Information Security News mailing list archives
Stealth secrets feared stolen
From: William Knowles <wk () C4I ORG>
Date: Tue, 31 Oct 2000 12:39:47 -0600
http://www.msnbc.com/local/PISEA/5228.asp PAUL SHUKOVSKY SEATTLE P-I REPORTER Oct. 30, 2000 - A Russian mathematician who was given access to an American supercomputer loaded with stealth warplane design software is under investigation for espionage. FEDERAL AGENTS SUSPECT that Aleksey Yeremin, who logged on to the supercomputer from Moscow, took advantage of Lockheed Martin and military security lapses to steal stealth technology secrets. The 3 1/2-year investigation stretches from the heart of the old Soviet empire to Lockheeds secretive Skunk Works plant in Southern California to a quiet suburb north of Seattle. Yeremin, vice president of a software company based in Bothell that did work for Lockheed, was e-mailed part of Lockheeds modeling program for designing stealth planes. And, sources say, it would have been easy for him to steal the rest of it. The potential loss is staggering: the United States global monopoly on radar invisibility. In spring 1997, the FBI and the Air Force Office of Special Investigations, or OSI, began the investigation, code-named Digital Demon. A short time later, Lockheed pulled the plug on its project with Yeremin: an ultra-high-speed, number-crunching computer program that was supposed to greatly accelerate stealth aircraft design work. Federal criminal-justice sources say Yeremin, 46, has connections to the Russian military and now-defunct KGB. It is unknown whether Yeremin got his hands on any classified information. But sources told the Seattle Post-Intelligencer that some of the unclassified information he did obtain should have been classified top-secret. A retired Air Force three-star general said he is concerned that the apparent leak could help the Russians build their own stealth warplanes. I dont think what is at risk here is making these (U.S.) aircraft any more visible to radar, said George Muellner, who played a key role in developing the nations stealth fleet. But what is at risk is accelerating a countrys ability to develop and build these sorts of aircraft to produce something that is a threat downstream, he said. If they started building and selling these things to the Iraqis, that would be a concern. The joint FBI-Air Force probe has so far yielded no arrests, and no one has been publicly charged with a crime. Agents have seized the home computer of a Lockheed employee who worked closely with Yeremin. That man told the P-I that he now realizes he was deftly manipulated by Yeremin. I am not 100 percent sure, but I am highly sure he is a spy, said the 38-year-old computer expert, who no longer works for Lockheed. He asked that he not be identified for fear of jeopardizing his current job. He said he went beyond giving Yeremin portions of the MM3D simulation software used to model highly complex interactions between stealth aircraft and radar that the Russian needed to do his job. He said he also provided information that Yeremin could have used to determine American stealth capabilities. I have to admit, I am very gullible, very naive, very trusting, he said. He asked very probing questions, but I pushed my concerns away. Now I can look back and see how he gathered information from me. He used textbook ways to win over someone; to recruit them as an operative or agent. He would earn my trust by saying he was not in any way . . . loyal to the country he was from, but wanted to come here. The computer expert is befuddled by how Lockheed and the Air Force could allow a Russian with KGB ties access to such a sensitive program. Lockheed refused to answer questions about whether security was compromised. The Air Force would not explain how it conducts security oversight of the defense contractor. Officials at Skunk Works, in Palmdale, Calif., where the U-2 spy plane, the bat-winged F-117 and the F-22 were designed, first became aware in 1997 that an employee . . . was not reporting contacts with foreign nationals as required by governing security regulations, Lockheed spokesman Sam Grizzle said in a prepared statement. The officials reported the violations to appropriate U.S. government agencies and followed their instructions in addressing the situation. The employee in question no longer works for Lockheed Martin, Grizzle said. The FBI and the Air Force OSI declined to comment on the case, and federal prosecutors did not return a call. What I can tell you is it is an ongoing investigation, said Maj. Mike Richmond, an OSI spokesman at Andrews Air Force Base in Maryland. There are strong parallels to the Wen Ho Lee case, which also raised questions about digital transmission of technology to foreign nationals, and the way in which the federal government classifies its secrets. The government feared that Lee, a scientist at Los Alamos National Laboratory in New Mexico, had stolen computer records containing the crown jewels of U.S. nuclear secrets and turned them over to the Chinese government. He recently pleaded guilty to a single count of mishandling classified information and received a sentence of time served nine months. A federal judge delivered a stinging rebuke of the governments handling of the case, apologizing to Lee for the harsh conditions of his incarceration. The Bothell connection Working out of his Bothell home, high-tech entrepreneur Russ Sarbora plucked Yeremin from a Russian military aircraft-design center a decade ago and collaborated with him to start a company called Elegant Mathematics. Today, Sarbora is shocked that his business partner is under investigation in an espionage case. I believe he is not an agent for any foreign power, Sarbora said. It would surprise me enormously if he turned out to be. Yeremin readily acknowledged working for the Soviet military, according to Sarbora, but prior to 1990, if you were a scientist of any stature, you worked for the Soviet military structure. You didnt get to work, or support in school without working for the military. Reached recently at his home in Moscow, Yeremin refused to discuss the espionage allegations. If somebody say something about that, it is better that you ask this individual, he said in heavily accented English. Yeremin and his associates in Russia were working on computers loaded with software known as MM3D, or Method of Moments in Three Dimensions. It would have been easy for people with their expertise to steal the portions of MM3D they hadnt already been given, the former Lockheed computer expert said. And it wasnt just MM3D that was at risk of being stolen. Also loaded on the experts home computer were test fixtures secret computer representations of stealth aircraft structures. The expert said he had been assured by Lockheed engineers that the test fixtures were not classified. But after the investigation began, federal agents claimed some were top-secret. One of the computers Yeremin was given access to also contained data on the performance characteristics of radar-absorbing materials that coat stealth planes, the expert said. Those data, however, did not specifically identify the name or chemical composition of the materials, he said. Gen. Muellner, now vice president-general manager of The Boeing Co.s Phantom Works research and development division, cautions that there may be no way of telling if the apparent leak is devastating or merely distressing. In the old days of espionage, blueprints, decoder machines and the like would suddenly disappear setting off alarms. Today, secrets can be downloaded without a trace. Its like the thing in Los Alamos, Muellner said. You dont know what is lost. Like Lee and former CIA Director John Deutch, who is under investigation for having classified information on his home computer, the Lockheed computer expert was working on an unsecure computer. His home computer was loaded with MM3D. The program, he said, contains a feature called an optimizer by which designers can simulate changes in aircraft configuration or materials and quickly see how that affects the planes radar invisibility. Unlike in the Deutch case, the computer expert said he had written permission from Lockheeds security and legal departments to work on the program at home. Only after the investigation began was he told that the optimizer should have been classified top-secret, he said. The computer expert said the reason he was allowed to work at home is that at night, he could access government and private supercomputers for free, saving Lockheed the expense of maintaining an in-house supercomputer on which he could work. I really campaigned hard to get an in-house supercomputer so I wouldnt have to go out on the Net, he said. He said he repeatedly sought guidance from Lockheed security officials over how far he could go with Yeremin but was either ignored or rebuffed. I had continually apprised security of everything, he said. Somebody out there knew what Alexs background was. But somehow the communication to the (security) guy that was supposed to be covering my back didnt happen. A former Lockheed security official agreed. It was bungled by Lockheed and the Air Force. From what I saw, everybody kind of snoozed through, kind of kissed it off. It was just keep an eye on it and give a report once in a while, said the former official, who spoke on condition of anonymity. The computer expert said he left Lockheed after the company pulled his access to work on the stealth program. He remained a Lockheed consultant for a time, then left for another job. He maintains that any information he gave Yeremin pales in comparison to open articles written by scientists and engineers, and technical information available over the Internet. The bigger issue is that these guys (Russian mathematicians) had access to a lot of computers and computer networks, the former employee said. Their software was being run on many American networks and supercomputers. Yeremins algorithm The 48-year-old Sarbora is a longtime software programmer and former computer industry executive. He moved to Seattle in 1988 to become vice president of quality assurance and technical support at Microrim Inc., a database software company. During the Goodwill Games of 1990, Sarbora volunteered to work on a project showcasing the best of Soviet technology and met several Russian scientists. The following year, Sarbora went to Russia on a business trip, looking to bring back software he could sell to U.S. companies. He said he met Yeremin at the Central Aerohydrodynamics Institute, about 30 miles southeast of Moscow, where Russian warplanes are designed. It was shortly after the fall of the Soviet Union. Work for scientists and mathematicians in Russia was rapidly disappearing. The U.S. government feared they would peddle their expertise in rogue states like Libya or Iraq. When Sarbora learned that Yeremin had created an algorithm, or calculation method, that could achieve on relatively primitive computers what U.S. scientists did on supercomputers, he immediately grasped the scientific and commercial potential. Yeremin joined forces with Sarbora to launch Elegant Mathematics. They incorporated in Washington state with Sarbora as president and Yeremin as vice president. The main offices, however, were thousands of miles away in Moscow, at the Russian Academy of Sciences. At its peak, the company employed about 20 mathematicians, physicists and software experts from the Russian academy, Steklov Mathematical Institute and Moscow State University. We insisted on maintaining the team in Russia, Sarbora said. The idea is that after the transition from communism to capitalism, there would be a few teams that could maintain mathematics in Russia. We developed technology that would reduce computational costs of solving problems in stealth technology by reducing the number of calculations by an order of 10, Sarbora said. Sarbora said his company scored its first major contract with Cray, a supercomputer maker, and continued working on its software-development project at the Pittsburgh Supercomputing Center and at IBM. In 1994, Elegant Mathematics was hired by Lockheed to improve the efficiency and speed of computer simulations related to the interaction between the aircraft and radar. That effectively meant infusing MM3D with Yeremins solver program. The computer experts job at Lockheed involved using computers to simulate how a radar wave reflects off the surface of a plane. The whole idea of stealth technology is to prevent that reflection so the wave echo doesnt return to the radar antenna and get read on a radar screen. Over the next three years, the computer expert said, he met with Yeremin at Skunk Works at least 15 times. The sprawling facility in the Mojave Desert is surrounded by chain-link fences topped with razor wire. Armed guards are stationed at the gates. Access to secure buildings requires personal security codes and badges that open electronic locks. The former Lockheed security official said the company lusted after Elegant Mathematics promised cost-cutting technology. That was where the greed came in. Yeremin was offering this tantalizing carrot in front of everybody. Hes an interesting character, the computer expert said of Yeremin. I always liked him a lot because of his zeal for the task at hand. But he leaves a trail of people very pissed off because hes so arrogant. Hes brilliant, but not as brilliant as he thinks he is. The expert, however, said he believed in Yeremins algorithm. I have seen it solve big problems, he said. Seeing is believing. I dont think they were peddling snake oil. Others disagree. Even before the security concerns were raised, Yeremins breakthrough was being officially snubbed. Elegant Mathematics grant application to continue research into its algorithm failed to pass review at the Defense Advanced Research Projects Agency, a Defense Department agency that sponsors exotic research. The methods he (Yeremin) has developed are not considered competitive in this country. He got attention for a while, until his balloon was punctured, said University of Illinois professor Eric Michielssen, an expert in the use of computer modeling of radar problems. Fear of bugged software The computer expert said he sent Yeremin sections of source code, the underlying components of the MM3D program, by e-mail in early 1997. He said the source code was not classified, and the portions he sent were not related to the physics of stealth, but to technical requirements of inputting and retrieving data that Yeremin needed for his work. The expert was testing Yeremins software on supercomputers at the NASA Ames Research Center in California, the Oak Ridge National Laboratory in Tennessee and at IBM in New York. The entire MM3D program was loaded on the NASA Ames and IBM computers, as well as on his home computer, he said. Federal agents told the expert there were worries over whether Yeremins software might have been implanted with the hacking capability of e-mailing information from those computers back to Russia. And Yeremin had direct, online access to the IBM supercomputer, the expert said. The expert said the agents were never 100 percent sure that I had not sent the whole (MM3D) source code to Yeremin. I could have sent the whole farm to him. Which, of course, I did not. There was also the concern that Yeremin or one of his Russian colleagues could have hacked into the computer experts home computer. The expert said he followed the rules by reporting his e-mail exchanges with Yeremin to Lockheed security. Security people later turned over to Air Force OSI agents information on the e-mails, triggering the investigation. What the Air Force calls a Red Team a group of technology, military and security experts was mobilized to assess the potential damage to national security. One inside source said the team called it catastrophic. Other investigators are not convinced that Yeremin was involved in espionage, federal sources said. Like Muellner, the retired general, the former Lockheed computer expert worries that the Russians might have stolen technology that gives them a big boost in the design and construction of stealth aircraft. We dont know if he got the source codes, the computer expert said. That was the supposition due to the fact that we were working on the same computer. A routine hacker with the kind of access Yeremin had could have gotten the codes. When federal agents came calling on the computer expert on June 23, 1997, he was aghast. They entered his home in Californias Tehachapi Mountains and demanded that he turn over his computer. He said he cooperated fully. Traumatized beyond belief They told him he may have seriously damaged national security. I was traumatized beyond belief, he said. That was more than three years ago. The agents still have his hard drive. He hasnt been arrested since then, he asserts, because he didnt deliver classified information to Yeremin, had permission to work on his home computer and had no intent to damage national security. The FBI paid a similar call on Sarbora in 1997. Sarbora says it marked the beginning of the end for Elegant Mathematics. Lockheed soon cut its ties to the company. The specter of an espionage investigation scared off almost everyone else. The FBI, Sarbora said, interviewed our customers and prospective customers; anyone we had a relationship with. That had a very chilling effect on business. It pretty much put a box around it and shut it down. In 1997 and 1998, Sarbora was questioned several times by the FBI. So was Yeremin, who has not been seen in the United States since 1999. While Yeremin is still considered a person of interest in the spy case, Sarbora said the agents ultimately told him he was no longer under suspicion. By then, it was too late. The dreams of Yeremin and Sarbora had been dashed. So were the hopes of the crack team of Russian scientists. They are all scratching for jobs, Sarbora said. Elegant was on life-support comatose and remains so. P-I reporter Paul Shukovsky can be reached at 206-448-8072 or paulshukovsky () seattle-pi com *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* ISN is hosted by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- Stealth secrets feared stolen William Knowles (Nov 02)