from between 3,000 and 10,000 to 800 and the number of connections to the Non-classified IP Router Network from about 199 to six, according to a presentation at the 2005 Army information technology conference held in Las Vegas last week.

The move will help the Army create a secure network boundary with a limited number of entry and exit points to the Internet.

— Frank Tiboni

The Fed 100

Read the profiles of all this year's winners.


  • Ellen Lord - Textron DOD ATL USD

    Lord tapped to lead DOD acquisition

    The Trump administration has nominated Ellen Lord, president and CEO of defense contractor Textron Systems, to serve as undersecretary for Acquisition, Technology and Logistics.

  • Soraya Correa, DHS Chief Procurement Officer

    Confronting the culture of fear in government

    Steve Kelman gives kudos to DHS' Soraya Correa for facing the FLASH cancellation head-on.

  • DHS: Russia tried to hack voting systems in 21 states

    DHS officials confirmed for the first time that Russian hackers tried to penetrate voting systems in 21 different states in the run-up to the 2016 election, but said the hacking did not affect election results.

  • VA Secretary Dr. David Shulkin speaking at a June 20, 2017 Monitor Breakfast. Photo credit: Michael Bonfigli/The Christian Science Monitor

    VA expects to add an integrator to health record mix

    After coming to terms with Cerner on a price for its electronic health record system, VA expects to pivot to finding an integrator to handle legacy interoperability and change management.

  • Soraya Correa, DHS Chief Procurement Officer

    DHS execs own FLASH fail

    The department's failure to launch an agile services contract can serve as a teachable moment, according to DHS procurement officials.

  • Is it time to rethink the TIC?

    Current restrictions on internet gateways complicate agencies' move to the cloud, so the Office of Management and Budget is exploring new security architectures.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group