Risk
2/17/2010
06:48 PM
Connect Directly
RSS
E-Mail
50%
50%

U.S. Fails Test In Simulated Cyberattack

Organizers, observers of 'Cyber Shockwave' conclude nation is not ready for the real thing

A large-scale simulated cyberattack on the U.S. yesterday proved one thing, according to organizers: The country isn't prepared for a real attack.

In a press release issued today, the Bipartisan Policy Center (BPC) -- which organized "Cyber Shockwave" using a group of former government officials and computer simulations -- concluded the U.S is "unprepared for cyber threats."

Former Secretary of Homeland Security Michael Chertoff, who chaired the simulated National Security Council, says cyberterrorism "ought to be treated as a threat of sufficient seriousness that we give it the priority attention we've given weapons of mass destruction." Cyberterrorism is "more complicated by the fact that it involves every individual," Chertoff says. "Anybody who has a smartphone, who downloads an app, or gets on their PC is engaged in this process."

Reports from those who witnessed the simulation indicate that the U.S. defenders had difficulty identifying the source of the simulated attack, which in turn made it difficult to take action.

"During the exercise, a server hosting the attack appeared to be based in Russia," said one report. "However, the developer of the malware program was actually in the Sudan. Ultimately, the source of the attack remained unclear during the event."

The simulation envisioned an attack that unfolds during a single day in July 2011. When the council convenes to face this crisis, 20 million of the nation's smartphones have already stopped working. The attack -- the result of a malware program that had been planted in phones months earlier through a popular "March Madness" basketball bracket application -- disrupts mobile service for millions. The attack escalates, shutting down an electronic energy trading platform and crippling the power grid on the Eastern seaboard.

"A useful aspect of something like this simulation is it helps people visualize what is realistic and possible in some circumstances," says John McLaughlin, who played the role of director of national intelligence. "The smart thing is to prepare now, to do the legislation now, to do the bipartisan work now, to do the intelligence work now, the foreign policy work. These are all very complicated things, and we need to get started on them."

Stephen Friedman, who played the role of secretary of the Treasury, says of a potential cyberattack on the U.S.: "There is no question in my mind that this is a predictable surprise, and we need to get our acts together."

The panel of government officials agreed that cyberterrorism is a national security issue that needs to be addressed quickly and in a bipartisan manner. "It raises an issue of the system's responsibility to be able to come together in a nonpartisan way and figure out the answer to questions as opposed to kicking the can down the road until we're in an emergency," Chertoff says.

The exercise also raised legal questions regarding personal privacy versus national security. "We have to come to grips with the implications for our personal privacy and the relationship between the federal government and the private sector," says Jamie Gorelick, who played the role of attorney general.

"Cyber ShockWave demonstrated the tremendous challenges the government has in dealing with potential cyberattacks," says Jason Grumet, founder and president of the BPC. "Our goal for Cyber Shockwave was to identify real policy and preparedness issues that need to be addressed in order to combat an attack of this magnitude that escalates rapidly and is of unknown origin."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5619
Published: 2014-09-29
The Sleuth Kit (TSK) 4.0.1 does not properly handle "." (dotfile) file system entries in FAT file systems and other file systems for which . is not a reserved name, which allows local users to hide activities it more difficult to conduct forensics activities, as demonstrated by Flame.

CVE-2012-5621
Published: 2014-09-29
lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings.

CVE-2012-6107
Published: 2014-09-29
Apache Axis2/C does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVE-2012-6110
Published: 2014-09-29
bcron-exec in bcron before 0.10 does not close file descriptors associated with temporary files when running a cron job, which allows local users to modify job files and send spam messages by accessing an open file descriptor.

CVE-2013-1874
Published: 2014-09-29
Untrusted search path vulnerability in csi in Chicken before 4.8.2 allows local users to execute arbitrary code via a Trojan horse .csirc in the current working directory.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.