Risk
2/17/2010
06:48 PM
Connect Directly
RSS
E-Mail
50%
50%

U.S. Fails Test In Simulated Cyberattack

Organizers, observers of 'Cyber Shockwave' conclude nation is not ready for the real thing

A large-scale simulated cyberattack on the U.S. yesterday proved one thing, according to organizers: The country isn't prepared for a real attack.

In a press release issued today, the Bipartisan Policy Center (BPC) -- which organized "Cyber Shockwave" using a group of former government officials and computer simulations -- concluded the U.S is "unprepared for cyber threats."

Former Secretary of Homeland Security Michael Chertoff, who chaired the simulated National Security Council, says cyberterrorism "ought to be treated as a threat of sufficient seriousness that we give it the priority attention we've given weapons of mass destruction." Cyberterrorism is "more complicated by the fact that it involves every individual," Chertoff says. "Anybody who has a smartphone, who downloads an app, or gets on their PC is engaged in this process."

Reports from those who witnessed the simulation indicate that the U.S. defenders had difficulty identifying the source of the simulated attack, which in turn made it difficult to take action.

"During the exercise, a server hosting the attack appeared to be based in Russia," said one report. "However, the developer of the malware program was actually in the Sudan. Ultimately, the source of the attack remained unclear during the event."

The simulation envisioned an attack that unfolds during a single day in July 2011. When the council convenes to face this crisis, 20 million of the nation's smartphones have already stopped working. The attack -- the result of a malware program that had been planted in phones months earlier through a popular "March Madness" basketball bracket application -- disrupts mobile service for millions. The attack escalates, shutting down an electronic energy trading platform and crippling the power grid on the Eastern seaboard.

"A useful aspect of something like this simulation is it helps people visualize what is realistic and possible in some circumstances," says John McLaughlin, who played the role of director of national intelligence. "The smart thing is to prepare now, to do the legislation now, to do the bipartisan work now, to do the intelligence work now, the foreign policy work. These are all very complicated things, and we need to get started on them."

Stephen Friedman, who played the role of secretary of the Treasury, says of a potential cyberattack on the U.S.: "There is no question in my mind that this is a predictable surprise, and we need to get our acts together."

The panel of government officials agreed that cyberterrorism is a national security issue that needs to be addressed quickly and in a bipartisan manner. "It raises an issue of the system's responsibility to be able to come together in a nonpartisan way and figure out the answer to questions as opposed to kicking the can down the road until we're in an emergency," Chertoff says.

The exercise also raised legal questions regarding personal privacy versus national security. "We have to come to grips with the implications for our personal privacy and the relationship between the federal government and the private sector," says Jamie Gorelick, who played the role of attorney general.

"Cyber ShockWave demonstrated the tremendous challenges the government has in dealing with potential cyberattacks," says Jason Grumet, founder and president of the BPC. "Our goal for Cyber Shockwave was to identify real policy and preparedness issues that need to be addressed in order to combat an attack of this magnitude that escalates rapidly and is of unknown origin."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-3304
Published: 2014-10-30
Directory traversal vulnerability in Dell EqualLogic PS4000 with firmware 6.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the default URI.

CVE-2013-7409
Published: 2014-10-30
Buffer overflow in ALLPlayer 5.6.2 through 5.8.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .m3u (playlist) file.

CVE-2014-3446
Published: 2014-10-30
SQL injection vulnerability in wcm/system/pages/admin/getnode.aspx in BSS Continuity CMS 4.2.22640.0 allows remote attackers to execute arbitrary SQL commands via the nodeid parameter.

CVE-2014-3584
Published: 2014-10-30
The SamlHeaderInHandler in Apache CXF before 2.6.11, 2.7.x before 2.7.8, and 3.0.x before 3.0.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted SAML token in the authorization header of a request to a JAX-RS service.

CVE-2014-3623
Published: 2014-10-30
Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vect...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.