Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
United States Government Security Politics

US Prepares for Eventual Cyberwar 223

The New York Times is reporting on preparations in the works by the US government to prep for a 'cyberwar'. Precautionary measures are being taken to guard against concerted attacks by politically-minded (or well-paid) hackers looking to cause havoc. Though they outline scenarios where mass damage is the desired outcome (such as remotely opening a dam's gates to flood cities), most expect such conflicts to be more subtle. Parts of the internet, for example, may be unreachable or unreliable for certain countries. Regardless, the article suggests we've already seen our first low-level cyberwar in Estonia: "The cyberattacks in Estonia were apparently sparked by tensions over the country's plan to remove Soviet-era war memorials. Estonian officials initially blamed Russia for the attacks, suggesting that its state-run computer networks blocked online access to banks and government offices. The Kremlin denied the accusations. And Estonian officials ultimately accepted the idea that perhaps this attack was the work of tech-savvy activists, or 'hactivists,' who have been mounting similar attacks against just about everyone for several years."
This discussion has been archived. No new comments can be posted.

US Prepares for Eventual Cyberwar

Comments Filter:
  • by Anonymous Coward on Sunday June 24, 2007 @07:07AM (#19626927)
    I mean who the FUCK would be stupid enough to have the controls for a Dam connected to the internet?
    • by vtcodger ( 957785 ) on Sunday June 24, 2007 @08:44AM (#19627309)

      ***Isn't this blown out of proportion, again?***

      Probably not out of proportion. The military has separate secure communications, but civil society doesn't. And many of our key networks aren't exactly robust. We've had incidents in the past of phone networks going down because of bad software upgrades to switches. And of power distribution networks going down for no very good reason and taking many hours to get back up. And satellites going out.

      So what happens when a technically savvy bunch of folks with a point to make starts off by hijacking Microsoft Update to zombiate millions of PCs, uses other update services to brick all sorts of devices, then simultaneously goes after the DNS servers; North American power grid controls; and every satellite link they have previously found a vulnerability in? What if they can take down major parts of the cell phone network? Probably they can DOS the financial service network providers if they can't hack into them -- No functioning ATMs and likely no functioning banks and likely few functioning stores of any kind. And they reprogram a lot of the nation's traffic signals to turn all lights green permanently. They do the same for the railroads. And they turn off the natural gas distribution system -- in January. And they shut down the aquaduct pumping stations feeding Southern California. ... etc, etc, etc. And finally, they shut down as much of the phone system as they can get to.

      A serious attack by a technically savvy attacker with significant resources and a good plan can very likely do most of those things and a great many more.

      If an attacker can do even a quarter of that, it'd take any industrial country a week to get back up after a fashion, and months to really get things back under control. So, no, it's probably not blown out of proportion.

      ***I mean who the FUCK would be stupid enough to have the controls for a Dam connected to the internet?***

      What is the cheapest and most cost effective way to control a remote power facility? And who says cyber attacks are limited to the Internet? If your dam is 300 miles away, you're going to need remote access -- at least for monitoring and quite likely for command and control. Seems to me like most, maybe all, of the technologies to do that -- internet, phone network, satellite, radio links, etc--are open to interception and attack. Even if you can't break into the control link, you likely can deny service in one way or another.

      • by zmollusc ( 763634 ) on Sunday June 24, 2007 @09:02AM (#19627381)
        If the attackers want to maximise chaos, they will leave the traffic signals functioning normally.
      • Re: (Score:3, Funny)

        by MisterSquid ( 231834 )

        A serious attack by a technically savvy attacker with significant resources and a good plan can very likely do most of those things and a great many more.

        William Gibson called and he's asking for Wintermute back.

      • by mcrbids ( 148650 ) on Sunday June 24, 2007 @12:30PM (#19628397) Journal
        So what happens when a technically savvy bunch of folks with a point to make starts off by hijacking Microsoft Update to zombiate millions of PCs,

        What makes you think they have to hijack MS Update? It seems to be a problem right now, today. [bbc.co.uk] Anybody who thinks this is something new is clueless. It's a problem right now, today.

        A few things that can help:

        1) Stop using systems that are inherently flaky. (EG: MS Windows) Move on to something that's proven to be resistant to viruses and the like. MacOSX, Linux, BSD, and other *nix variants are a good bet for the immediate future, but I'd wager that the best bet would be to revive DEC VMS! The security on that system is just simply awesome, and its reliability is second to none. Get somebody with chutzpah like Steve Jobs to make it work, and it would. Very well.

        2) Demand basic, reasonable security policies in force at ISPs. The federal govt should require that ISPs should use basic technologies to ensure that packets appear to come from the right network, malformed packets are rejected, etc. and it should also provide reasonable initial funding so that they can comply with this law without undue hardship.

        Another interesting thought - computers have gotten complex enough that the average person can no longer maintain them. So what if there was a way that the average person could outsource this administration to somebody else? There's quite a few ways this might work:

        A) The "pool service" model - some local techie shop periodically accesses your computer (either physically or remotely) and performs a routine maintenance, fixing security holes, ensuring updates are done, performing backups, etc.

        B) The "terminal" model - rather than store all your data/files on your local machine, your local machine becomes a dummy terminal, and you access your data and programs remotely. Something like the "terminal" that was common on mini and mainframes in the 1980s. Think Google office? This may be where Microsoft goes with their 'Windows Live' service, and where Linux goes routinely with X11.

        C) The "Updater" model - almost in place now, you pay a subscription fee to have software downloaded automagically that takes care of security issues. The main point here is that for this to work, it has to provide a strong assurance of quality, which this does not.

        Man, got windy on this post. Hope you enjoyed it!
      • by djmcmath ( 99313 ) on Sunday June 24, 2007 @12:59PM (#19628559)
        OP is right, and he's optimistic about our defenses. Even the military practices "network security" at only a childish level. Most users have no clue how security works, and our military's network security training is horribly remiss.

        And of course, the OP only outlined a few attacks that can be conducted from the safety of an office somewhere remotely. We face an enemy who isn't at all afraid to blow stuff up, even if it means the explosives are personally delivered. Anyone take a look at the physical security on a dam recently? Storage sites for nuclear waste? Ferries, busses, trains?

        We are ripe for attack from a small team of well-funded and determined enemies, and we're not doing enough to prepare for it.
      • "A serious attack by a technically savvy attacker with significant resources and a good plan can very likely do most of those things and a great many more.

        If an attacker can do even a quarter of that, it'd take any industrial country a week to get back up after a fashion, and months to really get things back under control. So, no, it's probably not blown out of proportion. "

        Correct.

        For instance. Simply screw with everyones Identity. If you got 50% or more of the taxpaying population screwed with ID theft,
        • by rtb61 ( 674572 )
          A serious internet attack is all about attacking hardware. The stuff that makes the internet work, the routers, switches and modems. So if you are producing the hardware and the drivers for the hardware, then taking down the Internet is no problem at all, from knowing the back doors you have inserted in the hardware, to making use of the bug that 'er' you accidentally forgot to fix or still haven't quite gotten around to provide a fix for.

          So let me see, who makes most of the hardware now, has access to th

    • During that time, one of the nuclear reactors that shutdown was found to have numerous Windows based computers connected to the Internet. Apparently, the techs had put them in there and hooked up to make servicing easier. It happened then. It will happen again and again. Until companies decide to take back computing (laptops without USB or modem, ethernet that requires low-level authentication, etc., we will continue to see issues. In fact, if a company wanted to start up big against Dell, et. al. they coul
      • "During that time, one of the nuclear reactors that shutdown was found to have numerous Windows based computers connected to the Internet." If: you discover the real causes of the event: http://en.wikipedia.org/wiki/Northeast_Blackout_of _2003#Causes [wikipedia.org]. Then: you might not post such an uninformed and leading statement that can be so easily dismissed by those of us who work in the industry.
        • PLEASE READ AND PARSE WHAT YOU COPIED. I never said that it caused it. It was the fact that they FOUND a number of windows systems that were connected to the internet via modem . And yes, it did occur.

          You should think before writing misleading statements.
      • Do you have ANY proof of that? That would be a violation of tech specs and as I recall that eastern brown out had nothing to do with a nuclear plant and everything to do with the way the grid was shabbily set up with bandaids.

        even having someone without a license (nuclear not driving) cause a change in power by manipulating something like a valve is a violation. You can't just service something whenever you want. there are strict controls in place.

        There are however systems connected to monitor ce

    • Re: (Score:3, Insightful)

      by timeOday ( 582209 )
      Actually some very important things are reachable via the internet. Like millions of people's bank accounts, for instance. Heck, it's not the Internet, but highly classified satellites download data all the time through the open air. Relying on encryption is unavoidable.
    • I mean who the FUCK would be stupid enough to have the controls for a Dam connected to the internet?

      That is smartest comment that I've read all morning. Has it ever occurred to these dumb fucks that there is somethings that don't need to be wired up? My toaster, the urinal down at the truck stop, the FUCKING flood gates to a damn!

  • by Khaed ( 544779 ) on Sunday June 24, 2007 @07:09AM (#19626935)
    "Make cyberlove, not cyberwar!"
  • Obvious safeguard (Score:5, Insightful)

    by maharg ( 182366 ) on Sunday June 24, 2007 @07:10AM (#19626945) Homepage Journal
    don't connect the dam floodgate controller to the internet ?
    • by Anonymous Coward on Sunday June 24, 2007 @07:47AM (#19627077)
      Welcome to the whitehouse.gov administration panel, please enter your 6 digit password below:
      _ _ _ _ _ _

      Access granted! Hello Mr. President,

      would you like to...
      [1] Raise taxes
      [2] Open floodgates
      [3] Administrate the US Army
      [4] Launch nuclear warheads
      [5] Play online poker
      • Re: (Score:2, Funny)

        by Anonymous Coward

        Access granted! Hello Mr. President,
        would you like to...
        [1] Raise taxes
        [2] Open floodgates
        [3] Administrate the US Army
        [4] Launch nuclear warheads
        [5] Play online poker

        [6]Global Thermonuclear War
    • by ancientt ( 569920 ) <ancientt@yahoo.com> on Sunday June 24, 2007 @08:39AM (#19627271) Homepage Journal

      Back in the late '90s I was infected by my first virus. I had never connected to the internet, I had just used the library and school computers. Somehow, I still managed to get a virus on my floppy diskette.

      I don't think it is unlikely that there are people who hook their laptops up to their work network, and I suspect it is even more likely that people plug in a floppy/thumbdrive/cdrom from home. I don't doubt that it would be safer to stay disconnected from the Internet, but a handcrafted virus would be far more likely to avoid detection by most antivirus and probably accomplish just as much in a hacker war. It would have to be a targeted program, but that is really the point isn't it, that hackers could be targeting networks that are supposed to be secured. Of course, it probably doesn't help security that they probably assume their network is safe.

      • Back in the late '90s I was infected by my first virus. I had never connected to the internet, I had just used the library and school computers. Somehow, I still managed to get a virus on my floppy diskette.

        Sheesh, I forget so easily, but now that you mention it... Viruses of that nature had been around since the late-80s.

        It sounds laughable now, but they were actually a real problem on the likes of the Amiga and Atari ST during the early 90s. No network required; the Amiga ones resided on the floppy boot-sector and could survive a warm reset.

        • by jgrahn ( 181062 )

          Back in the late '90s I was infected by my first virus. I had never connected to the internet, I had just used the library and school computers. Somehow, I still managed to get a virus on my floppy diskette.

          Sheesh, I forget so easily, but now that you mention it... Viruses of that nature had been around since the late-80s.

          It sounds laughable now, but they were actually a real problem on the likes of the Amiga and Atari ST during the early 90s. No network required; the Amiga ones resided on the floppy bo

  • by niceone ( 992278 ) * on Sunday June 24, 2007 @07:12AM (#19626951) Journal
    Now that would have made a good headline. It's directly from the article:

    microchip-controlled Tickle Me Elmos will be transformed into unstoppable killing machines

    (taken slightly out of context)
  • by suv4x4 ( 956391 ) on Sunday June 24, 2007 @07:17AM (#19626969)
    As the government is getting ready for the upcoming cyberwar, the following ad was noticed in a local newspaper:

    We're looking for a young man named John Connor, to lead our efforts in the war against the machines. We offer $1000 to anyone who has any substancial information in discovering his location. If you can help, please dial 1-800-ILL-BE-BACK.

        - The Government (it's not Terminator this time, I swear)
    • Re: (Score:3, Funny)

      by suv4x4 ( 956391 )
      The next day another ad was printed:

      This is The Government. We're warning you that Terminator seems to be posting newspaper ads looking for John Cohnor and presenting himself as The Government. Do NOT call him. The real Government would never post ads in a newspaper in a fashion like that.

      Hmm, wait a second. Bob, stop typing, let me call the general. Hello, General? I just realized, we can't type in a newspaper ad, that we'd never post in a newspaper ad, we'd look like damn morons. Uhuh. Uhuh.. Wait.. BOB I
    • Comment removed based on user account deletion
  • by segedunum ( 883035 ) on Sunday June 24, 2007 @07:46AM (#19627073)
    Well, everyone needs a credible enemy to keep themselves in a job. I mean, what would all those government agencies do with their time? The whole thing is just playing peoples worst fears, and the scenarios they've got there are straight out of Die Hard......or that film Sandra Bullock was in, and of course the all have no basis in reality.

    Bring back the Cold War, that's what I say, and it looks as though they are. This whole terrorism thing just isn't working out ;-).
    • Re: (Score:3, Informative)

      by Timesprout ( 579035 )

      This whole terrorism thing just isn't working out
      Well even the dummies are starting to put 2 and 2 together now over the whole 'terrorist global domination' charade and 'Cyber terrorists' are a ready made replacement in terms of fear mongering. Another vague, unknown threat that could be anywhere and somehow capable of causing immense destruction and loss of life at any given moment.
    • by suv4x4 ( 956391 )
      Bring back the Cold War, that's what I say, and it looks as though they are. This whole terrorism thing just isn't working out ;-).

      Maybe it's not working out, but Cold War was even worse. It was so hopelessly outdated, that they tried rebranding it "Cool War", "Hot War" and what not, but it just wouldn't catch on.

      Cyberwar and war on terror is where it's at. And war on child abuser. Who doesn't agree? You child abusers, you.
    • Well, since nobody else has said it, there it is.
    • The whole thing is just playing peoples worst fears,...

      Well, except that their fears are REAL. Not the dams and infrastructure part: the espionage part. We're under constant electronic attack every day, by many nations, threatening or otherwise. There's no commercial defense contractor today who does not have foreign electronic agents planted in their systems.

      C//
    • That's right because people aren't dying every day because of terrorist activities. We're kind of blessed right now because we are fighting a war in Iraq, so the main focus is in Iraq. But all those deaths could be anywhere. No one seems to care when a couple innocent Israelis die by a person blowing themselves up yet the scream bloody murder when the Israelis respond to it. We've had numerous attacks in Europe.

      Yeah terrorism isn't a real threat, because no one dies in America because of it. Except the
  • by ettlz ( 639203 ) on Sunday June 24, 2007 @07:56AM (#19627103) Journal
    In 2007, cyberwar was beginning.
    • Re: (Score:2, Funny)

      by Anonymous Coward
      What happen?
      Somebody set us up teh hax!
  • always a war (Score:5, Insightful)

    by had3z ( 1064548 ) on Sunday June 24, 2007 @08:01AM (#19627121) Homepage
    Why is it that america is always preparing for a war? a war on 'terrer', a cyberwar, a war on drugs, a war on immigrants, a war on pirates, a war on guns. When is the last time america made peace?
    I guess big budgets need big reasons
    • This really isn't anything like those other "wars" though in that there will probably be nothing actively done in this case. It's a popular thing right now in the corporate world right now as well as the government - worst case scenario disaster planning. What you do is you call a meeting, and you pull in members from your various technical teams, and then you ask a roomful of developers and IT staff what their plan is in case - oh, I don't know, there's a global pandemic next week, or a terrorist blows u
    • by suv4x4 ( 956391 ) on Sunday June 24, 2007 @08:41AM (#19627287)
      Why is it that america is always preparing for a war? a war on 'terrer', a cyberwar, a war on drugs, a war on immigrants, a war on pirates, a war on guns. When is the last time america made peace?

      Amen. Let's declare war on war!
      • OK, let's just cut the bullshit and declare

        War On WOW

        where WOW, of course, stands for War On WOW.

    • by Guppy06 ( 410832 )
      "When is the last time america made peace?"

      1919. Didn't work out so well.
    • Why is it that america is always preparing for a war?
      Because it's a neat way to get around the freedoms and protections afforded to the populace.

      People understand that in war it's necessary to restrict what people may normally do, in order to "win". Theoretically, once the war is over, the old freedoms can be restored.
      In practice, there are so many rules, laws and protections in place that it's impossible for a government to obey them all and still enact all the dodgy deals that they, and their friend

    • Re: (Score:2, Funny)

      by aepervius ( 535155 )
      You forgot the war on "tities". Seeing the great scandal that a breast on TV can generate, I would not be surprised that there is a big need to have some vent to let out the frustration. Since you can't have sex, then you have got to have wars, lot of them.

      Maybe we in the EU should organize a USA-thon ? I propose that we get big transport plane full of penthouse, playboy, maxim, german porn , a few fetish and silicon "realistic" sex doll, then we air drop the whole on washington. While everybody is occupye
    • Re:always a war (Score:5, Insightful)

      by GooberToo ( 74388 ) on Sunday June 24, 2007 @11:27AM (#19628033)
      Why is it that america is always preparing for a war?

      Um...perhaps because it's the smart thing to do? Only an idiot wouldn't prepare.

      You see, any country that has two nickles to rub together makes preparations to keep their two nickles. The reason is simple. Someone with only one nickle or maybe someone with two nickles that would like to have four, may decide to come take your two nickles. So you have a choice. One, give your two nickles up tomorrow (it will happen), or be in a position where it will cost someone three nickles to take your two.

      Perhaps you've heard, "Hope for the best. Plan for the worst." Only an idiot running a country wouldn't do that.
      • Re: (Score:2, Insightful)

        by Anonymous Coward
        Of course, centralized power is what gives birth to war in the first place. Without a centralized power to plan and conduct war -- funded through coercive means -- how could war ever come to be? Individuals can form a militia (voluntarily-supported army) for purposes of self-defense, but never could a militia be used for offense, i.e. attacking peaceful groups of people. Who would pay for it? I sure wouldn't -- I'm a peaceful individual. You might find a few nutcases willing to go along, but an entire army?
      • by rhizome ( 115711 )
        So you have a choice. One, give your two nickles up tomorrow (it will happen), or be in a position where it will cost someone three nickles to take your two.

        Where's the part where you blow someone's house up because someone who lives there once wore a t-shirt with a picture of a nickel on it?
    • si vis pacem, parabellum
  • by zmollusc ( 763634 ) on Sunday June 24, 2007 @08:56AM (#19627361)
    Can we agree on a flag to wave so that, once the 3vi1 h4xx0rs have destroyed all the intarnets, we can signal to others in visual range 'willing to trade pr0n dvdroms via sneakernet'? Maybe any suitably encrusted piece of fabric?
  • Born to Lose (Score:5, Insightful)

    by Doc Ruby ( 173196 ) on Sunday June 24, 2007 @09:00AM (#19627369) Homepage Journal
    Every US "Cybersecurity Czar" [wikipedia.org] has quit in disgust. The Homeland Security agency can't even find someone to run the office [cybertelecom.org], because it's a total joke.

    Meanwhile, the US has already been under siege by China in a full-blown cyberwar [google.com] for several years.

    It's cheap to attack the US tech infrastructure, and expensive to defend against it. That's what asymmetric warfare [wikipedia.org], like terrorism, is all about. So 6 years into Bush's Terror War, and the government is still preparing to get started, while our enemies just surge around us.
  • Stupid-wordism (Score:2, Interesting)

    by SoapBox17 ( 1020345 )
    "Hactivist" is a perfectly cromulent word, right? No, not really. I really despise this weird need everyone has to create new words. He already have perfectly good words, like "hacker", "activist" and "loser kids who want to feel powerful." Why anyone felt the need to create another buzz word is beyond me. This one is going right on the top of my list [slashdot.org].
    • Of course, the term hactivist should really be used to describe people like RMS who use their hacking ability for social change in a constructive way. The article is really talking about cracktivists.
  • OK, there's defensive preparations and offensive preparations. I think it would be nice to know exactly how these guys are intending to fight (offence is the best form of defence?) such a war, before we all become collateral damage?
  • The summary says that Estonia wanted to "remove Soviet monuments", which is an excaggeration. The monument in question was moved to a less prominent place, which is kind of understandable since the Soviet era of Estonia isn't regarded much higher than, say the Nazi occupation of places like Denmark or The Netherlands ...

    The important thing to remember here is that the monument is still visible for those who wish to pay their respect to their ancestors. The monument is not, and never was, removed.
  • by allanc ( 25681 ) on Sunday June 24, 2007 @09:35AM (#19627503) Homepage
    Okay, this is serious, and the US could be in serious danger. Here's my plan for action to make sure we can come through a potential cyber-war victorious:

    1. "Security through Conformity": Standardize on exactly one platform. Make sure everyone in government is using it. That way, if we discover a gaping security hole in that platform, we only have to patch one type of system. Homogeneity is the key.
    2. We need to put our trust in professionals. That one platform should definitely be Microsoft Windows. Sure, having people from all over the world looking for bugs might be quicker and more effective, but that also means that people from all over the world have the potential to find a security hole, but we have no clear target to blame for that security hole. And don't forget that backdoor that was almost slipped into Linux (though, fortunately, caught before it got into source control because of all of the people able to look at it)! We wouldn't have to worry about that with Microsoft Windows
    3. Don't leave computer decisions in the hands of long-haired computer geeks who spend all day working with technology. They tend to have decidedly leftist--if not communist!--leanings. All IT decisions for the US government should be made by the people best qualified to make them: Career bureaucrats.
  • by 3seas ( 184403 ) on Sunday June 24, 2007 @09:42AM (#19627543) Homepage Journal
    ....virtual goods.

    They can use the virtual taxes to pay for the virtual war (cyberwar) defense.

    http://politics.slashdot.org/article.pl?sid=07/06/ 23/2055244 [slashdot.org]
  • by gumpish ( 682245 ) on Sunday June 24, 2007 @09:48AM (#19627575) Journal
    Can't they call it "Digital Warfare" or "Internet Warfare"?

    "Cyber" is so 1990's... anything that inserts it into the language more often is a nuisance. Can you imagine if it gradually became a synonym for "good"?

    Dude, that pizza was totally cyber!

    Ugh...
    • Can't they call it "Digital Warfare" or "Internet Warfare"?

      EMP devices and van-eck phreaking devices aren't necessarily either 'Digital' or 'Internet', although they would both be important tactical weapons in cyber warfare. There's an analog component to Cyberwarfare which 'cyber' refers to, whereas 'digital' and 'internet' do not. 'Cyber' originally was a term used to refers to systems and control theory, ala cybernetics. Thus, a hydroelectric dam or nuclear powerstation both have 'cyber' systems, u
  • you know how linux doesn't suffer the windows viruses or the BSD system doesn't suffer linux holes?

    Well its all about uniqueness. If ever computer ran a different operating system with different....whatever protocals..

    Of course this is not realistic, or is it? Lets say the linux open source system could be compiled with something like an encription code that alters the system enough to make it unique. Any applications to run on that particular system would as well need to be compiled with the same code, etc
    • 1) It's not all about uniqueness. While having a heterogeneous environment can help security, it's not the end-all, be-all. What makes Linux/BSD and various other open source projects secure is the fact that people are constantly reviewing the code so if a vulnerability is found, it can be patched quickly. It also helps that the whole security model on Unix and Unix like systems is more secure than Windows. Is any functional system perfectly secure? No, but some are better than others.

      2) The idea of usi
  • Just fix the darn protocols, dammit. It's been a year [washingtonpost.com] since Blue Security was taken down by PharmaMaster and NOBODY has done ANYTHING to prevent any subsequent DNS amplification attacks [securiteam.com] from happening.

    If ISPs at least blocked forged-ip packets from exiting them, then THAT would be a nice start.

  • There's no way in hell the US is equipped* to deal with 'cyberwar', let alone the government. What do they plan to do to "knock them out in the first round"?; make sure that Norton is running and that they have the latest service packs installed? Most people have no idea what they are up against with computer security. Unless they can find it at Walmart, it doesn't exist. A lot like to pass the buck too: "Why didn't microsoft protect me from this?" "Why can my ISP let this happen"?, "Do I really have
  • Sorry in advance if I am going a little off topic here, but I think that economic wars will define the future.

    In the best of future worlds, governments will compete with each other for skilled workers and investment based on how well they can provide: a low tax base, control of local violence, educational infrastructure, effective markets and trading partners, etc.

    The problem that I see for the USA (my country), the UK, and a few others is that they spend so much on "defense" that they will not be able to c
  • by AB3A ( 192265 ) on Sunday June 24, 2007 @12:05PM (#19628265) Homepage Journal
    I am a registered professional controls engineer. I design and manage a large SCADA system. I'm also a member of the SP-99 standards committee (the ISA standard for industrial control system security).

    Industrial Control System Security is the subject of many books (with many more on the way), security committees, and even pending regulation. I could spend a long time trying to explain why things are the way they are. Here's an overview of the issue:

    1) SCADA systems started out in isolation. Most were never designed for internet access and many were designed without any thought to security because there is a more important concern: Reliability and performance.

    2) Office folks got wind of what information could be had from SCADA systems and the next thing that happened were a mass of people clamoring for the data. However, very few gave much thought to how that data could be extracted securely without affecting the reliability or performance of the system. As a result, there are many security compromises.

    3) It's not easy to retrofit security in to an existing SCADA system. It would be like putting seat belts and air-bags on a Ford Model T. Such measures will help, but what is really needed is a re-engineering of the whole system.

    4) Many of the protocols we use every day live in carefully validated embedded systems. You can't just "update" them without digging in to a morass of other embedded systems issues, in addition to the protocol itself, you have issues of performance and expected behavior. For this reason, updates of embedded firmware are rare.

    5) SCADA systems live for a long time. Typical lifetimes are at least 10 years for the field devices and five years for the control room software and hardware. These configurations are carefully validated (a very tedious and expensive process), so companies are loath to upgrade them unless there is a very good reason to do so.

    I can go on, but that's should give you a taste of what the situation is.

    Now for the reality of interational red-teams. Yes, they exist. The US has them too. I don't design for a red team. First, that would require very frequent software upgrades, something which I've already explained is not feasible for most SCADA system operators. Second, we opt for defense in depth. We try to segment our systems so that they fail in to smaller peices which are semi-autonomous in themselves. They won't be as efficient, but they will continue to work. And finally, in case you hadn't noticed, we design our physical security to eliminate the casual vandal, not the determined para-military group. The cost of going fully secure is so high that nobody would be willing to pay for it.

    At the utility where I work, we keep our SCADA system carefully shielded behind firewalls. Yet many other SCADA system managers do not understand the security issues because they're not IT savvy. Conversely, most IT staffers in utilities and manufacturing companies do not understand what a SCADA really is and does. This is not just another app. The notion of a real time or even a near real time system is alien to most. Furthermore, there is no such thing as "rebooting" in this business. In most IT applications, restarting the application or rebooting the machine is routine. Not so in SCADA. If we restart, we often lose track of many critical on-going processses. You see in most IT applications, they are the whole system. With SCADA, there is a physical world of things going on with or without them. If you're not up and running all the time, you're probably going to miss something critical.

    Finally, opening dams by remote control isn't likely. We have dams where I work too. Even if we did open them by remote control (we open ours manually), the systems that we use are as far as possible from the internet, and even our office intranet. Yes, we can wash out parts of a town downstream if we're not careful. The operators of such dams are licensed and they must be very careful about how the
  • by VoidEngineer ( 633446 ) on Sunday June 24, 2007 @12:22PM (#19628369)
    Seems to me like we're heading towards some distinctly neuromantic and ghost-in-the-shellish conflict scenarios. Makes sense, considering all the recent technology advancements. Japan is busy at work making their first Mech prototypes, MIT is busy making invisibility cloaks, Van-Eck phreaking devices have been around for ages, and the Russia mafia seems to be busy writing custom viruses. The thing to remember is that a 'cyberwar' would *not* simply be conducted by script-kiddie hackers in their moms basements. Sure, you might have to deal with botnet DDOS attacks, but that's probably the least worrisome scenario. To use the Dam floodgate scenario, consider a sneakernet type attack, where a special-ops actually *applies for a job* at said energy company which runs said Dam floodgates, and moles their way past the firewalls, so they can install a custom one-time virus. Afterwords, they get a nice million dollar bounty from the sponsoring enemy state. That's the espionage scenario. There are others. Toss in some helicopters, invisibility cloaks, van-eck phreaking devices, and emp pulse generators, and you've got yourself an arguably new class of special-ops. You might say, 'yeah, US enemies aren't ever going to get helicopters and those kind of forces onto US soil, so the US only needs to concern itself with remote attacks.' Granted, the US still has a big advantage of being relatively isolated here in North America, but I'm not so convinced. We do have embassies, consulates, and business partnerns all over the world, and most all of them have VPN connections outside the US. Networks make distances less relevant, so we could simply be attacked at one of our embassies or consulates. But I digress. The idea that I'm trying to communicate here, is that a 'cyberwar' isn't necessarily all digital, just as a computer isn't all digital (keyboards and monitors are analog). As such, there will be a sneakernet and analog element to any such 'cyberwars', which will probably involve special-ops using the latest technology to tap into networks, nab passwords, and cover their tracks, *in conjunction* with the crackers doing the cracking. All nicely laid out in neuromancer and ghost-in-the-shell. The specifics differ, but the general concept is spot on in both works. At least in my opinion.
  • I have put up a site a few months ago to start to track cyberattack related news, events, etc. I plan to build it out as I get more information, right now it's fairly basic. However, I hope that it will help someone who is looking for info. Cyber Attack Information Center [cyberattack.info] -- podz
  • Hacking the Media (Score:3, Interesting)

    by Divebus ( 860563 ) on Sunday June 24, 2007 @01:38PM (#19628773)

    The Joker laughing out of every TV and Radio in Gotham city would be a powerful psychological win and a plausible goal for a determined enemy. What if part of a cyber war campaign was designed to replace Podcasts, Music streams, VOD Movie services, CNN Video or any internet delivered media with a message from our enemy? Could they commandeer Internet connected set-top boxes deployed by Cable providers and replace what we see and hear?

    I was approached by some people recently who wanted to know exactly how someone could pull that off. By "some people", I mean someone who works with an unnamed National Security Agency of sorts. I shrugged it off at first, then thought of the potential impact. Eek. Does anyone in the media business even anticipate or have a strategy for combating such an attack?

  • Under cyberattack? Disconnect from the network at large. Is that too hard? If a system of national importance hasn't been designed to allow for operation while disconnected from the network, then that system needs to be redesigned.

    Most of this cyberwar bullshit is just that: bullshit. It's a way for the Pentagon to funnel money to private interests without any meaningful oversight, since most of these programs are classified. They won't talk about it in public, so how is the public supposed to judge th
  • Wasn't Enron a cyberwar? According to the documentary "The Smartest Men in the Room," Enron employees shut down California power plants with direct phone calls, and monitored the price increase with their stockbroker software.

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...