www.globalresearch.ca
Centre for Research on Globalisation
Centre de recherche sur la mondialisation

 

Simulating Cyberattacks by "Anti-Globalization Hackers":

CIA Overseeing 3-Day War Game on Internet

AP 25 May 2005
www.globalresearch.ca 27 May  2005

The URL of this article is: http://globalresearch.ca/articles/BRI505A.html


 

Global Research Editor's note

"The simulated attacks were carried out five years in the future by a fictional new alliance of anti-American organizations that included anti-globalization hackers."

The CIA Internet War Games build a consensus within the intelligence and law enforcement communities that somehow the anti-globalization movement constitutes a threat. The  "outside enemy" in the simulation is made up of "anti-globalization hackers", allied with "terrorists", which are intent on disrupting  the Internet.  

The fact of the matter is that the opposition and alternative news media, which provides a alternative source of information, constitutes a threat to the Neocon New World Order agenda of the Bush administration.  What is not mentioned in the report is the possible scenario, where the US administration attempts to close down and/or disrupt a number of alternative media sites, with a view to clamping down on freedom of information.  


 

CIA Overseeing 3-Day War Game on Internet


By TED BRIDIS,  AP Technology Writer
Wed May 25, 7:14 PM ET
 
 
WASHINGTON - The CIA is conducting a war game this week to simulate an unprecedented, Sept. 11-like electronic assault against the United States. The three-day exercise, known as "Silent Horizon," is meant to test the ability of government and industry to respond to escalating Internet disruptions over many months, according to participants.
 
They spoke on condition of anonymity because the CIA asked them not to disclose details of the sensitive exercise taking place in Charlottesville, Va., about two hours southwest of Washington.
 
The simulated attacks were carried out five years in the future by a fictional new alliance of anti-American organizations that included anti-globalization hackers. The most serious damage was expected to be inflicted in the closing hours of the war game Thursday.

The national security simulation was significant because its premise - a devastating cyberattack that affects government and parts of the economy on the scale of the 2001 suicide hijackings - contradicts  assurances by U.S. counterterrorism experts that such effects from a cyberattack are highly unlikely.

"You hear less and less about the digital Pearl Harbor," said Dennis McGrath, who has helped run three  similar exercises for the Institute for Security Technology Studies at Dartmouth College. "What people call cyberterrorism, it's just not at the top of the list."

The CIA's little-known Information Operations Center , which evaluates threats to U.S. computer systems from foreign  governments, criminal organizations and hackers, was running the war game. About 75 people, mostly from the CIA, along with other current and former U.S. officials, gathered in conference rooms and pretended to react to signs of mock computer attacks.
 
The government remains most concerned about terrorists using explosions, radiation and biological threats. FBI Director  Robert Mueller warned earlier this year that terrorists increasingly are recruiting computer scientists but said most hackers "do not have the resources or motivation to attack the U.S. critical information infrastructures."

The government's most recent intelligence assessment of future threats through the year 2020 said cyberattacks are expected but terrorists "will continue to primarily employ conventional weapons." Authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or "swarming" attacks.

"One of the things the intelligence community was accused of was a lack of imagination," said Dorothy  Denning of the Naval Postgraduate School, an expert on Internet threats who was invited by the CIA to participate but declined. "You want to think about not just what you think may affect you but about scenarios that might seem unlikely."

An earlier cyberterrorism exercise called "Livewire" for the Homeland Security Department and other federal agencies concluded there were serious questions over government's role during a cyberattack  depending on who was identified as the culprit - terrorists, a foreign government or bored teenagers.

It also questioned whether the U.S. government would be able to detect the early stages of such an attack without significant help from private technology companies.

 


The CIA'S Information Operations Center�s Analysis Group (IOC/AG) evaluates foreign threats to US computer systems, particularly those that support critical infrastructures. We provide our analysis to the President, his senior advisers, high-level officials on cyber issues in the Departments of Defense, State, and Treasury, and to senior private-sector officials responsible for operating critical infrastructures.

SOURCE http://www.cia.gov/cia/di/organizationt_ioc_page.html


To become a Member of Global Research

The Centre for Research on Globalization (CRG) at www.globalresearch.ca grants permission to cross-post original Global Research articles in their entirety, or any portions thereof, on community internet sites, as long as the text & title are not modified. The source must be acknowledged and an active URL hyperlink address of the original CRG article must be indicated. The author's copyright note must be displayed.  For publication of Global Research articles in print or other forms including commercial internet sites, contact: [email protected]

www.globalresearch.ca contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of "fair use" in an effort to advance a better understanding of political, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than "fair use" you must request permission from the copyright owner.

Disclaimer: The views expressed in this article are the sole responsibility of the author and do not necessarily reflect those of the Centre for Research on Globalization.

To express your opinion on this article, join the discussion at Global Research's News and Discussion Forum

For media inquiries: [email protected]

� Copyright AP 2005.


 

www.globalresearch.ca

return to home page