It is the government's idea of a really bad day: Washington's Metro subway trains shut down. Seaport computers in New York go dark. Bloggers reveal locations of railcars with hazardous materials. Airport control towers are disrupted in Philadelphia and Chicago. Overseas, a mysterious liquid is found in London's subway.
And that was just for starters.
The fictitious international calamities were among dozens of detailed, mock disasters confronting officials in rapid succession in the US government's biggest-ever "Cyber Storm" war game, according to hundreds of pages of heavily censored files obtained by reporters. The Homeland Security Department ran the exercise to test the US' hacker defenses, with help from the State, Defense and Justice departments, the CIA, the National Security Agency and others.
The laundry list of fictional catastrophes, which include hundreds of people on "No Fly" lists arriving suddenly at US airport ticket counters, is significant because it suggests what kind of real-world trouble keeps people in the White House awake at night.
Imagined villains include hackers, bloggers, even reporters. After mock electronic attacks overwhelmed computers at the Port Authority of New York and New Jersey, an unspecified "major news network" airing reports about the attackers refused to reveal its sources to the government. Other simulated reporters were duped into spreading "believable but misleading" information that worsened fallout by confusing the public and financial markets, according to the government's files.
The US$3 million, invitation-only war game simulated what the US described as plausible attacks over five days in February 2006 against the technology industry, transportation lines and energy utilities by anti-globalization hackers. The government is organizing another multimillion-dollar wargame, Cyber Storm 2, to take place early next month.
"They point out where your expectations of your capabilities may be overstated," Homeland Security Secretary Michael Chertoff said. "They may reveal to you things you haven't thought about. It's a good way of testing that you're going to do the job the way you think you were."
Reporters obtained the Cyber Storm internal records nearly two years after it requested them under the Freedom of Information Act. The government censored most of the 328 pages it turned over, marked "For Official Use Only," citing rules preventing the disclosure of sensitive information.
"Definitely a challenging scenario," said Scott Algeier, who runs a cyber-defense group for leading technology companies, the Information Technology Information Sharing and Analysis Center.
For the participants -- who included government officials from the US, England, Canada, Australia and New Zealand and executives from leading technology and transportation companies -- the mock disasters came fast and furious: Hacker break-ins at an airline; stolen commercial software blueprints; problems with satellite navigation systems; trouble with police radios in Montana; school closures in Washington, Miami, Florida and New York City; computer failures at border checkpoints.
The incidents were divided among categories: computer attacks, physical attacks or psychological operations.
"We want to stress these players," said Jeffrey Wright, the former Cyber Storm director for the Homeland Security Department. "None of the players took 100 percent of the correct, right actions. If they had, we wouldn't have done our job as planners."
How did they do? Reviews were mixed. Companies and governments worked successfully in some cases.
Crucial players did not understand the role of the premier US organization responsible for fending off major cyber attacks, called the National Cyber Response Coordination Group, and it lacked sufficient technical experts.
Also, the sheer number of mock attacks complicated defensive efforts.
The little-known Cyber Response group, headed by the departments of Justice and Homeland Security, represents the largest US government departments and includes law enforcement and intelligence agencies. It is the principal organization for responding to cyber attacks and recovering from them.
The exercise had no impact on the real Internet. Officials said they were careful to simulate attacks only using isolated computers, working from basement offices at the Secret Service's headquarters in downtown Washington.
The government's files hint at a tantalizing mystery: In the middle of the wargame, someone quietly attacked the very computers used to conduct the exercise. Perplexed organizers traced the incident to overzealous players and sent everyone an urgent e-mail marked "IMPORTANT!" reminding them not to probe or attack the game computers.
"Any time you get a group of [information technology] experts together, there's always a desire, `Let's show them what we can do,'" said George Foresman, a former senior Homeland Security official who oversaw Cyber Storm. "Whether its intent was embarrassment or a prank, we had to temper the enthusiasm of the players."
Weeks into the craze, nobody quite knows what to make of the OpenClaw mania sweeping China, marked by viral photos of retirees lining up for installation events and users gathering in red claw hats. The queues and cosplay inspired by the “raising a lobster” trend make for irresistible China clickbait. However, the West is fixating on the least important part of the story. As a consumer craze, OpenClaw — the AI agent designed to do tasks on a user’s behalf — would likely burn out. Without some developer background, it is too glitchy and technically awkward for true mainstream adoption,
On Monday, a group of bipartisan US senators arrived in Taiwan to support the nation’s special defense bill to counter Chinese threats. At the same time, Beijing announced that Chinese President Xi Jinping (習近平) had invited Chinese Nationalist Party (KMT) Chairwoman Cheng Li-wun (鄭麗文) to visit China, a move to make the KMT a pawn in its proxy warfare against Taiwan and the US. Since her inauguration as KMT chair last year, Cheng, widely seen as a pro-China figure, has made no secret of her desire to interact with the Chinese Communist Party (CCP) and meet with Xi, naming it a
A delegation of Chinese Nationalist Party (KMT) officials led by Chairwoman Cheng Li-wun (鄭麗文) is to travel to China tomorrow for a six-day visit to Jiangsu, Shanghai and Beijing, which might end with a meeting between Cheng and Chinese President Xi Jinping (習近平). The trip was announced by Xinhua news agency on Monday last week, which cited China’s Taiwan Affairs Office (TAO) Director Song Tao (宋濤) as saying that Cheng has repeatedly expressed willingness to visit China, and that the Chinese Communist Party (CCP) Central Committee and Xi have extended an invitation. Although some people have been speculating about a potential Xi-Cheng
The ongoing Iran conflict is putting Taiwan’s energy fragility on full display — the island of 23 million people, home to the world’s most advanced semiconductor manufacturing, is highly dependent on imported oil and gas, especially that from the Middle East. In 2025, 69.6 percent of Taiwan’s crude oil and 38.7 percent of liquified natural gas were sourced from the Middle East. In the same year, 62 percent of crude oil and 34 percent of LNG to Taiwan went through the Strait of Hormuz. Taiwan’s state-run oil company CPC Corp’s benchmark crude oil price (70 percent Dubai, 30 percent Brent)