www.nettime.org
Nettime mailing list archives

<nettime> CIA Overseeing 3-Day War Game on Internet
a. mark liiv on Sun, 29 May 2005 13:12:53 +0200 (CEST)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> CIA Overseeing 3-Day War Game on Internet



From: "C. G. Estabrook" <galliher {AT} alexia.lis.uiuc.edu>
Date: Wed, 25 May 2005 20:33:19 -0500
Subject: [CP-General] We are the enemy

[The important part of the account below is not how the CIA chooses to
spend its (unaccounted) tax money, but rather whom the USG sees as its
enemy: an "alliance of anti-American organizations that includes
anti-globalization hackers." Thus "American" is equated with corporate
globalization, and opponents of the latter are defined as opponents of
the former. They mean it when they say, "Either you are with us, or you
are with the terrorists." --CGE]

  CIA Overseeing 3-Day War Game on Internet
  May 25, 6:42 PM (ET)
  By TED BRIDIS

WASHINGTON - The CIA is conducting a war game this week to simulate an
unprecedented, Sept. 11-like electronic assault against the United
States. The three-day exercise, known as "Silent Horizon," is meant to
test the ability of government and industry to respond to escalating
Internet disruptions over many months, according to participants.

They spoke on condition of anonymity because the CIA asked them not to
disclose details of the sensitive exercise taking place in
Charlottesville, Va., about two hours southwest of Washington.

The simulated attacks were carried out five years in the future by a
fictional new alliance of anti-American organizations that included
anti-globalization hackers. The most serious damage was expected to be
inflicted in the closing hours of the war game Thursday.

The national security simulation was significant because its premise - a
devastating cyberattack that affects government and parts of the economy
on the scale of the 2001 suicide hijackings - contradicts assurances by
U.S. counterterrorism experts that such effects from a cyberattack are
highly unlikely.

"You hear less and less about the digital Pearl Harbor," said Dennis
McGrath, who has helped run three similar exercises for the Institute
for Security Technology Studies at Dartmouth College. "What people call
cyberterrorism, it's just not at the top of the list."

The CIA's little-known Information Operations Center, which evaluates
threats to U.S. computer systems from foreign governments, criminal
organizations and hackers, was running the war game. About 75 people,
mostly from the CIA, along with other current and former U.S. officials,
gathered in conference rooms and pretended to react to signs of mock
computer attacks.

The government remains most concerned about terrorists using explosions,
radiation and biological threats. FBI Director Robert Mueller warned
earlier this year that terrorists increasingly are recruiting computer
scientists but said most hackers "do not have the resources or
motivation to attack the U.S. critical information infrastructures."

The government's most recent intelligence assessment of future threats
through the year 2020 said cyberattacks are expected but terrorists
"will continue to primarily employ conventional weapons." Authorities
have expressed concerns about terrorists combining physical attacks such
as bombings with hacker attacks to disrupt rescue efforts, known as
hybrid or "swarming" attacks.

"One of the things the intelligence community was accused of was a lack
of imagination," said Dorothy Denning of the Naval Postgraduate School,
an expert on Internet threats who was invited by the CIA to participate
but declined. "You want to think about not just what you think may
affect you but about scenarios that might seem unlikely."

An earlier cyberterrorism exercise called "Livewire" for the Homeland
Security Department and other federal agencies concluded there were
serious questions over government's role during a cyberattack depending
on who was identified as the culprit - terrorists, a foreign government
or bored teenagers.

It also questioned whether the U.S. government would be able to detect
the early stages of such an attack without significant help from private
technology companies.

Copyright 2005 Associated Press.


_______________________________________________
counterpunch-general mailing list
counterpunch-general {AT} counterpunch.org
http://counterpunch.org/mailman/listinfo/counterpunch-general

-- 
"All empires collapse eventually: Akkad, Sumeria,=20
Babylonia, Ninevah, Assyria, Persia, Macedonia,=20
Greece, Carthage, Rome, Mali, Songhai, Mongonl,=20
Tokugawaw, Gupta, Khmer, Hapbsburg, Inca, Aztec,=20
Spanish, Dutch, Ottoman, Austrian, French,=20
British, Soviet, you name them, they all fell,=20
and most within a few hundred years. The reasons=20
are not really complex. An empire is a kind of=20
state system that inevitably makes the same=20
mistakes simply by the nature of its imperial=20
structure and inevitably fails because of its=20
size, complexity, territorial reach,=20
stratification, heterogeneity, domination,=20
hierarchy, and inequalities. "
-Kirkpatrick Sale

****************************************
"Sentiment without action is the ruin of the soul."
"Sentimento sin acci=F3n es la aniquilaci=F3n del alma."
--Edward Abbey

****************************************
Whispered Media
P.O. Box 40130
San Francisco, CA 94140 USA
(415) 789-8484
<info {AT} whisperedmedia.org>
http://www.whisperedmedia.org
****************************************
Video Activist Network
http://www.videoactivism.org
****************************************



#  distributed via <nettime>: no commercial use without permission
#  <nettime> is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: majordomo {AT} bbs.thing.net and "info nettime-l" in the msg body
#  archive: http://www.nettime.org contact: nettime {AT} bbs.thing.net