Feeds

US, UK and friends have cyber-war party

I'll hose your network, if you hose mine

Intelligent flash storage arrays

Business and government leaders from the US, UK and three other countries will spend much of this week simulating and defending against a large-scale cyber attack in an exercise designed to strengthen coordinated responses to what many perceive as a growing threat.

Participants of Cyber Storm II, which also include about 40 private-sector companies, will enact a scenario in which "persistent, fictitious adversaries" launch an extended attack using websites, email, phones, faxes and other communications systems. Other countries involved are Australia, New Zealand and Canada.

Cyber Storm II comes two weeks after the Pentagon released an assessment of China's military might, warning the People's Liberation Army was intent on expanding its capabilities for cyber warfare. It also comes amid intelligence reports that utilities in several countries have sustained cyber attacks that caused power outages.

This week's exercises are a follow up to Cyber Storm I, which was completed two years ago. They are mandated by an act of Congress that requires the public and private sectors to strengthen cyber preparedness.

Companies including Cisco, Juniper Networks, Dow Chemical, Air Products & Chemical and Wachovia are participating. Nine US states and at least 18 federal agencies are also involved. They represent the chemical, information technology, communications and transportation industries, which are considered ctritical parts of the infrastructure. The US Department of Homeland Security is hosting the event - no doubt with danishes and plenty of Starbucks coffee.

The exercises are designed to sharpen and assess participants' ability to respond to a multi-day, coordinated attack and better understand the "cascading effects" such attacks can have.

Results of Cyber Storm I pointed the the need for better coordination between various agencies and for a common framework for communicating among different parties.

While it's not necessarily a bad idea to simulate imagined threats, there's no indication that participants will delve into actual practices that are known to put national security at risk. For example, last week came word that a private website operator regularly received official Air Force communications containing sensitive information because his email address was similar to those of military leaders. Additionally, a Pentagon official has now confirmed that an attack last year on a network belonging to the Department of Defense involved a Windows vulnerability and allowed the intruders to steal "an amazing amount" of data.

As these episodes make clear, sometimes we can be our own worst enemy, no simulation necessary. ®

Security for virtualized datacentres

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.