July 7, 2015

Pentagon, FBI And NSA Train US And British Officials For Cyber War

By Penny Swift

Officials Train For Cyber War Banking and energy officials joined members of the Pentagon, National Security Agency (NSA) and the Department of Homeland Security for a three-week cyber war game in Suffolk, Virginia last month. The exercise was designed to train US and British officials and military personnel, as well as several key-companies, for inevitable large-scale cyber […]

Officials Train For Cyber War

Banking and energy officials joined members of the Pentagon, National Security Agency (NSA) and the Department of Homeland Security for a three-week cyber war game in Suffolk, Virginia last month. The exercise was designed to train US and British officials and military personnel, as well as several key-companies, for inevitable large-scale cyber attacks on multiple continents, and ensure “operational readiness.”

According to the US Department of Defense (DoD), the training exercise was co-led by the Federal Bureau of Investigation (FBI) and involved more than 1,000 participants from more than 100 government, industry and academic organizations. Known as Cyber Guard, it was the fourth annual training event of its kind and gave participants the opportunity to rehearse “a whole-of-nation response to destructive cyber attacks against US critical infrastructure.” Previous exercises focused on “whole-of-government” US scenario rather than taking an international approach.

cyber-security-class

The cyber attack training exercise was held from June 8 to 26 and conducted in the Suffolk state-of-the-art facility that was established for a wide range of military exercises and tests.

According to the director of exercises and training at US Cyber Command, Rear Admiral Kevin E. Lunday, the outcome they were looking for was “operational readiness.” By putting participants under pressure in a simulated cyber attack environment, it was hoped that they would learn how to respond when faced with a real-life scenario. It wasn’t a question of whether the kind of cyber attack they had simulated might occur, he said, “but when it will occur.”

In recent months hackers have successfully accessed computer networks at the Pentagon and White House, and late last year hackers breached security and got into Sony Pictures, as well as JPMorgan Chase & Co, one of the world’s largest financial institutions. As cyber attacks become increasingly sophisticated, there is a fear that disruptions could be much more intense and could theoretically lead to a shutdown of the electrical grid, stoppage of water supply, or even interference with the banking system. The lengthy digital Cyber Guard exercise was described by The Wall Street Journal this week as an intense preparation for “the next frontier in warfare: cyberattacks.

The Cyber Guard 15 War Game

The game began with a major earthquake in California that was followed by a number of coordinated and well-executed cyber attacks that included the many disruptions so many fear. Gas and oil pipelines were disrupted; a large commercial port in the UK was affected; and Pentagon computer networks were hacked – which of course has already happened. The ordinary man (and woman) in the street was also affected, with long queues for food at supermarkets and other stores, as well as a freeze on cash at banks.

Participants played in teams, with the Opposing Force leading each attack. Attacks varied from those carried out by relatively unsophisticated hackers to attacks by other countries using very advanced cyber weapons. Organizers watched the games from a “white cell” (a separate room) and assessed the successes and weaknesses of each team. At the end of the three-week session, teams were expected to counterattack the “enemy” using what was termed defensive cyber “response actions.” It is understood that these counterattacks were carried out on order, in keeping with the fact that any cyber counterattack would be controlled by the White House and defense secretary.

Cyber Guard is an evolving exercise, continually expanding to meet the demands of the Department of Defense and the nation,” the DoD fact sheet states.

By Penny Swift

Penny Swift

Penny has been a professional writer since 1984 - Penny has written more than 30 general trade books and eight college books. She has also written countless newspaper and magazine articles for: Skills on Site, Popular Mechanics (SA) and SA Conference, Exhibitions and Events Guide.

Penny has a BA in Social Sciences and currently resides in Cape Town, South Africa.

5 Azure Cost Management Strategies

What Is Azure Cost Management? Azure cost management refers to the practices and processes that [...]
Read more
Metasploit-Penetration-Testing-Software-Pen-Testing-Security

Leading Cloud Vulnerability Scanners

Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn’t help with [...]
Read more

AI at the Gate: Navigating the Future of Cybersecurity with SonicWall’s Bobby Cornwell

Navigating the Future of Cybersecurity In the face of the digital age’s advancements, AI’s role [...]
Read more
Katrina Thompson

Why Zombie APIs are Such an Important Vulnerability

Zombie APIs APIs have a lifecycle, the same as anything else. They are born, they [...]
Read more
Steve Prentice

Episode 19: Why AWS Needs to Become Opinionated about FinOps

On today’s episode of the CloudTweaks podcast, Steve Prentice chats with Rahul Subramaniam, CEO at CloudFix [...]
Read more

Exploring SaaS Directories: The Path to Optimal Software Selection

Exploring the Landscape of SaaS Directories SaaS directories are vital in today’s digital age, serving [...]
Read more

SPONSORS

Interviews and Thought Leadership

Jeremy Smillie

Securing the Future: Insights from DevSecOps Expert, Jeremy Smillie

Welcome to another insightful discussion on CloudTweaks. Today, we have the privilege of delving into the dynamic intersection of DevOps, Security, and Tokenization with a seasoned expert in the field, [...]
Read more
Andy Hilliard

Accelerance CEO Unveils the Future: AI’s Role in Software Development

In this edition of CloudTweaks, we feature an insightful discussion with Andy Hilliard, CEO of Accelerance, a pioneering force in integrating artificial intelligence (AI) into the software development industry. Andy [...]
Read more

Gartner Predicts Solid Growth for Information Security, Reaching $287 Billion by 2027

AI continues to become more weaponized, with nation-state attackers and cybercrime gangs experimenting with LLMs and gen AI-based attack tradecraft. [...]
Read more

How AI Machine Learning Is Enhancing Customer Experience Across Industries

Elevating Customer Satisfaction: AI’s Impact in Every Sector Recent years have witnessed an incredible transformational leap with regard to Artificial [...]
Read more

Navigating Tomorrow: AI and Big Data as Catalysts for Smarter Governance

The Future of Governance In a world increasingly shaped by big data and artificial intelligence (AI), it’s curious why these [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.