Home / International / World Tools: Save | Print | E-mail | Most Read | Comment
US holds largest simulated cyber-attack exercise
Adjust font size:

US officials said Thursday that "real and growing" threats to US computer and telecommunications networks were behind the holding of the largest-ever cyber-security exercises this week.

Computer security experts from five countries, more than 40 private sector companies, and numerous government and state agencies are spending a week fielding simulated "real-world", on-line attacks on the computer systems of government bodies, corporations, transportation and other key industries.

Robert Jamison, the Department of Homeland Security (DHS) Under Secretary for the National Protection and Programs Directorate, said the Cyber Storm II exercise sought to foster personal links between key officials in business and government.

Those people, he said, are not always willing to share information about security issues involving the networks they run.

"We're concerned that the threats are real and growing" as the Internet expands, Jamison said.

Cyber Storm II tested the warning systems in place for attacks and sought to identify gaps in the way information was shared and reactions coordinated across various sectors.

Several dozen experts crowded into a computer-filled room inside the US Secret Service Headquarters in Washington in sections marked off as chemicals, transportation, telecommunications, state and local governments, and other sectors, for the five-day exercise.

Thousands more were tied into the exercise elsewhere in the US, in Britain, Australia, Canada and New Zealand, and in major companies like Dow Chemical, Wachovia bank, ABB and Cisco.

They fielded some 1,800 "injects", various types of challenges, from hacker break-ins and extortion demands to DNS amplification attacks – dangerous intensified versions of denial of service attacks that seek to overwhelm and shut down networks.

The exercise involved at least one massive, politically-motivated, coordinated cyber-attack knocking out enough computer and telecommunications networks to require an internationally coordinated response.

"We're trying to simulate sophisticated adversaries," Jamison said.

Some of the exercise involved testing the "Einstein program" – the US government's top-secret automated process for monitoring security and detecting intrusions on all the government's network gateways.

Greg Garcia, DHS Assistant Secretary for Cyber Security and Communications, said Cyber Storm II aimed at overcoming complacency and piecing together a "digital jigsaw puzzle" of linkages in critical public and private sector systems and networks.

"People are starting to get it," he said about cooperating on security threats.

DHS officials declined to say what kinds of threats they found were most dangerous or what specific weaknesses were identified, citing security needs, but said a report on the exercise would be released later this year.

(China Daily via Agencies March 14, 2008)

Tools: Save | Print | E-mail | Most Read
Comment
Pet Name
Anonymous
China Archives
Related >>
- Cyber crime proving a tough battle
- Online Crime Trend Grows in Shenzhen
- Fighting Against Internet Crime
Most Viewed >>
- The Human Rights Record of the United States in 2007
- Roundup: Foreign Minister meets journalists
- China issues US human rights record in 2007
- Defense program no threat to others
- Fingers of 5 hostages delivered to US officials
> Korean Nuclear Talks
> Reconstruction of Iraq
> Middle East Peace Process
> Iran Nuclear Issue
> 6th SCO Summit Meeting
Links
- China Development Gateway
- Foreign Ministry
- Network of East Asian Think-Tanks
- China-EU Association
- China-Africa Business Council
- China Foreign Affairs University
- University of International Relations
- Institute of World Economics & Politics
- Institute of Russian, East European & Central Asian Studies
- Institute of West Asian & African Studies
- Institute of Latin American Studies
- Institute of Asia-Pacific Studies
- Institute of Japanese Studies