Web Hosting News

  Home arrow Web Hosting News arrow Page 2 - What is the Government Doing to Keep U...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING NEWS

What is the Government Doing to Keep Users Safe Online?
By: Terri Wells
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 3 stars3 stars3 stars3 stars3 stars / 8
    2005-06-01

    Table of Contents:
  • What is the Government Doing to Keep Users Safe Online?
  • CIA Conducts Three Days of Electronic War Games
  • FTC, Other Agencies Wage War against Zombie Spam PCs
  • House Says “No” to Spyware

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    What is the Government Doing to Keep Users Safe Online? - CIA Conducts Three Days of Electronic War Games


    (Page 2 of 4 )

    Sometimes it’s hard not to envy the Associated Press, especially when the news organization is the first to report something this cool. The Central Intelligence Agency conducted a three-day exercise that simulated an electronic assault on the U.S. Dubbed “Silent Horizon,” the war games were set up to discover how well government and industry would be able to handle increasing Internet disruptions over a period of months.

    The scenario, set five years in the future, featured a fictional alliance of anti-American organizations armed with hackers. It took place in Charlottesville, Virginia, and was run by the CIA’s Information Operations Center. At the time of this writing, results were not available – indeed, full details of the games themselves were not disclosed to the press, nor was it known how much more would be revealed. Given that the Internet was the offspring of a DARPA project aimed at creating a communications network that would survive an attack, I for one would be very interested to see the results of the exercise.

    But there’s another reason for analysts to take a closer look at “Silent Horizon.” U.S. counterterrorism experts have given assurances that such a scenario is highly unlikely. Indeed, the government is much more worried about terrorists using explosions, radiation, and biological threats. There is some concern that terrorists might engage in a hybrid or “swarming” attack, in which they combine a physical attack, such as a bombing, with attacks by hackers to thwart rescue efforts.

    Does this mean that the U.S. government’s counterterrorism experts lied in order to assuage the fears of the public? Not at all. Dorothy Denning of the Naval Postgraduate School, an expert on Internet threats quoted by the Associated Press, shed some light on the matter. “One of the things the intelligence community was accused of was a lack of imagination. You want to think about not just what you think may affect you but about scenarios that might seem unlikely.”

    More Web Hosting News Articles
    More By Terri Wells

    WEB HOSTING NEWS ARTICLES

    - FreedomPop Offering Open Wi-Fi Service
    - Go Daddy Goes to India
    - Netelligent, Savvis Add New Canadian Web Hos...
    - World IPv6 Launch Happens Today
    - IT Teams Struggle to Keep Pace with Malware
    - Lulz Security Hacks CIA, Takes Requests
    - Apple Unveils iCloud
    - Rackspace Introduces Cloud Load Balancers
    - Amazon Offers Cloud Drive, Disses Music Indu...
    - New Android.Pjapps Trojan
    - Copyright Fight over Hurt Locker Downloads I...
    - Data Reveals Many Browsers Remain Unpatched
    - PandaLabs Report - What Happens to Stolen In...
    - Safari Books Online Review
    - Hackers Targeting Human Rights Groups

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap