Risk
2/17/2010
06:48 PM
Connect Directly
RSS
E-Mail
50%
50%

U.S. Fails Test In Simulated Cyberattack

Organizers, observers of 'Cyber Shockwave' conclude nation is not ready for the real thing

A large-scale simulated cyberattack on the U.S. yesterday proved one thing, according to organizers: The country isn't prepared for a real attack.

In a press release issued today, the Bipartisan Policy Center (BPC) -- which organized "Cyber Shockwave" using a group of former government officials and computer simulations -- concluded the U.S is "unprepared for cyber threats."

Former Secretary of Homeland Security Michael Chertoff, who chaired the simulated National Security Council, says cyberterrorism "ought to be treated as a threat of sufficient seriousness that we give it the priority attention we've given weapons of mass destruction." Cyberterrorism is "more complicated by the fact that it involves every individual," Chertoff says. "Anybody who has a smartphone, who downloads an app, or gets on their PC is engaged in this process."

Reports from those who witnessed the simulation indicate that the U.S. defenders had difficulty identifying the source of the simulated attack, which in turn made it difficult to take action.

"During the exercise, a server hosting the attack appeared to be based in Russia," said one report. "However, the developer of the malware program was actually in the Sudan. Ultimately, the source of the attack remained unclear during the event."

The simulation envisioned an attack that unfolds during a single day in July 2011. When the council convenes to face this crisis, 20 million of the nation's smartphones have already stopped working. The attack -- the result of a malware program that had been planted in phones months earlier through a popular "March Madness" basketball bracket application -- disrupts mobile service for millions. The attack escalates, shutting down an electronic energy trading platform and crippling the power grid on the Eastern seaboard.

"A useful aspect of something like this simulation is it helps people visualize what is realistic and possible in some circumstances," says John McLaughlin, who played the role of director of national intelligence. "The smart thing is to prepare now, to do the legislation now, to do the bipartisan work now, to do the intelligence work now, the foreign policy work. These are all very complicated things, and we need to get started on them."

Stephen Friedman, who played the role of secretary of the Treasury, says of a potential cyberattack on the U.S.: "There is no question in my mind that this is a predictable surprise, and we need to get our acts together."

The panel of government officials agreed that cyberterrorism is a national security issue that needs to be addressed quickly and in a bipartisan manner. "It raises an issue of the system's responsibility to be able to come together in a nonpartisan way and figure out the answer to questions as opposed to kicking the can down the road until we're in an emergency," Chertoff says.

The exercise also raised legal questions regarding personal privacy versus national security. "We have to come to grips with the implications for our personal privacy and the relationship between the federal government and the private sector," says Jamie Gorelick, who played the role of attorney general.

"Cyber ShockWave demonstrated the tremendous challenges the government has in dealing with potential cyberattacks," says Jason Grumet, founder and president of the BPC. "Our goal for Cyber Shockwave was to identify real policy and preparedness issues that need to be addressed in order to combat an attack of this magnitude that escalates rapidly and is of unknown origin."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1544
Published: 2014-07-23
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger cer...

CVE-2014-1547
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1548
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1549
Published: 2014-07-23
The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applica...

CVE-2014-1550
Published: 2014-07-23
Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.