Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Quote  





2 See also  





3 References  





4 External links  














Eligible Receiver 97







Add links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Eligible Receiver 97 was a U.S. Department of Defense exercise conducted under what is known as the No-Notice Interoperability Exercise Program. The exercises were held June 9–13, 1997 and included participants such as the National Security Agency (which acted as the red team), Central Intelligence Agency, Defense Intelligence Agency, Federal Bureau of Investigation, National Reconnaissance Office, Defense Information Systems Agency, Department of State, Department of Justice, as well as critical civilian infrastructure providers such as power and communication companies. The simulated cyber attack led directly to the formation of the United States Cyber Command.

Eligible Receiver 97 featured mock cyber attacks, hostage seizures, and special operations raids that sought to demonstrate potential national security threats that could be posed through the cyber domain.[1] The joint exercise involved a National Security Agency red team which played the role of North Korea, Iran, and Cuba attempting to cause critical civilian infrastructural damage, as well as gain control over the military's command-and-control capabilities.[2] The NSA red team used hacker techniques and software that was freely available on the Internet at that time. The red team was able to crack networks and do things such as deny services; change and manipulate emails to make them appear to come from a legitimate source; disrupt communications between the National Command Authority, intelligence agencies, and military commands. Common vulnerabilities were exploited which allowed the red team to gain root access to over 36 government networks which allowed them to change/add user accounts and reformat server hard drives.

The National Security Agency red team had no inside information to work with, but by engaging in extensive preliminary electronic reconnaissance of target agencies and sites prior to the attacks, they were able to inflict considerable simulated damage. Although many aspects of Eligible Receiver remain classified, it is known that the red team was able to infiltrate and take control of U.S. Pacific Command computer systems as well as power grids and 911 systems in nine major U.S. cities.

The mock attack featured three phases. The first two phases were concerned with computer network penetration of civilian infrastructure and military command and control.[3] Recently declassified documents show that the last phase of Eligible Receiver connected cyber attacks to operations in physical domains.[1] Specifically, the mock attack included a hijacking-at-sea of the ship MV National Pride. Documents detailing the last phase of Eligible Receiver remained classified until they were obtained through a Freedom of Information Act request by the nongovernmental National Security ArchivesatGeorge Washington University.

Quote

[edit]

Well, we do know that they were very successful in penetrating DOD computers. I mean, we physically got messages from the bad guys on our own computers.

— John Hamre, former Deputy Secretary of Defense 97-99, Frontline interview[4]

See also

[edit]

References

[edit]
  1. ^ a b "Eligible Receiver 97: Seminal DOD Cyber Exercise Included Mock Terror Strikes and Hostage Simulations". National Security Archives.
  • ^ Kaplan, Fred (March 2016). Dark Territory. pp. Chapter 4: Eligible Receiver.
  • ^ Kaplan, Fred (2016). Dark Territory. pp. Chapter 4: Eligible Receiver.
  • ^ "cyber war!". www.pbs.org. April 24, 2003.
  • [edit]
    Retrieved from "https://en.wikipedia.org/w/index.php?title=Eligible_Receiver_97&oldid=1161918839"

    Category: 
    Operations of United States government agencies
     



    This page was last edited on 25 June 2023, at 21:11 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki