The Pentagon handed over 175m IP addresses to a company you've never heard of

Networks
(Image credit: Shutterstock)

Earlier this year, the US Department of Defense (DoD) began handing over large swaths of IP addresses to a relatively unknown company, just as the nation welcomed a change of President.

Now after months of speculation, the Pentagon has offered an explanation about its decision to hand over the IP address to Global Resource Systems (GRS) in a statement to the Washington Post.

“Defense Digital Service (DDS) authorized a pilot effort advertising DoD Internet Protocol (IP) space using Border Gateway Protocol (BGP). This pilot will assess, evaluate and prevent unauthorized use of DoD IP address space. Additionally, this pilot may identify potential vulnerabilities,” said DDS’s director, Brett Goldstein.

TechRadar needs you!

We're looking at how our readers use VPN for a forthcoming in-depth report. We'd love to hear your thoughts in the survey below. It won't take more than 60 seconds of your time.

>> Click here to start the survey in a new window<<

According to reports, the DDS became operational in 2015 and has conducted a number of defense-tech projects at the behest of the Pentagon.

Threat intelligence

The DoD has already handed over 175 million IP addresses to GRS, and in a follow up by Washington Post, the DoD has confirmed that it still owns the IP addresses.

While the statement ended months of speculation it only painted broad strokes about what the effort is trying to achieve. It also failed to answer why the DoD handed over the IPs to a company that seems not to have existed until September 2020 and it doesn't even have a public website.

Cybersecurity experts believe that the move is part of the DoDs efforts to defend against intrusions in light of an increase in state-sponsored attacks such as the recent SolarWinds hack.

In a blog post, Doug Madory, Director of Internet Analysis at network operating company Kentik, believes that the move perhaps helps the DoD collect a massive amount of background internet traffic for threat intelligence.

Madory believes that analyzing the flow of traffic through those IP addresses could provide operational information about the activities of malicious actors and perhaps even reveal exploitable weaknesses in computer systems. 

Via Engadget

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
An American flag flying outside the US Capitol building against a blue sky
US military and defense contractors hit with Infostealer malware
Data leak
Details of over 15,000 FortiGate devices leaked online, so be on your guard
Ethernet cables with IP addresses in the background
What is my IP address? How to find out and what it means
Ransomware
Researchers hijack thousands of backdoors thanks to expired domains
watch biden inauguration day 2021
US Government Defense bill waters down creation of US Cyber Force, allocates billions to "rip and replace" Chinese tech
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Cisco, ASUS, QNAP, and Synology devices hijacked to major botnet
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras