Archive

Posts Tagged ‘CIP’

The US Cybersecurity Legislative Agenda

May 30, 2010 1 comment

A very comprehensive set of slides showcasing nearly all the Cybersecurity legislations in the US, I think this can be very useful for researchers.

The slides come from the Harvard Kennedy school (Belfer Center), Prepared by Melissa E. Hathaway (former acting senior director for cyberspace at the National Security Council).

US Cybersecurity Legislative agenda

The slides can be downloaded (Here)

Advertisements

The Cyber Shockwave After Math

February 18, 2010 Leave a comment

My previous post was about the Cyber War simulation called (Shockwave), who organized it and who will participate, Today lets review what the press actually said about the simulation that lasted about 4 hours.

The Shockwave Scenario:
A Smart Phone application called ( March Madness ) becomes popular and millions download it, The APP has triggered a national security crisis and brought the country’s telecommunications and electronic infrastructure to a standstill.

Comment: A Good scenario if we consider and think about facts like ( 100 Million people are now actively using the Facebook’s Mobile App) , source : Techcrunch February 2010.

Imagine a malicious Facebook update that transforms those 100 Million mobile handsets into the biggest BotNet ever created, and with more muscle power everyday like (1GHz Processors ,3G Connectivity…etc) those sets can do a lot of damage if directed properly, and even more damage if directed haphazardly.

Another fact is that most handsets has no anti-malicious software installed (Probably because its useless), so its up to each mobile market to test apps before publishing, a cycle that is promised to be as fast as possible (<24 hours), with thousands of apps submitted daily !!.

As the scenario unfolded, those infected mobile sets, crippled key networks and systems and within hours — 40 million people without power in the eastern United States; more than 60 million cellphones out of service; Wall Street closed for a week; Capitol Hill leaders en route to the White House. (Washington Post)

As a conclusion the Washington Post headline read : War game reveals U.S. lacks cyber-crisis skills

An interesting conversation took place in the exercise as it shows what some officials have in mind.

“We don’t have the authority in this nation as a government to quarantine people’s cellphones.” The White House cyber coordinator was “shocked” and asserted: “If we don’t have the authority, the attorney general ought to find it.”

Mobile Attack

Mobile Attack

More:
Washington Post
Federal Computer Week

Cyber Shock Wave – Simulated Attack Announced

February 15, 2010 Leave a comment

The Bipartisan Policy Center, will host a simulated computer attack against the USA key infrastructures next tuesday.
During the simulation , several distinguished policy makers and ex-government top officials will be given a cyber attack scenario and the guests will have to react in real time and take decisive decisions on the spot.

The goal of the simulation, called Cyber ShockWave, is to see how officials in key government positions would react to a real-time cyber- attack, and judge the impact of their decisions in controlling the attack.

The Bipartisan group website issued a list of the participants and it includes:

“Former DHS secretary Michael Chertoff, the former Director of National Intelligence John Negroponte, former White House Homeland Security Advisor Fran Townsend and former White House press secretary Joe Lockhart.”

During the simulation the participants will be asked to advise the President on the unfolding attacks and craft a response to them.

A report in The Atlantic said that ” The whole exercise itself was developed by former CIA director general Michael Hayden and several others, including former New Jersey governor Thomas Kean and Congressman Lee Hamilton, both of whom were co-chairs of the 9/11 commission. Companies and organizations that are participating in the effort include General Dynamics, Georgetown University and PayPal.”

Media Source : ComputerWorld.com