South American non-profit organization Bipartisan Policy Center held experience and tried to know what would happen if hackers around the world have unleashed a massive cyberwar against the United States? Exercises were held under the title "Shock kibervolna", which clearly showed: country fully protected.
In the case of the massive attacks of hackers from abroad, infrastructure line telephony and wireless mobile communications, power supply system can also just get out of the system, which immobilizes the usual overnight functioning of the whole economy.
Training was carried out cyber warfare simulation computers 230 participants experience. All these people — employees of defense agencies, security agencies, private companies engaged in the development of security and public associations. From the first training session revealed prepyadstviya: municipal server in charge of the country's electricity supply, "lay down" after the most common hacker attacks.
During the exercises were worked out two scenarios: first mobile software programs from virus began to spread between phones that began intensively infect each other. As a result, the whole mobile network clusters fell under load. And that is why the country's electricity stopped working, analysts have yet to learn.
Simulation of a real war in the web showed that in the case of a competent attack, 40000000 Yankees in the eastern U.S. may be left without electricity after only half an hour in advance. After another hour — 60 million mobile phone subscribers will find that their phones are turned into ordinary plastic key chains that no matter what can not. And after a couple of hours will be paralyzed and the money center of the world — Wall Street.
Participants experience tested at the same time, as prepared for crises safety cabinets that need to respond quickly to the attack. How annoying would it sounds, bureaucrats pumped up. They in time experience just fell into a stupor, especially after the beginning of the "attack" on the Pentagon's computers and the U.S. state services.
Separate experiments showed that the U.S. news agencies are not able to quickly and perfectly outline the actions that occur after the cyber attacks, suggesting that journalists are able to be aware of everything that happens in cyberspace and to give adequate advice population in the country in fact.
Organizers of experience warned that most of the similar attacks made not directly from abroad, and indirectly: first infected computers everyday users — the law-abiding people of the country, and already here attacked server, such as the Pentagon. With all this themselves owners of computers that do not guess.
But the biggest problem of that found in the Bipartisan Policy Center, — the absence of legislation that would punish distributors of harmful software. If we talk easier, creators and distributors of viruses for mobile phones in the United States to punish the court can neither one tribunal.
Previously, it seemed that the crack supply, infrastructure operators, computer networks of economic, political and military departments of the USA is hard enough — the system well protected against attacks, especially on the part of ordinary computers inhabitants. But the overall distribution of the mobile web and the types of smartphones Apple iPhone is completely different matter, they say specialists.
At the end of the experience secretary for the U.S. National Security Michael Chertoff acknowledged that his government is not fully protected against cyber threats of the modern world and promised that the government in the coming time accept all measures to ensure their safety. With all this, he stressed that in recent years the number of attacks perpetrated by the United States from abroad constantly grows — first, at the expense of China and the Muslim countries of the world, offended the foreign policy of U.S..
— During that Americans are forced to announce the "thank you" to ex-president George W. Bush — said Michael Chertoff. — We recognize that not seriously prepared for the likely threats from the virtual space. We are very vulnerable. Because the last time we take a number of legislative initiatives and the military to restore order in this sphere, and an increase in self-defense in the event of cyber attacks …
The conclusion which is made in the Bipartisan Policy Center, fit in a 43-second video clip, located at their web site. It reads:
"Over the past 10 years, cyber attacks incapacitate the government and commercial Web sites of the country. It does more damage to the U.S. economy. We are talking about billions of dollars. When our homeland invaded Georgia in August 2008, first hit the Georgian government websites. January 2010 was marked by the fact that Chinese hackers had stolen information from Google and 30 other major U.S. and international companies. Who will get hit in the subsequent time? .. "
Meaning … burglars in the world, meanwhile, continues to grow. The Washington Post writes that in January 2010, was found naikrupneyshaya massive hacking attack in the history of the Web: affected 75 thousand computer systems in 196 countries around the world. In the U.S., the victims in more than 2,500 companies.
Hackers are in the process of intelligent attacks stole sensitive information about operations with credit cards, also interested in official usernames and passwords of employees of defense and scientific agencies in different states. Experts utvrezhdaet that the criminal group that organized it all, the physical layer is placed in Eastern Europe …
Comments on the results of their teaching and Larry Clinton, president, ISA, dealing with issues of Internet security:
— The problem is really tremendous, and these exercises — not PR. The discussions that we may be adversely affected by embracing connectedness of society, are from the time of President Clinton. The problem is, and the farther, the deeper, and she should not expect her frisky solutions. Adoption of a couple of legislative initiatives or allocation of millions of dollars is not able to solve it overnight. When it comes about cybersecurity, all the economic incentives are working on strikers storm the server still cheaper than protect them. Because the attack will last. It is fair to see something else: other countries also look vulnerable, and to an even greater degree than the United States. So what is the right strategy in the event that something similar will happen — to fight back …