It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Here's a link to the Dept. Homeland Security statistics from the 2006 project...
The 2006 exercise had no impact on the real Internet. Officials said they were careful to simulate attacks using only isolated computers, working from basement offices at the Secret Service's headquarters in downtown Washington.
Each organisation involved will be testing its own response to “a series of cyber incidents, culminating in a large-scale attack,” says Paul McKitrick of the Centre for Critical Infrastructure Protection (CCIP), which is co-ordinating the NZ leg of the exercise, but there will also be trials of the way organisations react and communicate with one another across an industry sector and internationally.
Each organisation involved will have at least one representative in its office and one at Exercise Control (Excon) in the CCIP office in Wellington. They will receive periodic information bulletins (called “injects”) on the fictional events constituting the crisis. They will decide how to react within their own organisation and between organisations, the latter signified by a representative at Excon getting up and walking to another organisation’s table for an exchange of information.
Most of the injects will take the form of messages on paper — “for example ‘your network logs have reported this’,” says McKitrick, but there may also be some “live” simulation of events on visual displays and emails will be exchanged nationally and internationally.
Messages will be headed “Exercise Exercise Exercise — Cyber Storm II” so they are not confused with messages indicating real situations.