*EPF403 02/10/00
Transcript: Pentagon Spokesman's Regular Briefing, Feb. 10
(Iraq/WMD, computer hacking/DOD counter-measures, N.Korea/missiles) (4360)

Pentagon Spokesman Admiral Craig Quigley briefed.

Following is the Pentagon transcript:

(begin transcript)

DoD News Briefing

Thursday, February 10, 2000 - 1:30 p.m.

Presenter: Rear Admiral Craig Quigley, DASD PA

ADM. QUIGLEY: Good afternoon, ladies and gentlemen. I have one announcement this afternoon.

We want to announce that Secretary and Mrs. Cohen again will be hosting 2000 Pentagon Pops on Monday, February 21st, at 7:00 p.m. at the DAR Constitution Hall here in Washington. Pentagon Pops this year is a special tribute to the men and women of the armed forces who have served all throughout the last century.

The music features noted author and historian Stephen Ambrose and NBC news anchor Tom Brokaw as masters of ceremony. They are joined by several exceptionally talented military musicians and vocalists from the various service bands. And they'll be presenting a tribute to the hero of the century, the American GI and the selfless service of the American family.

It's a free event, open to the public, and we'll have a bluetopper later today with details on how to get tickets, as well as additional details on the concert itself.

And with that, I will take your questions. Charlie?

Q: Craig, western planes launched a third straight day of raids on the northern no-fly zone, and they attacked the South yesterday. Ken said late last year that the Iraqis in fact had appeared to stop challenging planes over these zones. Has this suddenly increased, and do you have a reason for it?

ADM. QUIGLEY: Well, guesses, really, is the only thing that we could contribute. There is no particular uniform level of effort over time. It waxes and wanes.

Most recently, if you go back a month or so ago, we were in Ramadan. And our guess would be that that would be one of the motivations for the sharply decreased level of activity. But it is just a guess. And to a great extent, we've seen previous levels of activity resume.

Q: So they do -- but the challenges do appear to be increasing recently?

ADM. QUIGLEY: In the last few weeks, yes.

Q: Do you see any connection to their complete rejection of the U.N. inspections regime?

ADM. QUIGLEY: No, I don't think so, John. And I say that based on their resumption of challenges to the coalition aircraft predating their statements.

Q: And your actual taking them up on their challenges also is not intended to be a signal in this period?

ADM. QUIGLEY: No. We have said for a long time that we respond to the provocations and attacks on coalition aircraft. We'll do so at a place and a time of our choosing. But if you would stop attacking the coalition aircraft patrolling the northern and southern no-fly zones, there would be no need for coalition aircraft to retaliate.

Q: Now that the Iraqis have rejected this resolution, where does that leave the world in terms of trying to be able to tell whether Iraq is again building biological and other types of weapons of mass destruction?

ADM. QUIGLEY: Yeah, I see what you mean.

Q: What are your options?

ADM. QUIGLEY: Well, as we've said before, I mean, we share -- the Department of Defense, as well as other elements of the U.S. federal government, is very concerned about our inability to know with precision of what's going on the ground. The resumption of some sort of an inspection regime would certainly go a long way towards alleviating those concerns. I don't think we'll ever be quite perfect in the easing of concerns, but it would be an improvement.

But I can say, at this point, based on Iraq's most recent statements of today, it is a process that is and must be conducted through the U.N., the offices of the U.N. But I'm sure the United States and certainly the Department of Defense would certainly prefer to see and have better knowledge of what's going on than we have today.

Q: You still reserve the option, if you have reason to believe that they are again building weapons of mass destruction -- to -- and there are no inspections. What are your options?

ADM. QUIGLEY: Well, we have never made a definitive statement as to what we will or won't do; we'll keep those options open.

Q: A couple of weeks ago, Ken Bacon said that we didn't know what was going on inside some of those facilities that have been rebuilt. Is there any additional information about what the Iraqis may be up to and if in fact they have reconstituted their ability to produce weapons of mass destruction?

ADM. QUIGLEY: We know that the buildings -- some of the buildings have been rebuilt. But it's a heck of a lot easier to rebuild a building than it is the complex facilities that might go inside those buildings to construct, to assemble, to test any sort of weapons of mass destruction.

So it gets back to the same point, Nick, that we don't know what we don't know, and that makes us uneasy. What you can see is no direct threat. But what's in those facilities is what matters, and that is where our knowledge is lacking.

You have a variety of sources of information. But sometimes it's good information, and sometimes it's wild rumor and speculation. You try to do an analysis, you try to sew the parts together, to allow you to come to as complete an understanding as you can. But there is nothing like direct eyes on the facility itself, from a disinterested third party, to give you that correct and timely information that you seek.

Bob?

Q: Can I ask you a question about China?

Q: Can we stay on Iraq?

Q: Sure. Go ahead.

ADM. QUIGLEY: David?

Q: This professor at the University of Maryland has written and talked about this, the evidence that suggests there may be a secret underground facility near Baghdad, used to produce viruses that would become parts of -- become biological weapons. Does the Pentagon have any intelligence to suggest that's true?

ADM. QUIGLEY: Well, I can't comment for you on whether or not we have direct intelligence information in that regard. But it does go back to the answer that I was discussing before on just, there is no substitute for being there and seeing things with your own eyes. And it just adds to that sense of doubt and uncertainty and unease, based on Saddam Hussein's demonstrated behavior and stated intentions in the past.

Q: So one would think that you might be leaning a little more forward at this point with your level of concern -- not that the U.S. is about to go bomb the Iraqis -- but that your level of concern, I would think, would be going up right now?

ADM. QUIGLEY: Well, we've been concerned for some time, John. But again, I must say that we have no evidence to support that the Iraqis are specifically reconstituting a WMD capability.

Its past actions, its reconstituting or reconstruction and repair of buildings, all circumstantial and historical, if you will, none of which makes us feel very comfortable. But I would be remiss if I said that we could point to specific evidence of a reconstruction of that capability.

Q: So you are talking about intelligence, then. While the professor says they're building a large underground facility that may be doing offensive viruses, growing offensive viruses, you seem to be indicating that you don't have that because you have no evidence to support that they're reconstituting weapons of mass destruction.

ADM. QUIGLEY: Correct.

John? Bob, go ahead.

Q: I want to ask you about the new Russian-built destroyer that I understand is expected to be in the straits, Taiwan Straits in a couple of days. What's the Pentagon view on whether this poses any additional threat to either shipping or to the U.S. presence?

ADM. QUIGLEY: This is something that we've been watching for some time. We've known about this as a coming event, if you will, for some number of years, as a matter of fact, while the ship was being built and the crew trained and what have you.

Taken in isolation, this is a good ship. It's a modern warship. But it does not significantly change the balance of power in that part of the world. Our concerns I guess would be twofold. One, is this some sort of a direct or indirect threat to the U.S. military forces in the region? And we think the answer to that is no. And is this unsettling to the China-Taiwan issue? And as we've said many times before, anything that gets that balance seriously out of kilter is of concern to us, and we think there's a better way of doing that.

So I don't want to downplay the fact that these ships are junk. They're not. But they're in small numbers, part of a long known effort on the Chinese navy and the PLA [People's Liberation Army] navy to modernize some of its force, and we are now seeing that come to fruition.

So I -- I don't want to downplay it, but I don't want to exaggerate the impact, either.

Q: Is there any connection with the timing of the Stennis Battle Group being in the area at the same time?

ADM. QUIGLEY: Not that we're aware of. When the ship was ready to be delivered, it's about to be delivered, so I don't see a linkage between the two.

Barbara?

Q: Different subject? Can you bring the --

ADM. QUIGLEY: Any others on that? Go ahead.

Q: Can you bring us up to date on the Pentagon and the military's concern about the recent computer hacking attacks, whether or not you guys have been attacked, whether you're concerned, whether you've warned your people, if you have or you haven't, then, you know, why? The whole update on what you see.

ADM. QUIGLEY: Certainly. The Department of Defense has been very concerned for years on the growing use of computers, a strong sense on our part that we need to be aware of potential hacking into the DOD computer systems, and then to be able to defend against some of those attacks; both to note when they're taking place and to defend against the attacks in the first place.

In regarding the events of the last few days here, certainly, we've been watching that with great interest. We have a facility here in the Washington, D.C. metro area -- it's actually a part of the U.S. Space Command, which has the responsibility for computer network defense, but it's physically located here in the District -- that is monitoring Defense Department computer networks. We watch what's going on in networks around the Department. And we have not been susceptible -- we have not been the victim of the denial-of-service attacks that have hit e-Bay and Yahoo! and others in the last few days. Boy, it's something we're watching very carefully, but we have not been hit with that.

Now, today, the Defense Department is putting out a message to all facets of the Department, saying that we're asking for network administrators around the department to take a look at the computers on their networks and to take a look at the drives to see if someone has planted some of this denial-of-service tools on the drives of Defense Department computers. We're doing that to see if any of our own computers could have unwittingly been a part of the denial-of- service regime that is being used to clobber some of the other servers on these other systems. But so far, we have not seen anything. We certainly continue to watch.

Q: Do you have any assessment as to why you haven't been attacked, when in the past you guys have sort of been first in line to be hit?

ADM. QUIGLEY: No, we don't have a real good feel for that. We think we've done a good job, over time, in taking a very prudent look to the creation of networks, to the setting up a system of monitoring and defense of the networks. But I wouldn't hazard a guess as to why not.

Q: One last question. What would you say is sort of the best countermeasure you can offer in terms of it's well known publicly, that, you know, for example, you have ways of countering when people do try and hack into you, because you've successfully diverted attacks in the past. If something were to happen, what would be a couple of options you could then pursue to keep yourselves up and running?

ADM. QUIGLEY: Well, I would say first and foremost, it's just simply awareness; just be on your toes and be aware of what's happening. Monitor your systems, know how they're working, and note changes. But there are a variety of means, if you detect anything from a simple hacker to a concerted effort to bring down and clog a server, like we've seen here the last few days, your options are many. I mean, you have existing defensive systems that you have in place. You can take a service offline. You can divert the traffic coming in to a server to another server. You can call and block a particular signal coming in to a computer and say, I'm not going to accept e-mail, or whatever, from that computer anymore. And you can be quite selective or quite broad brush in the techniques that you use to defend an individual server.

Pam?

Q: Could you amplify what you said -- you were taking a look at the drives in DOD to see if somebody is using the DOD computers as a portal by which to attack other computers.

ADM. QUIGLEY: Yes. Yes.

Q: And how many -- when did this -- is it a directive, is it a memo that went out? Is it just a message?

ADM. QUIGLEY: It's a message. And we don't have any evidence, I must be quick to point --

Q: And when did the message go out?

ADM. QUIGLEY: Today. Today.

Q: Okay.

ADM. QUIGLEY: I don't think it's gone out yet. It will before close of business today. And it takes -- it directs the entire Department of Defense to take a look at its systems and read what's on those drives to see if, unwittingly, someone has placed that denial-of-service tools on one or more of DOD's computer systems.

Q: And that denial of service --

ADM. QUIGLEY: And if so, then, as we understand the process that's taking place, those computers would be involved in actual attacks, then, on others -- the Yahoo, the eBay, the what-have-you.

And so if we find it, we'd take it down, we'd remove it, et cetera. But first it's awareness.

Q: Why are you all doing this, Craig? Are other government agencies doing it, or do you have specific reason to believe that the Pentagon might have done it?

ADM. QUIGLEY: I don't know on the first part of your question, Charlie, if other elements of the federal government are doing this. But from our perspective, I mean, the Defense Department is the federal government's biggest single user of computers. And we want to make sure that we are -- we have no reason to suspect that any of our systems are, in fact, involved in this. But we also are not sure until we check. And so that's why we're calling for a check on the part of all of our system administrators.

Q: Could you clarify one other point, then? When you say "DOD-wide" is that, in fact, all the services worldwide since there are DOD networks --

ADM. QUIGLEY: Oh, indeed. Yes. All the services, Defense agencies, all elements of the Defense Department.

Q: Can you also --

ADM. QUIGLEY: Jeff?

Q: If I understand the way these attacks work, it appears as if the invasion is coming from a zillion different places, it's hard to pinpoint exactly the source of the attacks because everybody's trying to get into your system at once. Is the department able, if such a thing were to occur, to isolate that so that the rest of us who might have a good reason and, indeed, that folks around the world who are a part of the military who have a good reason to be into the system can get in, or would, in fact, you just have to pull your systems off-line?

ADM. QUIGLEY: I won't purport to be a subject matter expert in this regard. But it's my understanding that it is such a massive assault when it occurs that it basically clogs your system so badly that you cannot discern from a legitimate request for information as opposed to a hundred different computers asking for all the information all at once. The servers try to comply with the request and they just get bogged down in the sheer volume of the requests for information.

Q: So if someone tries to do this or if there's a group trying to do this, the department would be vulnerable.

ADM. QUIGLEY: Yes.

Yes, sir.

Q: Can I follow up on that? If you have concern that your servers are being used as the host to launch an attack against other websites, those websites may now have put up defensive mechanisms. They could turn around and shut off your servers, could they not? Are you concerned about that?

ADM. QUIGLEY: I think first things first, okay? If you find it, if we take a look at our various many, many different computer systems and you find any of them, you would simply remove it from the drive on that computer.

And then -- I'm talking like it's a very simplistic task, and it is not, but at the end of the day, that would be the effect, Barbara. It would simply be removed. And that computer would no longer, then, be the source of the attack on another computer.

Q: I'm sorry, are you talking about hard drives on individual computers?

ADM. QUIGLEY: Yes, or servers that are serving a network or something of that sort, Bob.

Yeah, Tammy?

Q: Craig, how long do you anticipate this check is going to take? And can we get a copy of this message being sent out?

ADM. QUIGLEY: As of the time -- yes, we can get you a copy of that. I don't believe it will be classified. We can take a look at what portions might be classified. But I think you can still get the gist of it from the portions. As of 15 minutes ago when we started the brief, we had not put a time limit on it. I think that was still a work in progress.

Q: Sir, did the folks at JTF Computer Network Defense see any of these attacks develop? They do monitor the civilian networks too, right?

ADM. QUIGLEY: Well, no, they're monitoring our networks. It's a scanning of the Defense Department networks. And in this regard, on the issue we're talking about here, we're an element of and working very closely with the national office, run by the Justice Department, of the infrastructure protection -- NIPC. I don't remember the definition of the term. One second. National Infrastructure Protection Center. Yes. NIPC.

Yes, sir? You had a question?

Q: Yeah. Is there even a hint, the slightest hint that this actually could have -- an attack actually has happened from a DOD computer system?

ADM. QUIGLEY: No. No. We have not felt the attack, and we have nothing to suspect that any of our systems have been used as agents, if you will, to make the attack. We just think it's a prudent thing to check, particularly because of the numbers involved.

Bill?

Q: Yes. Admiral, if I could go on to another subject, about the article today in the Times about North Korean missile components being shipped by jumbo jet to very interested clients, especially Iran. Do you have anything you can say in comment about this particular matter or this particular article?

ADM. QUIGLEY: Well, it's an issue that we have expressed our concern about many times, from here and the State Department and various levels of the government. The proliferation of weapons of mass destruction and the means to deliver them is a concern to us.

It's something that we monitor very closely around the world and we care very much about. All I can say in this regard is that we'll continue to watch it and express our concerns.

Q: Would you be able to say that this is good for North Korea?

ADM. QUIGLEY: No, I don't think so.

Q: No?

ADM. QUIGLEY: No.

Q: Craig, on North Korea's commitment on its long-range missile program, does it go beyond just not flight-testing it? Because there seems to be evidence that they are continuing to work on it, even through they're not flight-testing at the moment, and that they may also be helping other countries with the same kind of technology. What do we expect from North Korea on this subject?

ADM. QUIGLEY: Let me take that question. We'll get you an answer before the day is done.

Q: Craig, I guess what I'm trying to -- maybe you could just put this into tight words -- what you all are worried about is if someone from outside -- outside of a defense computer network -- might have planted an order or orders in your computer or computers to assault another network. Is that what you --

ADM. QUIGLEY: Exactly so. Yes. Yes. And that's what we are going to check those drives to see and then remove.

Dale?

Q: Another subject? Senator Feingold sent a letter to the SECDEF earlier this week and made a speech on the Senate floor, asking him to withhold a decision on full-rate production for the F/A-18E/F until the GAO audit of the test program has been completed. Has the Secretary answered that letter? Can you tell us what his intention is on that?

ADM. QUIGLEY: I don't think he has responded to the letter yet. I will double-check, but I don't think he has.

Q: Do you have any comment about the article yesterday in the Washington Post accusing French soldiers of not helping U.N. policemen in Kosovska Mitrovica on the 3rd of February? And can you confirm the figures given today in the Washington Times concerning the number of the Russian casualties in Chechnya?

ADM. QUIGLEY: No, on either one. I'm sorry. I can't. I would refer you to the Russian government on the second question and, on the first, to NATO and KFOR. But I don't have those figures, in either case.

Q: Thank you.

Q: Craig, could I just do one last computer one?

ADM. QUIGLEY: Sure.

Q: That is, in all of the $6.3 billion of making sure you're ready for Y2K and all the remediation that went on here --

ADM. QUIGLEY: Three-point-five.

Q: I'm sorry. I'm sorry. Sorry. Three-point-five. Excuse me.

(Chuckles.)

Some computer security people have suggested that every time you go in and fix a computer, there is always the potential of something bad being introduced in some way, that that is one threat. Has there ever been any inkling that in all the tremendous amount of remediation you did, that anything bad got in?

ADM. QUIGLEY: No. We don't have any indication of that. And let me just throw one more thing in.

That was a period of time that we were so focused, and looking so carefully and so intently with checks and double-checks on the system -- I certainly won't promise that it's impossible -- but I would think that very unlikely, given the amount of attention that was focused on that topic at the time.

Q: This check you are going to do -- are you instructing people to stay away from certain sites? For example, I am sure there are people in the department who have bought books at Amazon. Is there going to be any instruction to "don't do that right now," or, "Don't do a search on Yahoo! right now"?

ADM. QUIGLEY: No, I don't -- I mean, I'll -- we should wait until the actual message comes out, Dale. But it's my understanding that that's not the thrust of the direction. It is to check our own systems, again with the purpose being to see that to the best of our ability, that our own systems are not being used, unwittingly, to assist attacking other systems.

Q: So you're not telling your people to stay away from certain sites?

ADM. QUIGLEY: Not, that I know of; I am not aware of any such direction.

Q: One more on the computer thing. If you had no indication, then why -- who thought of the idea to even check?

ADM. QUIGLEY: Our C3I folks thought that it was simply the right thing to do given the scope of the Defense Department's investment in computer systems and networks. And all things considered, being very much aware of what's going on in the United States the last couple, three days, this, they felt, was just a prudent check to do. And they have been widely supported here within the building.

Q: And has DOD done any consulting with any of their companies, since you guys have the joint task force in Computer Network Defense -- (inaudible)?

ADM. QUIGLEY: I don't know, Pam. I would have to check with Space Command on that one.

Q: Thank you.

(end transcript)

(Distributed by the Office of International Information Programs, U.S. Department of State.)
NNNN


Return to Washington File Main Page
Return to the Washington File Log