Operation 'Cyber Storm' Starts Tomorrow 157
cyberbian writes "Federal Computing Week reports that the Department of Homeland Security have moved up their rescheduled cyber security exercise, designed to test enterprise and private sector alike. The tests are expected to run from February 6-10, and are intended to gauge the state of readiness for a cyber attack on critical infrastructure. FCW also reports that the scope of the fake attacks will be global, and they are coordinating with partners in Australia, Canada and the UK."
I wonder (Score:4, Funny)
Re:I wonder (Score:5, Insightful)
Re:I wonder (Score:3, Funny)
It was a secret military project to create a defense system capable of protecting the nation.
But... It became sentient
Re:I wonder (Score:1)
Re:I wonder (Score:1, Funny)
Sooooo, what you're saying is, the computers end up taking over the world, seizing control of all our automated systems and in turn starting the third world war, AND, you're out of a job 'cos "the system" no lon
BBC: US plans to 'fight the net' revealed (Score:2, Informative)
By Adam Brookes
BBC Pentagon correspondent
A newly declassified document gives a fascinating glimpse into the US military's plans for "information operations" - from psychological operations, to attacks on hostile computer networks.
Bloggers beware.
As the world turns networked, the Pentagon is calculating the military opportunities that computer networks, wireless technologies and the modern media offer.
From influencing public opinion through new media to designing "computer
Re:I wonder (Score:3, Funny)
Re:I wonder (Score:2)
Actually, that would not surprise me. On both 9-11 and the London Bombings, the authorities were conducting a simulated attack of the exact same nature. Seriously, on 9-11 they were training for hijackings and in London it was tube bombs.
You can't make this shit up. My tinfoil hat is on and I'll be watching the news... ;-)
In all seriousness, I doubt we hear the half of all cyber attack
From TFA (Score:3, Funny)
"IT-ISAC has eight members participating in the exercise, the center's Web site states. The participants are Cisco Systems, Citadel Security Software, CA (formerly Computer Associates), Computer Sciences Corp., Intel, Microsoft, Symantec and VeriSign."
In other words, little, if any.
Re:From TFA (Score:4, Informative)
Re:From TFA (Score:2)
Any other time of year and it would be an international incident, now they can play tria
Damage (Score:5, Interesting)
They caused more damage to us with childhood tactics ( like locking out system accounts ) than doing 'real' tests. We were screwed for a week trying to undo damage, and trying to figure out how it was happening again and again.
Posting anonymously for obvious reasons.
Re:Damage (Score:4, Informative)
Re:Damage (Score:1, Insightful)
A real enemy won't care whether their tactics are considered "childish" by anyone.
They will measure their success by the number of people who say, as you just did, "we were screwed".
Re:Damage (Score:2)
It's good to test "childhood tactics". They're part of the real-world threat spectrum and you need to guard against them.
If the only attacks that interest you are the brilliant and sophisticated kind in _Silence on the Wire_, you should leapfrog over being a sysadmin and try for a job studying masint methods at the NSA.
Re:I wonder (Score:4, Interesting)
Re:I wonder (Score:5, Funny)
Re:I wonder (Score:2, Insightful)
In Neoconservative America, attack is defense !
Re:Learn before speaking...unless you just want to (Score:2)
So which one is it ? Nonsense or a valid real-world tactic ?
Well, the US does seem to be big on pre-emptive strikes nowadays, so my comment was Insightfull, and it is also ruled by neoconservatists, allowing me to put my comment into the "In Soviet Russia" form factor, earning me "Funny" as well. And, of course, since it was possi
Re:I wonder (Score:2, Redundant)
Insanity Re:Call For A Red (Score:3, Insightful)
"The Mohammed cartoons are a transparent provocation by NATO intelligence through a Danish right wing newspaper of limited circulation."
I'm sure that makes much more sense to the conspiracists than the issue as put forward by both the original publisher (ma
Re:Insanity Re:Call For A Red (Score:2)
Re:Insanity Re:Call For A Red (Score:2)
- one is a completely innocent depiction in typical cartoon style (think Newsweek cartoons or any other major newspaper political comment cartoon) of a line of smoking (as from having blown up) suicide bombers in front of the gates of heaven. A robed muslim (not necessarily Mohammed) is blocking their path saying something like "sorry we're out of virgins". Not exactly highbrow but nothing especially bad either compared to many ordinary
good job (Score:5, Interesting)
I hope no real attacks take place during this time though...
Re:good job (Score:2, Insightful)
I also wonder how much this issue has influenced the court's handling of the "Crackberry" patent infringement case (not trying to start flame war-that time of disrupted communications when many people/agencies were using their Blackberries because nothing else was working-that really scared a l
Re:good job (Score:5, Funny)
Clock out of work when the attack happens and go to the corner pub?
Findings from their "Wargames" (Score:2, Funny)
A good idea.... (Score:4, Funny)
Re: A good idea.... (Score:3, Funny)
Re: A good idea.... (Score:2)
Re:A good idea.... (Score:2)
Re:A good idea.... (Score:5, Funny)
How to parcipate... (Score:5, Funny)
Then go home for a couple days!
WooHoo!
Re:How to parcipate... (Score:2)
Re:How to parcipate... (Score:2)
So.... (Score:5, Interesting)
Re:So.... (Score:1, Insightful)
Thank Ford! (Score:5, Funny)
Re:Thank Ford! (Score:1)
Post-Superbowl? (Score:3, Interesting)
Re:Post-Superbowl? (Score:3, Funny)
Re:Post-Superbowl? (Score:5, Funny)
More worrisome threats (Score:5, Insightful)
Re:More worrisome threats (Score:5, Interesting)
All admins do not necessarily agree with this. Most of messes I have to clean up are from malware, fraud, "traditional" crime (and attempts at such) that have taken on a 'net communications component, and the usual tsunami of noise and bot blather that lands on every public-facing port I have open.
Tiered internet? That's a misnomer, I think. Big internet users pay for the bandwidth they (or their visitors) use. More traffic means higher costs. I don't care if some Comcast user has already paid for "his" bandwidth... serving up a streaming video to him isn't only using his bandwidth. I don't know where people get that idea. But regardless, if SBC or Verizon or any other carrier wants to screw with per-site or per-visitor metering or biasing, they're welcome to. Other ISPs will just set a price that's easier to predict and work with, and win the business away from the people trying to make it more complicated. But how much time do I have to give "upper management" or "government meddling" vs. attempted attacks, fraud killing, malware, etc? It's not even close. The bad guys are much more of an issue.
Re:More worrisome threats (Score:3, Funny)
I think you are underestimating upper management.
This sounds extremely logical (Score:4, Interesting)
Homeland security is going to turn around and tell everyone that we're NOT ready for a "terrorist cyber attack"? No, it makes much more political sense to say "see? Our networks can survive millions of nerf-ball hits; more funding please."
Re:This sounds extremely logical (Score:3, Interesting)
"Cool! Well, right then. Turns you aren't actually needed after all so we're shutting your dept. down."
You don't understand how the game is played. The DHS depends on terrorism for their funding, but; they are the terrorists.
KFG
Re:This sounds extremely logical (Score:2)
Re:This sounds extremely logical (Score:1)
Re:This sounds extremely logical (Score:2)
This test isn't about finding security weakenesses, we already know those exist. This test is about responding to attacks against the weakness - a somewhat different matter.
Re:This sounds extremely logical (Score:2, Funny)
It only happens once every couple of years?
Wait a minute (Score:2, Insightful)
Re:Wait a minute (Score:5, Insightful)
DDO Stress test (Score:2, Interesting)
Time to Go Phishing (Score:5, Funny)
I can see it now...
FROM: cyberstorm@dohs.gov
TO: unlucky.recipient@yourcompany.com
SUBJECT: Participation in Cyber Storm exercise
Your company has been identified by the Department of Homeland Security as potentially vulnerable to cyber attack. During the week of February 6th - February 10th, the DoHS will be testing cyber infrastructure as part of our Cyber Storm security exercise. In order to participate, you will need to supply us with [insert favorite hacking data here]...
Re:Time to Go Phishing (Score:1, Funny)
That was a game... (Score:2)
Cyber Storm? (Score:4, Funny)
And so it begins. (Score:2, Funny)
nice war game (Score:2)
Greenspan (Score:2)
What, you don't believe me? See this historical proof [rdwarf.com] and prove it to yourself. Alan Greenspan is a l33t h4xor, that fact is undeniable!
It would be a good idea if... (Score:1, Interesting)
Suggestions anyone? (Score:2, Funny)
look out! (Score:1, Troll)
Re:look out! (Score:2)
Regarding this nebulous "Cyber Storm" thing, doesn't the Microsoft worm/virus of the week already give people enough experience? Odds are either a similar kind of attack will be done on the net, or they might just go and cut the fiber.
Personally, all of my international business that I do where I care about the integrity and reliability of the communication is done over a proprietary encryp
enterprise and private sector alike (Score:1, Redundant)
Wierd. (Score:3, Interesting)
I didn't know that computers only speak English.
Hmmm... learn sumthin new evry day.
Re:Wierd. (Score:2)
Well, yeah: "HELO", "GET", "POST", "if", "then", "mov", "add" - those are all English... :)
recovery during pen testing (Score:3, Interesting)
Goverments can't hack it (Score:5, Insightful)
I doubt the Department of Homeland Security has anything like a globally distributed botnet, or permission to run DDoS like a real attacker might. The virus attack [com.com] on the Russian stock market is not something goverments can replicate.
The only winners will be the companies who sell the extra bandwidth!
Re:Governments can't hack it (Score:2)
There's no perfect system. Initiatives like this are simply aimed at making existing systems better. It's quite possible that the initiative itself could be better as well. However, rather than waiting for the perfect initiative, it's better to go with what one has now and repeat (better) later.
Digg and Slashdot (Score:4, Funny)
blog outtage (Score:2, Interesting)
This crap is weird. I fully expect them to pull off another false-flag terrorist attack and use that as an excuse to do real damage to the freedom parts of our society
What about the information gathered??? (Score:5, Insightful)
Is this just another end run around warrantless search and seizures of data?
What kind of oversite is there on this process and how can we be sure the information is not used, stored, or otherwise desiminated among the various US spook agencies and their foreign lackeys.
And how much do you want to bet Google will be a very well excercised target since they have been fighting the governments abuse of power already.
Re:What about the information gathered??? (Score:1)
Re:What about the information gathered??? (Score:2)
Your tinfoil hat is on a bit too tight (Score:3, Insightful)
Suppose their attacks allow them to get into various machines and networks, what will they do with the data that is accesible in those machines?
Well, according to TFA, "IT-ISAC has eight members participating in the exercise, the center's Web site states. The participants are Cisco Systems, Citadel Security Software, CA (formerly Computer Associates), Computer Sciences Corp., Intel, Microsoft, Symantec and VeriSign." So those companies seem to have signed up and are ready to have their networks accessed a
Real Test (Score:2)
Re:Real Test (Score:2)
Thanks for the news ... (Score:2)
In the words of Fark: (Score:2)
Disruptions? (Score:1)
Shouldn't they wait for the next Leap Day? (Score:5, Funny)
Original Message - 1996
DO NOT CONNECT TO THE INTERNET FROM 12:01 AM GMT ON FEB. 29 TO 12:01 AM GMT, MARCH 1 !!
*** *** Attention ***
It's that time again!
As many of you know, each leap year the Internet must be shut down for 24 hours in order to allow us to clean it. The cleaning process, which
eliminates dead email and inactive ftp, www and gopher sites, allows for a better-working and faster Internet.
This year, the cleaning process will take place from 12:01 a.m. GMT on
Feb. 29 until 12:01 a.m. GMT on March 1. During that 24-hour period, five powerful Internet-crawling robots situated around the world will search the Internet and delete any data that they find.
In order to protect your valuable data from deletion we ask that you do the following:
1. Disconnect all terminals and local area networks from their Internet
connections.
2. Shut down all Internet servers, or disconnect them from the Internet.
3. Disconnect all disks and hardrives from any connections to the Internet.
4. Refrain from connecting any computer to the Internet in any way.
We understand the inconvenience that this may cause some Internet
users, and we apologize. However, we are certain that any
inconveniences will be more than made up for by the increased speed and efficiency of the Internet, once it has been cleared of electronic flotsam and jetsam. We thank you for your cooperation.
Kim Dereksen
Interconnected Network Maintenance staff
Main branch, Massachusetts Institute of Technology
Sysops and others: Since the last Internet cleaning, the number of
Internet users has grown dramatically. Please assist us in alerting
the public of the upcoming Internet cleaning by posting this message
where your users will be able to read it. Please pass this message on to
other sysops and Internet users as well. Thank you.
Hurricane CyberPam (Score:3, Insightful)
The decision-makers will decide (as they have so far about everything involving actual defensive measures involving the homeland that they would prefer to spend the money in some other way. They'll appoint yet another cyber defense "czar" as evidence of action, he will start with the clear understanding that the one thing he can't do is get the funding to implement the measures recommended in the report.
And when the actual attack happens and is devastating, they'll say nobody could have anticipated it.
See also Hurricane Pam [fema.gov]
How about a coordinated response (Score:1)
"Cyber Storm" (Score:3, Insightful)
should we make it fun for them? (Score:2)
Wait a minute (Score:2)
The Government is going to attack company websites? What if they knock one off line can the company sue them for damages. Ok the company should be in a position that it can survive the attack but last I heard it wasn't illegal to run servers that can be compromised. This sounds like a really bad idea even for the Government.
Disturbingly Odd Timing (Score:4, Interesting)
The type of test I participated in wasn't invalidated by this lack of surprise because it was deliberately designed to expose procedural flaws and systematic gaps that fell between different areas of responsibility. The lack of surprise was a nuscience in the design of the test, but it was planned for and accounted from the very beginning. Having an announced testing window was a necessary security feature and not a flaw in the test.
These tests either were performed within the announced window of time or they were cancelled outright. Delay was out of the question. Delay was insecure. Cancelled tests were a nuscience for the test teams because it meant almost a month delay before they'd be allowed to perform the test, but the insecurity introduced by saying "Oh wait, the tests are back on schedule" or "Oh we'll just delay the test window a few days" was unnaceptable to security.
I've heard a time (though I didn't participate) in a test where a piece of equipment failed the day before the two day test window. Without this piece of equipment data measurements would be fuzzed by an order of magnitude on one part of the test. A replacement was ordered but on the day the tests were to begin it still required a day of prep time. To you and me our first inclination might be to simply delay the test a day. That was not acceptable to the security team. The test went on with the bad piece of equipment and the test results were compromised but in only that part of the test. Another test window was scheduled six weeks in the future and the test team's budget was increased to have redundant pieces of certain test equipment on hand and ready as part of the design of new testing procedures.
What seems almost absurd was the idea of moving forward the timeframe of an announced security test. There were times when test teams were very ready ahead of time, but they used the time to double and triple check their preparation, take documentation for next test, meet and discuss the game plan, and use the extra time productively while waiting for the arrival of the upcoming announced testing window. Why not just go ahead with the tests? Because once again, moving the announced test window was a security risk. And performing the test outside a test window was considered a break-in by security, and unnecessary for properly designed tests by the test teams.
I know banking security differs from computer security, but it still seems rather insecure and dangerous to move an announced test window period at all. What's worse is that it seems unnecessary, unusual, and odd to move the test period forward. If the test requires surprise, then it's either a poorly designed test or it was compromised by having an announced test window to begin with. If we're dealing with computer security on an international scope, then it would seem incredibly helpful to take the extra test time and double check the game plan. Tests inside a single banking company with far fewer issues of timing, language, and politics welcomed an extra week to plan and prepare before most tests of even moderate complexity. It seems arrogant, ignorant, or careless to say "Oh, we don't need this extra time before the tests. We'll deliberately tamper with our security and throw away this extra time we could use to prepare and coordinate this very complex international test."
So what's really going on here?
So we're finally striking back... (Score:2)
Major Internet Resources (Score:2)
In preparation for this event... (Score:2)
9/11 all over again? (Score:2)
Re:And while they plan all these... (Score:1)
Don't forget the largest undefended border in the world. You forgot to mention it. Also, what exactly are our politicians supposed to learn? That it's relatively easy to make a IED?
"My impression is that perhaps our border with Canada has, to some degree, been of a bit greater concern than that with Mexico," John Negroponte, director of national intelligence, told a U.S. Senate hearing Thursday on global terror threats.
Can the gov't only do one thing at a time? (Score:2)
And while they plan all these, our southern border with Mexico remains wide open to even more dangerous folks from all over the world.
So you're saying that because there is one hole in our defenses, we should not attempt to plug other holes? Are you saying it's a zero-sum game, and that while the DHS is attempting to thwart cyber-attacks, suddenly all of their other efforts have come to a standstill?
When wil these politicians learn?
You mean, when will government cyber-security experts learn. It se
Re:Can the gov't only do one thing at a time? (Score:2)
There won't be a serious cyberattack against America for the foreseeable future (outside of normal business competition, that is), it would ruin the value of the stocks owned by just about every organization and influential individual on the planet.
By extension you're saying that no party would want to do serious damage to the American economy, because doing so would damage the value of stocks. It seems obvious that bin Laden wants to do serious damage to the American economy, so I'm not sure I buy the
He may be incompetent, but... (Score:2)
Bin Laden has stated that econo
So it's really about restructuring power? (Score:2)
It is uncertain what he intends to do with those groups, but one thing is clear: for the first time in over a thousand years, it is possible for the basic power structures in the middle east to change radically. In the past, the roles always stayed the same, even though the persons occupying those roles, and the geographic areas they controlled changed.
Your thesis seems to be that he may have some larger aim, but in the medium term his goal is to establish a new power structure in the Middle East. That
Re:And while they plan all these... (Score:1)
Re:And while they plan all these... (Score:2)
Wigs for peace!