Arlington, Virginia (AFP) Sept 28, 2010
Keyboard warriors from the United States and a dozen other nations were battling a simulated cyber attack Tuesday on government and private networks that undermines basic trust in the Internet.
"Cyber Storm III," which simulates a "large-scale cyberattack on critical infrastructure," involves thousands of participants at computer work stations across the globe and is one of the largest such exercises ever conducted.
In the United States, seven US government departments are taking part: Commerce, Defense, Energy, Homeland Security, Justice, Transportation and Treasury, in addition to the White House and intelligence and law enforcement.
Eleven US states are also represented as are 60 private companies and the 12 "international partners": Australia, Britain, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden and Switzerland.
The biennial exercise is being staged by the Department of Homeland Security and is the first test of the new National Cybersecurity and Communications Integration Center based in an office building in this Washington suburb.
The NCCIC booted up in October 2009 to serve as the coordinating center for US cybersecurity operations and houses US government computer experts and their private sector counterparts under one roof.
Brett Lambo, director of DHS's Cyber Exercise Program, stressed that "Cyber Storm III," which is expected to last three days, is "completely simulated."
"We're not attacking any real networks," Lambo told reporters. "We're not injecting any real malware."
The participants in the exercise will receive more than 1,500 "injects" of simulated events that they will have to react to as unknown adversaries seek to exploit known vulnerabilities in cyber infrastructure.
Potential consequences of the simulated attacks could include "loss of life and the crippling of critical government and private sector functions" such as communications networks and power grids, according to the DHS.
Lambo outlined the general scenario of the exercise for reporters at the high-security NCCIC facility in Arlington but was careful not to give away too much to avoid tipping off the participants.
"In Cyber Storm III, we're kind of using the Internet to attack itself," Lambo said, by compromising the system of encrypted digital certificates that verify identities on the Internet.
"At a certain point the operation of the Internet is reliant on trust -- knowing where you're going is where you're supposed to be," Lambo said.
"We're going to try to compromise that chain of trust by attacking something that's fundamental to the operation of the Internet," he said.
Lambo said the Pentagon and National Security Agency, the super secret US surveillance agency, were involved in the planning process for the exercise, which will be controlled from US Secret Service headquarters in Washington.
"They'll be arm and arm in the fight with us," he said.
Lambo said there were multiple goals for "Cyber Storm III," including evaluating information-sharing among the participants, assessing their preparedness and evaluating their response to the various threats.
Homeland Security Secretary Janet Napolitano said in a statement that "exercises like Cyber Storm III allow us build upon the significant progress we've made in responding to evolving cyber threats."
Randy Vickers, director of the US Computer Emergency Readiness Team, said "Cyber Storm III" will be the first meaningful test of the NCCIC center intended to bring together the various components of US cyber defenses.
"In the past we had bubbles of influence," Vickers told reporters in the NCCIC "watch room," which features five huge wall screens displaying threat data and other information in real-time and dozens of computer work stations.
"All of that has been integrated now into one room," he said.
Share This Article With Planet Earth
Cyberwar - Internet Security News - Systems and Policy Issues
Stuxnet mutating, rampaging through Iran: IT official
Tehran (AFP) Sept 27, 2010
The Stuxnet worm is mutating and wreaking further havoc on computerised industrial equipment in Iran where about 30,000 IP addresses have already been infected, IRNA news agency reported on Monday. "The attack is still ongoing and new versions of this virus are spreading," Hamid Alipour, deputy head of Iran's Information Technology Company, was quoted as saying by IRNA, Iran's official news ... read more
Northrop Grumman And Boeing Partner For Missile Defense Simulation Architecture Contract|
Russia, NATO Should Fully Analyze Missile Threat To Europe
Second Generation Aegis BMD Capability Completes Formal Testing
Russian Air-Defense Bases Require Additional Protection
Raytheon Awarded Contract For Standard Missile-3 Block IIA
Sweden Signs Production Order Contract For Meteor Missile
Russia caving to US pressure in missile sale ban: Iran
Russia missiles to Syria spark Israeli ire
US drone strike kills four militants in Pakistan
Two US drone strikes kill seven militants in Pakistan
Boeing Wins DARPA Vulture II Program
US drone strike kills six in northwest Pakistan: officials
Raytheon GBS Delivers Full-Motion Video To Improve Intelligence Imagery For Warfighters
MEADS Demonstrates Interoperability With NATO
Modern infrastructures said 'vulnerable'
MEADS Completes CDR And Is Ready For Flight Test
Raytheon Unveils Lighter, Faster, Stronger Exoskeleton Robotic Suit
Boeing Completes Production Of First Australian Super Hornet
Northrop Grumman Hosts Marine Corps Reps As G/ATOR Enters Final Stages Of Development
Reaper joins British air force in combat
India, U.S. to sign $3.5B defense deal
Russian arms ban boosts Iran gunrunners
Saudi king, British defence minister in security talks
EU risks US-China domination with military cuts: France
Japan eyes PM talks with China to defuse row
Russia's Medvedev says ties with China at 'highest point'
China warns Nobel committee over dissident
Pentagon seeks to revive US-China military relations
Boeing Receives Task Order For Design Of Free Electron Laser Lab Demonstrator
Lasers could protect helicopters from harm
New System Developed To Test And Evaluate High-Energy Laser Weapons
Truck-borne laser weapon to be on way soon
|The content herein, unless otherwise known to be public domain, are Copyright 1995-2010 - SpaceDaily. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement|