Release Date: March 10, 2008
For Immediate Release
Office of the Press Secretary
Contact: 202-282-8010
The U.S. Department of Homeland Security (DHS) is conducting the largest cyber security exercise ever organized. Cyber Storm II is being held from March 10-14 in Washington, D.C. and brings together participants from federal, state and local governments, the private sector, and the international community.
Cyber Storm II is the second in a series of congressionally mandated exercises that will examine the nation’s cyber security preparedness and response capabilities. the exercise will simulate a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.
“Securing cyberspace is vital to maintaining America’s strategic interests, public safety, and economic prosperity,” said Greg Garcia, Homeland Security Assistant Secretary for Cyber Security and Communications. “Exercises like Cyber Storm II help to ensure that the public and private sectors are prepared for an effective response to attacks against our critical systems and networks.”
Cyber Storm II will include 18 federal departments and agencies, nine states (Calif., Colo., Del., Ill., Mich., N.C., Pa., Texas and Va.), five countries (United States, Australia, Canada, New Zealand and the United Kingdom), and more than 40 private sector companies. They include ABB, Inc., Air Products, Cisco, Dow Chemical Company Inc., Harris Corporation, Juniper Networks, McAfee, Microsoft, NeuStar, PPG Industries, and Wachovia.
Cyber Storm II objectives include:
* Examining the capabilities of participating organizations to prepare for, protect against, and respond to the potential effects of cyber attacks
* Exercising strategic decision making and interagency coordination of incident response in accordance with national level policy and procedures
* Validating information sharing relationships and communications paths for the collection and dissemination of cyber incident situational awareness, response and recovery information
* Examining means and processes through which to share sensitive information across boundaries and sectors without compromising proprietary or national security interests
For more information on Cyber Storm II visit:http://www.dhs.gov/xprepresp/training/gc_1204738275985.shtm
###
Source: http://www.dhs.gov/xnews/releases/pr_1205180340404.shtm
See also:
Many more details about this at this DHS Fact Sheet.
Great article from Wired, When Hippies Turn to Cyber Terror, about the first Cyber Storm, held in February of 2006 (here”s a snippet of that article):
Nobody”s said much about the results, or the details of the exercise scenario. But a newly-published DHS PowerPoint presentation on the exercise reveals that the real terrorist threat in cyber space isn”t from obvious suspects like al Qaida types or Connecticut voters; it”s from anti-globalization radicals and peace activists.
The attack scenario detailed in the presentation is a meticulously plotted parade of cyber horribles led by a “well financed” band of leftist radicals who object to U.S. imperialism, aided by sympathetic independent actors.
Report on the first Cyber Storm Exercise: DHS Fact Sheet: Report
And one more interesting little tidbit: Cyber-attack or Cyberstorm? from Larisa Alexandrovna, atlargely.com