Risk
3/8/2012
04:14 PM
Connect Directly
RSS
E-Mail
50%
50%

Feds Simulate Crippling Cybersecurity Attack On NYC Electricity

Senators and agencies participate in exercise, which simulated how the government might respond in the event of a cyberattack on New York's electricity supply during a summer heat wave.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
U.S. senators Wednesday participated in a multi-agency exercise to simulate how the government might respond in the event of a cyber attack that cripples New York City’s electric supply during a summer heat wave.

The demonstration was part of an effort by lawmakers to encourage bi-partisan cooperation on cybersecurity to underscore how important it is for the feds to align on the issue.

In addition to members of the Senate, top cybersecurity officials from various departments and agencies--including the White House, the Department of Homeland Security (DHS), FBI, and National Security Agency--also participated in the event, which illustrated the consequences of a massive cyber attack at a critical time in a major U.S. city. Officials were keeping exact details of what happened at the exercise confidential.

The senior administration officials involved--including DHS secretary Janet Napolitano, White House cybersecurity coordinator Howard Schmidt, and FBI director Robert Mueller--used the exercise to stress the need for legislation to more effectively prevent and respond to potential cyber attacks in the United States, said DHS press secretary Matt Chandler. Laws that officials want Congress to pass include risk-based performance standards for critical infrastructure systems so they meet at least a baseline level of security.

[ Federal cybersecurity incidents are growing. See Federal Cybersecurity Incidents Rocket 650% In 5 Years. ]

The Obama administration submitted a cybersecurity proposal to Congress last May to outline its priorities for cybersecurity and to press lawmakers to pass comprehensive legislation to protect critical U.S. infrastructure that powers the Internet, utilities, and other control systems that are vulnerable to attack. Cybersecurity coordinator Schmidt also pressured Congress in January to pass cybersecurity legislation; however, it has yet to do so, though it is considering a number of bills.

Since then other officials also have been sounding the alarm to get Congress to take action. Thursday National Security Council spokeswoman Caitlyn Hayden urged it to provide legislation to support federal cybersecurity efforts already underway.

"Only Congress can modernize our underlying laws and give us the full range of tools our cybersecurity professionals need to more effectively deal with this growing and increasingly sophisticated threat," she said.

Earlier this week commission co-chairs Tom Kean and Lee Hamilton, former 9/11 commission co-chairs, also took up the cause in a letter sent to Majority Leader Harry Reid and Minority Leader Mitch McConnell. Senate co-sponsors of bi-partisan cybersecurity legislations--Sens. Joe Lieberman, I-Conn., Susan Collins, R-Maine, Jay Rockefeller, D-W.Va., and Dianne Feinstein, D-Calif.--released the letter.

"Comprehensive legislation is needed to flesh out a range of pressing cyber security policy questions, including how the federal government should defend against and respond to cyber attacks and what measures private sector owners of critical infrastructure should take to prevent the damage or disruption of their often interconnected and interdependent networks," the senators said in the letter, which Rockefeller’s office sent to InformationWeek. "Nothing less than the security of our electricity, communications, financial, and water systems is at stake."

How 10 federal agencies are tapping the power of cloud computing--without compromising security. Also in the new, all-digital InformationWeek Government supplement: To judge the success of the OMB's IT reform efforts, we need concrete numbers on cost savings and returns. Download our Cloud In Action issue of InformationWeek Government now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ANON1241624276539
50%
50%
ANON1241624276539,
User Rank: Apprentice
3/9/2012 | 6:24:56 PM
re: Feds Simulate Crippling Cybersecurity Attack On NYC Electricity
BPrince, Is that a serious question? (Just being cynical, not insulting.) OF COURSE I don't!
Bprince
50%
50%
Bprince,
User Rank: Ninja
3/9/2012 | 5:15:59 PM
re: Feds Simulate Crippling Cybersecurity Attack On NYC Electricity
@ readers: how confident are you in the goverment's ability to respond effectively to this type of cyber attack?
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio