Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Government United States Your Rights Online

US Unable To Win a Cyber War 327

An anonymous reader writes "The inability to deflect even a simulated cyber attack or mitigate its effects shown in an exercise that took place some six days ago at Washington's Mandarin Oriental Hotel doesn't bode well for the US. Mike McConnell, the former Director of National Intelligence, said to the US Senate Commerce, Science, and Transportation Committee yesterday that if the US got involved in a cyber war at this moment, they would surely lose. 'We're the most vulnerable. We're the most connected. We have the most to lose,' he stated. Three years ago, McConnell referred to cybersecurity as the 'soft underbelly of this country' and it's clear that he thinks things haven't changed much since then."
This discussion has been archived. No new comments can be posted.

US Unable To Win a Cyber War

Comments Filter:
  • by LostCluster ( 625375 ) * on Wednesday February 24, 2010 @12:31PM (#31260558)

    If you watched the broadcast of this exercise on CNN, you heard many people arguing for things that the government just can't do such as ordering telcos to disable all smartphones, suspending rights, and even nationalizing the power companies.

    They spent so much time being told by the simulated AG what they couldn't do, they didn't have time left to discuss what they could do.

  • Bunch of BS (Score:4, Informative)

    by elrous0 ( 869638 ) * on Wednesday February 24, 2010 @12:44PM (#31260774)
    That "excercise" was conducted by a bunch of former Bush officials and other neocons. It wasn't a test of our cyber security, it was a propaganda tool designed to embarass the Obama administration and urge a further erosion of our civil liberties.
  • by pv2b ( 231846 ) on Wednesday February 24, 2010 @12:53PM (#31260924)

    Except it probably won't be as simple as lots of evil malicious traffic originating from... say... the hypothetical Peoples Republic of Anich.

    And then you can just block all of Anich and you won't be under attack any more.

    The traffic of such a cyberattack could conceivably originate from all over the world, including from your own country - originating from compromised personal computers with fast broadband connections. Or even from the very modems or Internet sharing devices that connect their homes to the Internet.

    All you'd have to do, from that point on, is to have some way to send command and control traffic to the botnet inside the borders of the country you're trying to attack. And even that traffic could conceivably be hosted by some country neutral in the conflict.

  • by LostCluster ( 625375 ) * on Wednesday February 24, 2010 @01:31PM (#31261462)

    In this simulations, they weren't. The public cell phone network had a widespread trojan, which went on to attack the public Internet. With phones and data down, they weren't able to respond to simple bomb attacks on a few power locations, and the power grid collapsed.

    The threat to the power grid wasn't that that it was cyber attacked, but that a conventional attack was much more powerful when there was no way to direct the repair people. With no way to direct truck drivers or send orders, there was no way to get gas to critical things like hospital and police to run generators.

    The team lost the wargame, and was punished by having to be interviewed by Wolf Blitzer.

  • by HungryHobo ( 1314109 ) on Wednesday February 24, 2010 @01:43PM (#31261682)

    read:
    http://webtorque.org/wp-content/uploads/malware_biz.pdf [webtorque.org]

    The organised malware business is already leagues ahead of anything script kiddies use.
    it's embraced outsourcing.
    The people writing viruses these days are professionals.
    They're not doing it for the lulz like when we were kids, it's cold hard business.
    They teenagers who used to write viruses which turned your mouse into a penis have grown up and now they're not going to do anything unless there's cash in it for them.
    The rootkits that are out there are already more advanced than the rootkit detectors and even the best AV programs have perhaps a 20% hit rate. (not miss rate)

    They already have countermeasures ready for security measures that we haven't even deployed yet

  • by Fnord666 ( 889225 ) on Wednesday February 24, 2010 @01:48PM (#31261754) Journal

    All of us that have been gainfully employed for being able to actually work in IT would become modern day partisans in any such event. It would be a rare opportunity to do our worst to other people's systems with the full knowledge of what has unintentionally brought us pain for years. That said, unlike common partisans we do think for ourselves. Many of us would need to be convinced that we were indeed on the side of what we consider good before we took an offensive approach.

    Have you heard of Infragard [infragard.net]?

  • by Dalambertian ( 963810 ) on Wednesday February 24, 2010 @02:39PM (#31262532)
    Agreed. The biggest threat to national security is probably windows XP. Here's an idea: let's start teaching high school students something other than Word and Excel, hmm?
  • An honest loss? (Score:3, Informative)

    by Jeremy Erwin ( 2054 ) on Wednesday February 24, 2010 @03:14PM (#31262968) Journal

    The military has conducted dishonest wargames [armytimes.com] before, gaming the rules to prevent the Red team from achieving a politically distasteful victory. Perhaps the parties involved can learn from their loss instead of pretending it didn't happen. Of course, if the Red Team was supposed to win, in order to bolster budget requests and score political points, we're back to meaningless pantomimes.

  • by captainClassLoader ( 240591 ) on Wednesday February 24, 2010 @03:28PM (#31263190) Journal

    dont buy this cyberwar bullshit. they are just using it as an excuse to justify internet control schemes they want to bring upon you americans. remember how terrorism was used to bring liberties-infringing 'security' measures in all aspects of life. its the same shit, repeating itself.

    do NOT buy it.

    From an article about the "mock cyber attack": [net-security.org]

    "...A bevy of former top US officials were given various roles to play:

    • John Negroponte, the former Director of National Intelligence, as the Secretary of State
    • Michael Chertoff, the ex DHS Secretary, as the National Security Adviser
    • Fran Townsend, former White House Homeland Security Advisor, as the Secretary of DHS
    • John McLaughlin, ex CIA deputy director, as the Director of National Intelligence
    • Jamie Gorelick, former deputy attorney general, as attorney general
    • Charles Wald, retired Air Force general, as the Secretary of Defense
    • Stephen Friedman, former director of the National Economic Council, as the Treasury Secretary.

    The entire scenario was thought up by Michael Hayden, the former CIA Director, and the faux attack began with malware masquerading as a free March Madness application for smartphones...."

    Not only the same shit, but the same shit doled out by the same people.

"Everyone's head is a cheap movie show." -- Jeff G. Bone

Working...