http://www.networkworld.com/news/2007/020807-rsa-cyber-attacks.html

U.S. cyber counterattack: Bomb 'em one way or the other
National Cyber Response Coordination Group establishing proper
response to cyberattacks
By Ellen Messmer, Network World
February 08, 2007 12:06 PM ET
Sponsored by:

San Francisco — If the United States found itself under a major
cyberattack aimed at undermining the nation’s critical information
infrastructure, the Department of Defense is prepared, based on the
authority of the president, to launch a cyber counterattack or an
actual bombing of an attack source.

The primary group responsible for analyzing the need for any cyber
counterstrike is the National Cyber Response Coordination Group
(NCRCG). The three key members of the NCRCG, who hail from the US-CERT
computer-readiness team, the Department of Justice and the Defense
Department, this week described how they would seek to coordinate a
national response in the event of a major cyber-event from a known
attacker.

This week’s massive but unsuccessful denial-of-service (DoS) attack on
the Internet’s root DNS, which targeted military and other networks,
did not rise to the level of requiring response, but made the
possibility of a massive Internet collapse more real than theoretical.
Had the attack been successful there may have been a cyber
counterstrike from the United States, said Mark Hall, director of the
international information assurance program for the Defense Department
and the Defense Department co-chair to the NCRCG, who spoke on the
topic of cyber-response during the RSA Conference here.

“We have to be able to respond,” Hall said. “We need to be in a
coordinated response.”

He noted that the Defense Department networks, subject to millions of
probes each day, has “the biggest target on its back.”

But a smooth cyber-response remains a work in progress. The NCRCG’s
three co-chairs acknowledge it’s not simple coordinating
communications and information-gathering across government and
industry even in the best of circumstances, much less if a significant
portion of the Internet or traditional voice communications were
suddenly struck down. But they asserted the NCRCG is “ready to stand
up” to confront a catastrophic cyber-event to defend the country.

“We’re working with key vendors to bring the right talent together for
a mitigation strategy,” said Jerry Dixon, deputy director for
operations for the National Cyber Security Division at US-CERT. “We
recognize much infrastructure is operated by the private sector.” The
U.S. government has conducted cyber war games in its CyberStorm
exercise last year and is planning a second one.

The third NCRCG co-chair, Christopher Painter, principal deputy chief
at the Justice Department, said the cyber-response group also seeks to
communicate with 50 countries around the world where monitoring for
massive cybersecurity events go on as well. “Some of them have some of
the same communications issues we have here,” he noted.

The Department of Homeland Security’s National Response Plan calls for
coordination with a number of agencies, including the Department of
Treasury, when the decision for a national response is made. So far,
there has been no major cybersecurity event against the United States
that has prompted the need for a national response.

The massive DoS attack attempt against the Internet’s root-servers
this week, which specifically targeted military networks, raises the
question whether the United States would ever respond with a
counterattack.

“It’s the President’s call,” said Hall said, pointing out the
recommendation for a counterattack would be passed to the chief
executive via the U.S. Strategic Command in Omaha.

In the event of a massive cyberattack against the country that was
perceived as originating from a foreign source, the United States
would consider launching a counterattack or bombing the source of the
cyberattack, Hall said. But he noted the preferred route would be
warning the source to shut down the attack before a military response.

All the military services are preparing for military cyber-response,
Hall pointed out.

Jim Collins, R&D engineer at the Air Force Information Operations
Center, who also spoke on the need for network defense at a session at
the RSA Conference, said the Air force is also gearing up for an
offensive cyber capability.

“The Air Force hasn’t just been standing by,” he said, noting that in
November, the Air Force added the mission to fight in cyberspace by
creating a new Cyber Command.

“We’re standing up cyber-fighters to do network warfare,” Collins
said. “Where we had pilots before, we’ll have fighters in cyberspace.”

Read more about security in Network World's Security section.

All contents copyright 1995-2010 Network World, Inc.
http://www.networkworld.com

-- 
Larry C. Lyons
web: http://www.lyonsmorris.com/lyons
LinkedIn: http://www.linkedin.com/in/larryclyons
--
The real problem is not whether machines think but

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Want to reach the ColdFusion community with something they want? Let them know 
on the House of Fusion mailing lists
Archive: 
http://www.houseoffusion.com/groups/cf-community/message.cfm/messageid:312695
Subscription: http://www.houseoffusion.com/groups/cf-community/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.5

Reply via email to