CybersecurityU.S. battling simulated cyber attack in Cyber Storm III exercise
A 3-day cyber exercise simulates a “large-scale cyberattack on critical infrastructure,” involving thousands of participants at computer work stations across the globe and is one of the largest such exercises ever conducted; the biennial exercise is being staged by DHS and is the first test of the new National Cybersecurity and Communications Integration Center (NCCIC); the NCCIC booted up in October 2009 to serve as the coordinating center for U.S. cybersecurity operations and houses U.S. government computer experts and their private sector counterparts under one roof
Participants in the Cyber Storm exercise // Source: blogspot.com
Keyboard warriors from the United States and a dozen other nations have been battling a simulated cyber attack Tuesday on government and private networks that undermines basic trust in the Internet.
“Cyber Storm III,” which simulates a “large-scale cyberattack on critical infrastructure,” involves thousands of participants at computer work stations across the globe and is one of the largest such exercises ever conducted. AFP reports that in the United States, seven U.S. government departments are taking part: Commerce, Defense, Energy, DHS, Justice, Transportation, and Treasury, in addition to the White House and intelligence and law enforcement.
Eleven U.S. states are also represented as are sixty private companies and the twelve “international partners”: Australia, Britain, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden, and Switzerland.
The biennial exercise is being staged by DHS and is the first test of the new National Cybersecurity and Communications Integration Center based in an office building in this Washington suburb.
The NCCIC booted up in October 2009 to serve as the coordinating center for U.S. cybersecurity operations and houses U.S. government computer experts and their private sector counterparts under one roof.
Brett Lambo, director of DHS’s Cyber Exercise Program, stressed that Cyber Storm III, which is expected to last three days, is “completely simulated.”
“We’re not attacking any real networks,” Lambo told reporters. “We’re not injecting any real malware.”
The participants in the exercise will receive more than 1,500 “injects” of simulated events that they will have to react to as unknown adversaries seek to exploit known vulnerabilities in cyber infrastructure.
Potential consequences of the simulated attacks could include “loss of life and the crippling of critical government and private sector functions” such as communications networks and power grids, according to the DHS.
Lambo outlined the general scenario of the exercise for reporters at the high-security NCCIC facility in Arlington but was careful not to give away too much to avoid tipping off the participants.
“In Cyber Storm III, we’re kind of using the Internet to attack itself,” Lambo said, by compromising the system of encrypted digital certificates that verify identities on the Internet. At a certain point the operation of the Internet is reliant on trust — knowing where you’re going is where you’re supposed to be,” Lambo said. “We’re going to try to compromise that chain of trust by attacking something that’s fundamental to the operation of the Internet,” he said.
Lambo said the Pentagon and National Security Agency, the super secret U.S. surveillance agency, were involved in the planning process for the exercise, which will be controlled from U.S. Secret Service headquarters in Washington. “They’ll be arm and arm in the fight with us,” he said.
Lambo said there were multiple goals for Cyber Storm III, including evaluating information-sharing among the participants, assessing their preparedness and evaluating their response to the various threats.
DHS secretary Janet Napolitano said in a statement that “exercises like Cyber Storm III allow us build upon the significant progress we’ve made in responding to evolving cyber threats.”
Randy Vickers, director of the U.S. Computer Emergency Readiness Team, said “Cyber Storm III” will be the first meaningful test of the NCCIC center intended to bring together the various components of U.S. cyber defenses. In the past we had bubbles of influence,” Vickers told reporters in the NCCIC “watch room,” which features five huge wall screens displaying threat data and other information in real-time and dozens of computer work stations. “All of that has been integrated now into one room,” he said.