Pentagon, FBI And NSA Train US And British Officials For Cyber War

Officials Train For Cyber War

Banking and energy officials joined members of the Pentagon, National Security Agency (NSA) and the Department of Homeland Security for a three-week cyber war game in Suffolk, Virginia last month. The exercise was designed to train US and British officials and military personnel, as well as several key-companies, for inevitable large-scale cyber attacks on multiple continents, and ensure “operational readiness.”

According to the US Department of Defense (DoD), the training exercise was co-led by the Federal Bureau of Investigation (FBI) and involved more than 1,000 participants from more than 100 government, industry and academic organizations. Known as Cyber Guard, it was the fourth annual training event of its kind and gave participants the opportunity to rehearse “a whole-of-nation response to destructive cyber attacks against US critical infrastructure.” Previous exercises focused on “whole-of-government” US scenario rather than taking an international approach.

cyber-security-class

The cyber attack training exercise was held from June 8 to 26 and conducted in the Suffolk state-of-the-art facility that was established for a wide range of military exercises and tests.

According to the director of exercises and training at US Cyber Command, Rear Admiral Kevin E. Lunday, the outcome they were looking for was “operational readiness.” By putting participants under pressure in a simulated cyber attack environment, it was hoped that they would learn how to respond when faced with a real-life scenario. It wasn’t a question of whether the kind of cyber attack they had simulated might occur, he said, “but when it will occur.”

In recent months hackers have successfully accessed computer networks at the Pentagon and White House, and late last year hackers breached security and got into Sony Pictures, as well as JPMorgan Chase & Co, one of the world’s largest financial institutions. As cyber attacks become increasingly sophisticated, there is a fear that disruptions could be much more intense and could theoretically lead to a shutdown of the electrical grid, stoppage of water supply, or even interference with the banking system. The lengthy digital Cyber Guard exercise was described by The Wall Street Journal this week as an intense preparation for “the next frontier in warfare: cyberattacks.

The Cyber Guard 15 War Game

The game began with a major earthquake in California that was followed by a number of coordinated and well-executed cyber attacks that included the many disruptions so many fear. Gas and oil pipelines were disrupted; a large commercial port in the UK was affected; and Pentagon computer networks were hacked – which of course has already happened. The ordinary man (and woman) in the street was also affected, with long queues for food at supermarkets and other stores, as well as a freeze on cash at banks.

Participants played in teams, with the Opposing Force leading each attack. Attacks varied from those carried out by relatively unsophisticated hackers to attacks by other countries using very advanced cyber weapons. Organizers watched the games from a “white cell” (a separate room) and assessed the successes and weaknesses of each team. At the end of the three-week session, teams were expected to counterattack the “enemy” using what was termed defensive cyber “response actions.” It is understood that these counterattacks were carried out on order, in keeping with the fact that any cyber counterattack would be controlled by the White House and defense secretary.

Cyber Guard is an evolving exercise, continually expanding to meet the demands of the Department of Defense and the nation,” the DoD fact sheet states.

By Penny Swift

Anita Raj

A Winning Data Strategy Series Part 2: Data, an Asset, or a Liability?

Data, an Asset, or a Liability? This is the second piece of a 5-part series on plugging the obvious but overlooked gaps in achieving digital success through a refined data strategy. You can read the ...
Torsten

Five Ways to Secure Access to Web Workloads

Secure Access to Cloud Workloads Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. That’s a major reason why worldwide spending on public cloud services and infrastructure ...
Ian Hayes

EasyShip – Shipping and delivering across the cloud

The Shipping Industry  Article branded by Easyship Shipping and delivering across the world is as hectic as it sounds, and it can get really chaotic for online businesses to keep track, especially if they sell ...
Internet Security

Firefox introduces Enhanced Tracking Protection for Desktop Users

Firefox introduces Enhanced Tracking Protection for Desktop Users Great news for Mozilla Firefox users as the internet browser rolled out its latest tracking protection features that make web surfing a lot safer. The new Enhanced ...
Tunio Zafer

The Evolution of Data File Sharing

Data File Sharing Whether due to a lack of time, need or simply because email started at such an advanced stage, digital data-transfer systems have not progressed as far as physical delivery system. Centuries ago, ...
Evelyn Min 180x180

The Companies That Know The Most About You

The Tracking Era (Updated: 11.03.2020) Right now privacy is a hot topic on LinkedIn posts, especially as it pertains to compliance with the General Data Protection Regulation. As a board advisor at Universal Patient Key, we've ...