Feeds

NATO proclaimed winner of Locked Shield online wargame

Games without frontiers, war without tears

Securing Web Applications Made Simple and Scalable

NATO has – not surprisingly – been named the winner of the Locked Shield online wargames held last week at the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn, Estonia.

The 48-hour exercise, which has been held annually for the last five years, simulates a coordinated attack by "Red" forces (a continuing affectation from the days when the Red Flag of the Soviets still flew) on the electronic infrastructure of ten Blue teams, using and and all online means at their disposal.

NATO was up against national teams from Estonia, Finland, Lithuania, Germany, Holland, Italy, Poland, Spain, and Slovakia, so it's hardly surprising that those worthies lost out to the combined might of one of the world's most powerful military organizations. The hosts Estonia placed second, with their scratch team of government and commercial volunteers.

"It is good to see that the Blue Teams have really prepared well for this year's exercise and the opposing team had to work a lot harder to keep the difficulty level high for the defenders," said Jaan Priisalu, director general of the wargame's organizers, the Estonian Information System's Authority (EISA).

"This is a highly positive sign because it shows that the teams take the exercise very seriously and also that they are learning from the best practices and lessons from previous years."

Estonia has possibly the largest practical experience of online warfare in Europe. It's one of the most electronically advanced (and thus dependent) government systems in the region, in part as a reaction to getting temporarily pwned in 2007. While the EISA has no official input into NATO online battle plans, the lessons from the exercise are bound to be noted.

"The exercise has come a long way since the first event in 2008 and the fact that the teams are improving shows that the exercises do what they were developed for, namely train the IT specialists to work together and enhance their skills," noted Colonel Artur Suzik, director of the NATO Cooperative Cyber Defence Centre of Excellence.

Stay alert, chaps

While the results of the wargames are all well and good, El Reg hopes this won't induce a sense of complacency. Wargames are just that – games – and reality is going to be much more unpleasant. As the 19th century Prussian military strategist Helmuth von Moltke the Elder noted, "No human acumen is able to see beyond the first battle."

Barely a decade ago we saw this demonstrated with the Millennial Challenge in 2002 – a simulated land, sea, air and electronic online wargame against a fictional Middle Eastern country (somewhat like Iraq). It was intended to be the first test of the switched-on, network-centric warfare beloved by former US Secretary of Defense Donald Rumsfeld, and in practice it failed miserably.

The Red team, controlled by Marine Lieutenant General Paul Van Riper, refused to play ball – using motorcycle couriers and pre-arranged signals at evening prayers to trigger attacks on the Blue team forces rather than easily-tapped radio or wired signals. By the second day, Van Riper had sunk one aircraft carrier, ten cruisers, and five of six amphibious ships of the attacking force, and the $250m exercise was shut down and reset.

Wargames of the kind carried out last week use only threats that we know about. We'd be far more impressed if the military had sought a scrap with white and grey-hats and won, but it's likely the results would look rather less pleasing to the military eye. ®

Mobile application security vulnerability report

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.