New York City Hit by Simulated Cyber Attack, Loses Power in Height of Summer

By Steve Anderson March 09, 2012

After seeing the havoc raised by hackers last summer, in which they hit the PlayStation Network along with a variety of other targets, one thing became perfectly clear: the damage that hackers can do if sufficiently motivated in that direction can be immense. But the White House wanted to find out just how much damage they could do under the right circumstances, so they set up a simulated cyber attack to find out for themselves.

And the answer to the question, sadly, is we don't know, but likely a lot. The scenario itself was classified, so barring a Wikileaks-style release, we'll likely never know just how bad the damage was. Of course, given the fact that we know the circumstances under which the attack was launched, we have some idea. And given that Jay Rockefeller, the senator from West Virginia, declared the simulation “convincing”, we have a pretty good idea of just what happened.

The simulation itself called for a full cyber attack to be launched against New York City's power grid in the hottest part of summer. Given those conditions, it's not hard to see why Rockefeller went on to say that the simulation showed the dangers inherent in a lack of security in key systems can be.

After all, if you want to show the damage that a cyber attack can do, you don't shut down the power in Grover's Corners on a lovely spring day, ensuring that the town's lone stoplight doesn't work and all the milk in Effie's Diner spoils. Oh no, you kill refrigerators and air conditioning and water supplies on the hottest day of the year in one of America's biggest metropolitan areas. You kill the stock exchange, thousands of businesses, large chunks of media, and that's before the implications of the wider regional power grid come into play. The implications of such an attack, even knowing as little as we know, are staggering.

Considering that, at last report, the Senate is currently considering two different cyber security bills –one where cyber security standards for private companies are regulated by federal authorities and another where the government has no control over the standards – it does raise the possibility that someone wanted to put a scare into someone else. After all, the simulation in question went right for the metaphorical jugular and showed pretty much the worst-case scenario, so some might question the timing involved here.

Still though, the concept of a cyber attack, whether it's on your own computers, or computers that you use every day via a third party like the power grid, is certainly sufficiently dangerous to make paying attention – and preparing for the worst – a prudent and worthwhile strategy.






Edited by Jennifer Russell

Contributing TechZone360 Writer

SHARE THIS ARTICLE
Related Articles

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More

Putting the Flow into Workflow, Paessler and Briefery Help Businesses Operate Better

By: Cynthia S. Artin    9/14/2018

The digital transformation of business is generating a lot of value, through more automation, more intelligence, and ultimately more efficiency.

Read More

From Mainframe to Open Frameworks, Linux Foundation Fuels Up with Rocket Software

By: Special Guest    9/6/2018

Last week, at the Open Source Summit, hosted by The Linux Foundation, the Open Mainframe Project gave birth to Zowe, introduced a new open source soft…

Read More

Unified Office Takes a Trip to the Dentist Office

By: Cynthia S. Artin    9/6/2018

Not many of us love going to see the dentist, and one company working across unified voice, productivity and even IoT systems is out to make the exper…

Read More

AIOps Outfit Moogsoft Launches Observe

By: Paula Bernier    8/30/2018

Moogsoft Observe advances the capabilities of AIOps to help IT teams better manage their services and applications in the face of a massive proliferat…

Read More