DHS poised for mock terror attacks

TopOff 2 media site

SAVANNAH, Ga. — The information technology team at the Homeland Security Department (DHS) will be working around the clock next week to monitor an exercise simulating a terrorist attack on Seattle and Chicago, the department's chief information officer said today.

Steve Cooper said his team of top-level IT officials would be looking for any cybersecurity lapses and actions that should have been taken but were not.

"We'll be watching for lessons learned: Is there something we missed? Do we need to fill a gap?" he told Federal Computer Week at the semiannual CIO Summit, sponsored by FCW Media Group.

The five-day exercise, known as TopOff 2 (Top Officials 2), will begin May 12. It will include DHS and the State Department working in conjunction with federal, state, local and Canadian officials. The exercise will analyze the response to a terrorist attack.

The operation includes a sequence of events that would happen in a terrorist campaign with weapons of mass destruction. The operation will simulate a radiological device explosion in Seattle and a covert biological attack in Chicago, and evaluate how authorities respond to these incidents.

Some 25 agencies and the American Red Cross will be involved in the exercise, DHS Secretary Tom Ridge said May 5 in discussing the event.


  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.