US Not Ready for Cyber Attack – No kidding

Dec. 30, 2008
December 19, Reuters – (National) U.S. not ready for cyber attack. The United States is unprepared for a major hostile attack against vital computer networks, government and industry officials said on December 18 after participating in a two-day “cyberwar” simulation. The game involved 230 representatives of government defense and security agencies, private companies, and civil groups. It revealed flaws in leadership, planning, communications, and other issues, participants said.
December 19, Reuters – (National) U.S. not ready for cyber attack. The United States is unprepared for a major hostile attack against vital computer networks, government and industry officials said on December 18 after participating in a two-day “cyberwar” simulation. The game involved 230 representatives of government defense and security agencies, private companies, and civil groups. It revealed flaws in leadership, planning, communications, and other issues, participants said. “There isn’t a response or a game plan,” said senior vice president of the Booz Allen Hamilton consulting service, which ran the simulation. “There isn’t really anybody in charge,” he told reporters afterward. Officials cited attacks by Russia sympathizers on Estonia and Georgia as examples of modern cyberwarfare, and said U.S. businesses and government offices have faced intrusions and attacks. Source: http://uk.reuters.com/article/technologyNewsMolt/idUKTRE4BI00520081219?sp=true I would like to point out an exercise we held in 2006 at the final KEMA Control System Cyber Security Conference. There were approximately 120 attendees from various industries and government organizations from all over the world representing a number of different critical industrial infrastructures. These were the cognizant technical people that had a vested interest in cyber security of critical infrastructures. They were broken up into 6 groups with each group having experts from IT security, control systems, government, IT and control system vendors, etc as participants. They were physically separated then given the same information concerning a possible cyber attack on their critical infrastructures. What was so interesting was the independent, yet common response from each group to each set of succeeding information. Basically, there was no consensus about what to do, who to contact, when to declare an emergency, when to isolate critical control system networks, etc.  As additional technical information came in about the actual event, there was still no consensus about what to do until critical systems were actually being affected.  Despite all of the tabletop exercises having been run to date, I believe this is typical of what would actually happen in a wide-spread cyber attack on the critical industrial infrastructures. Joe Weiss Beginning in January, I will be providing a monthly subscription newsletter. Stay tuned for more details.

Sponsored Recommendations

2024 Industry Trends | Oil & Gas

We sit down with our Industry Marketing Manager, Mark Thomas to find out what is trending in Oil & Gas in 2024. Not only that, but we discuss how Endress+Hau...

Level Measurement in Water and Waste Water Lift Stations

Condensation, build up, obstructions and silt can cause difficulties in making reliable level measurements in lift station wet wells. New trends in low cost radar units solve ...

Temperature Transmitters | The Perfect Fit for Your Measuring Point

Our video introduces you to the three most important selection criteria to help you choose the right temperature transmitter for your application. We also ta...

2024 Industry Trends | Gas & LNG

We sit down with our Industry Marketing Manager, Cesar Martinez, to find out what is trending in Gas & LNG in 2024. Not only that, but we discuss how Endress...