Risk
3/8/2012
04:14 PM
50%
50%

Feds Simulate Crippling Cybersecurity Attack On NYC Electricity

Senators and agencies participate in exercise, which simulated how the government might respond in the event of a cyberattack on New York's electricity supply during a summer heat wave.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
U.S. senators Wednesday participated in a multi-agency exercise to simulate how the government might respond in the event of a cyber attack that cripples New York City’s electric supply during a summer heat wave.

The demonstration was part of an effort by lawmakers to encourage bi-partisan cooperation on cybersecurity to underscore how important it is for the feds to align on the issue.

In addition to members of the Senate, top cybersecurity officials from various departments and agencies--including the White House, the Department of Homeland Security (DHS), FBI, and National Security Agency--also participated in the event, which illustrated the consequences of a massive cyber attack at a critical time in a major U.S. city. Officials were keeping exact details of what happened at the exercise confidential.

The senior administration officials involved--including DHS secretary Janet Napolitano, White House cybersecurity coordinator Howard Schmidt, and FBI director Robert Mueller--used the exercise to stress the need for legislation to more effectively prevent and respond to potential cyber attacks in the United States, said DHS press secretary Matt Chandler. Laws that officials want Congress to pass include risk-based performance standards for critical infrastructure systems so they meet at least a baseline level of security.

[ Federal cybersecurity incidents are growing. See Federal Cybersecurity Incidents Rocket 650% In 5 Years. ]

The Obama administration submitted a cybersecurity proposal to Congress last May to outline its priorities for cybersecurity and to press lawmakers to pass comprehensive legislation to protect critical U.S. infrastructure that powers the Internet, utilities, and other control systems that are vulnerable to attack. Cybersecurity coordinator Schmidt also pressured Congress in January to pass cybersecurity legislation; however, it has yet to do so, though it is considering a number of bills.

Since then other officials also have been sounding the alarm to get Congress to take action. Thursday National Security Council spokeswoman Caitlyn Hayden urged it to provide legislation to support federal cybersecurity efforts already underway.

"Only Congress can modernize our underlying laws and give us the full range of tools our cybersecurity professionals need to more effectively deal with this growing and increasingly sophisticated threat," she said.

Earlier this week commission co-chairs Tom Kean and Lee Hamilton, former 9/11 commission co-chairs, also took up the cause in a letter sent to Majority Leader Harry Reid and Minority Leader Mitch McConnell. Senate co-sponsors of bi-partisan cybersecurity legislations--Sens. Joe Lieberman, I-Conn., Susan Collins, R-Maine, Jay Rockefeller, D-W.Va., and Dianne Feinstein, D-Calif.--released the letter.

"Comprehensive legislation is needed to flesh out a range of pressing cyber security policy questions, including how the federal government should defend against and respond to cyber attacks and what measures private sector owners of critical infrastructure should take to prevent the damage or disruption of their often interconnected and interdependent networks," the senators said in the letter, which Rockefeller’s office sent to InformationWeek. "Nothing less than the security of our electricity, communications, financial, and water systems is at stake."

How 10 federal agencies are tapping the power of cloud computing--without compromising security. Also in the new, all-digital InformationWeek Government supplement: To judge the success of the OMB's IT reform efforts, we need concrete numbers on cost savings and returns. Download our Cloud In Action issue of InformationWeek Government now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ANON1241624276539
50%
50%
ANON1241624276539,
User Rank: Apprentice
3/9/2012 | 6:24:56 PM
re: Feds Simulate Crippling Cybersecurity Attack On NYC Electricity
BPrince, Is that a serious question? (Just being cynical, not insulting.) OF COURSE I don't!
Bprince
50%
50%
Bprince,
User Rank: Ninja
3/9/2012 | 5:15:59 PM
re: Feds Simulate Crippling Cybersecurity Attack On NYC Electricity
@ readers: how confident are you in the goverment's ability to respond effectively to this type of cyber attack?
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.