AOH :: ISN-1682.HTM

IU teaming with feds to 'know' hacker 'enemies'

IU teaming with feds to 'know' hacker 'enemies'
IU teaming with feds to 'know' hacker 'enemies'

Forwarded from: William Knowles 

By Allie Townsend
Indiana Daily Student
November 09, 2005

Security monitors developed by IU Pervasive Technology Labs are
currently being used by the Federal Department of Defense as a tool to
beat terrorist hackers.

The mantra, "Know Your Enemy," is the drive behind the development of
these security monitors by the international HoneyNet Project, a
non-profit organization committed to maintaining and developing
internet security and giving free access to the public.

Starting in 1999 as a loose band of security researchers, the HoneyNet
Project has now spread to a global effort for understanding and
stopping potential attempts to influx computer networks funded in part
by the National Intelligence Council. The IU Pervasive Labs are
entering their fourth year as members of the HoneyNet team, designing
key components to some of the Project's biggest developments -- many
of which are being used by the federal government.

"It is my understanding that (the government) is doing pilot studies
now on some of HoneyNet's projects," said Researcher for the Advanced
Network Management Lab Ed Balas. "Some of the other components have
been used by the FBI in different investigations."

According to, HoneyNet's primary purpose is to
capture extensive information about cyber threats through a highly
controlled network -- one that can control and monitor all activity
that happens within it.

A need for this information came after hackers and other network
intruders started to impose threats on a personal and national level.

"We started seeing a good number of worms and we just started to look
strongly into security," Balas said. "We needed to know what should be
done to keep networks running efficiently."

One of the components born in the IU labs is Sebek. Designed by Balas,
Sebek is an operating system enhancement developed to watch intruders
once they break into a system. Information such as this could allow
the government to track an intruder and mislead them with false

Knowledge, stresses Balas, is the biggest defense against

"What we are doing won't stop anything from happening," Balas said.  
"What it does is help us understand the risks. There is a lot of doubt
in the security world, but what you want to know is how to apply the
knowledge that you find."

=A9 2000 Indiana Daily Student

"Communications without intelligence is noise;  Intelligence
without communications is irrelevant." Gen Alfred. M. Gray, USMC - Computer Security, & Intelligence - 

Earn your Master's degree in Information Security ONLINE 
Study IA management practices and the latest infosec issues.
Norwich University is an NSA Center of Excellence.

Site design & layout copyright © 1986-2015 CodeGods