Feeds

Cyberterror sim scares pants off of Wired smarty

Electronic Pearl Harbor's enduring echo...

Remote control for virtualized desktops

"Envision all of these things happening simultaneously -electricity going out in several major cities; telephones failing in some regions; 911 service being down in several metropolitan areas. If all of that were to happen simultaneously, it could create a great deal of disruption, hurt the economy..."

But back at his Slate essay, Suellentrop writes that he was invited to take part in a computerized cyberterror game in which cyberterrorists attack a town. It was pimped, or I should say - designed, by Dartmouth's Institute for Security Technology Studies.

Now, with a name like that, you might think it's an academic operation which broadly addresses national security problems and technology.

But if you go out to its website, it's just like the dreary old Nineties collections of faculty members and miscellaneous experts, in which virtually anyone will do who is ready to keep working the cyberterror angle with courses, lectures and monographs that drill into your head the menace of cyberterror.

With nothing new here, it would be expected that any simulation the institute would put together would be one designed to show its participants how deadly cyberterror is, no wiggle-room allowed.

In any case, what Suellentrop doesn't seem to realize, at least he gives no inkling in his writing, is that all such simulations, when run for journalists or officials, are rigged so the participants can't win.

Such things are role-playing games, and if you take part in one, your role is to be the patsy, one of the designated players allowed to go "Oh my!" as the simulation's world comes crashing down around you.

Dick Destiny won't go into it, but it hasn't seen one yet where the object wasn't to simply to create an escalating disaster that flummoxed players, no matter what they did. They never take into account the natural resilience and expertise which may exist within the citizenry.

By the standards of old-timey electronic Pearl Harbor/cyberterror scenarios, Suellentrop's simulation was unimaginative. Hackers mess with the 9/11 system, which goes back to the Nineties and the most famous fed cyberterror simulation, Eligible Receiver.

Cyberterrorists then deface a government web page! Wow! No one thinks to say to the refs, "So what, who's waiting with bated breath to read it?" Or, "If you a tree falls in cyberspace and no one is around to hear it, does it make a sound?"

Electronic highway signs are made to display a message that indicates a bioterror attack is underway. By experience, no such highway signs exist in Pasadena. Some can be found on the multiple highways surrounding southern California, but I'm far from sure such a message would have much impact on the tremendous volume of motorists rushing by.

More buttons were pushed and a hospital was worked over. Always, people die.

"I'm talking about people shutting down a city's electricity... shutting down 911 systems, shutting down telephone networks and transportation systems," said Richard Clarke to the New York Times in 1999. "You black out a city, people die. Black out lots of cities, lots of people die."

Quaint.

Read the adventures of the smarty-pants - at the famous tech comic book, Wired. ®

This article was originally published at Dick Destiny.

George Smith is a Senior Fellow at GlobalSecurity.org, a defense affairs think tank and public information group. At Dick Destiny, he blogs his way through chemical, biological and nuclear terror hysteria, often by way of the contents of neighborhood hardware stores.

Intelligent flash storage arrays

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.