Posted on 01/23/2003 10:54:14 PM PST by lewislynn
ThomasRegional.com | ® | Industrial Market Trends |
U.S. Power Grid Vulnerable to Cyberattacks
And this vulnerability is widespreadfrom natural gas pipelines to nuclear plants and water systems. The countrys utilities and factories all run on similar industrial control systems, none of which were designed with security as a consideration. Whats more, their very architecture makes them hard to protect. And connecting them to networks and the Internet has made them all the more vulnerable.
Take one large southwestern utility with about four million customers, for example. Its control systems weaknesses were almost immediately apparent, says Paul Blomgren, manager of sales engineering at California-based cyber-security firm Rainbow Mykotronx.
Our people drove to a remote substation, recounts Blomgren. Without leaving their vehicle, they noticed a wireless network antenna. They plugged in their wireless LAN cards, fired up their notebook computers, and connected to the system within five minutes because it wasnt using passwords.
Within 10 minutes, they had mapped every piece of equipment in the facility, says Blomgren. Within 15 minutes, they mapped every piece of equipment in the operational control network. Within 20 minutes, they were talking to the business network and had pulled off several business reports. They never even left the vehicle.
And you dont even have to be a professional to pull off this kind of security breach, says Eric Byres, research manager at the Internet Engineering Laboratory of the British Columbia Institute of Technology in Burnaby. He says any hacker can do it with software you can download from the Internet for free and a can of Pringles.
Wireless systems are very susceptible, says Byres, especially because many IT professionals are unaware of wireless transmitters security features and thus, dont even activate them.
As a result, any person driving by could access the wireless traffic with a laptop PC, a $60 wireless network card and a directional antenna, which can be fashioned from a can of Pringles. And if you dont know how to make this antenna, all you have to do is go online to Google and type in Pringles antenna and about 400 web sites will come up, many featuring instructions, pictures and even videos.
Next, with readily available free software such as AirSnort and NetStumbler, hackers can decipher wireless codes within 15 minutes. Then once they snag the wireless encryption key, they can eavesdrop on the network, using a freebie protocol analyzer such as Ethereal or Sniffit. They will listen until a maintenance engineer signs onto a PLC, says Byres. A PLC is a programmable logic controller, which manages a facilitys sensors and actuators.
Heres where human engineering comes in, says Byres. No one likes to have 20 different passwords, so the password for this PLC is probably the password for the other PLCs and the Windows server as well. Now they have the password to your secure systems and networks.
Industrial control systems lag behind business networks and the Internet in developing ways to track intruders. One single standard, IEEE 802.11b is used by all wireless transmitters, and it easily succumbs to security breaches, says Byres.
To fix this problem, the Institute of Electrical and Electronics Engineers is currently reworking its standard. And vendors have created software that circumvents 802.11bs weaknesses. In addition, developers are trying to implement conventional network security measures on industrial control systems.
It hasnt been easy, however. PLCs, digital control systems, and supervisory control and data acquisition (SCADA) systems were designed under two assumptions, says Joseph Weiss, executive consultant for Virginia-based KEMA Consulting. One, that they would work in isolation, not linked to networks, and two, that they would only be accessed by authorized people.
Such assumptions sound quaint after 9/11, but they started to be impractical even before that day. Downsizing was the culprit. Utilities and corporations yanked employees and put automated control systems at substations, pipeline switches and plants instead. As a result, many utilities today oversee numerous facilities and thousands of operations over SCADA networks connected to a central control room.
And to make matters worse, companies rejected costly private telecommunications links and instead chose the Internet to carry SCADA traffic. In fact, almost all remote terminal units, which manage a facilitys automated field devices, and control systems are now Web- or network-enabled, says Weiss.
Vendors conduct remote diagnostics or upload software updates over phone lines. That means hackers can get in, too, locating modems by dialing phone numbers sequentially until one picks up. If they are able to access a device on the network, they can layout the system and listen in for passwords. This backdoor imperils even those with solid network security.
To prevent this kind of intrusion, some facilities utilize a dial-back modem, but hackers have already found a way to defeat that, too, says Blomgren.
Indeed, to protect industrial control systems, operations people have to go beyond securing modems and implementing better password policies. They have to reconsider IT policy, says Byres. Standard IT policy is to lock down a console after someone makes three bad password attempts, he says. But what if someone made the mistakes because hes panicking that a recovery boiler is going through the roof?
To this end, the industry has started to work on procedures that are applicable to control systems. Also, several industry standards organizations, such as the IEEE and the International Electrotechnical Commission, have set up committees to tackle control system protection issues.
Another measure involves implementing a better encryption standard, which would require that a dedicated encryption device be placed between the SCADA remote terminal unit and the modem that connects it to the Internet. That way, even if a hacker does access the line, all he or she would hear would be scrambled information.
But encryption is not fail-safe, protecting wireless traffic from ill-intentioned outsiders but not from disgruntled insiders, or even drive-by hackers. And the Federal Bureau of Investigation has found that 70% of hacks are perpetrated by insiders.
Indeed, stronger IT policies and encryption are only initial steps. The industry must devote time and resources to security and consider such drastic measures as new technologies, new control systems or even, a completely different IT architecture.
Even more fundamentally, it must throw out its long-held belief of security through obscurity, which assumes that since nobody knows how its control system operates, its safe, says Blomgren.
In fact, the complete opposite is the case because the same SCADA systems that monitor the U.S. power grid also run the grids in Iraq, Saudi Arabia, Indonesia and Iran. Not surprisingly, SCADA documents were found in al Qaeda safe houses in Afghanistan.
And for now, even a Pringles can-wielding teenager with a wireless card and laptop can pose a danger to the U.S. power gridand all utility and industrial infrastructure.
Source: SCADA vs. the Hackers
Alan S. Brown
Mechanical Engineering, Dec. 2002
http://www.memagazine.org/
Gee, I haven't heard aanything about the power grid since Gary North and the massive Y2K hoax!
I received an e-mail regarding pulling this thread because it would give someone ideas...As if they didn't already have them.
The fact the article says you can make an antenna from a pringles can and use some software from the internet to do it means nothing to the person (like me) who doesn't know how to implement the plan...
However the person who does have the ambition to do it probably doesn't need the pringles can to begin with.
The article wasn't posted to instruct anyone on the how to's but rather to educate the public to the unknown vulnerability of ourselves and how easy it would be to happen....Maybe the power companies will get some heat.
No sense in pulling the thread. This stuff has been common knowledge for almost a year now. Cat's long out of the bag.
The fact the article says you can make an antenna from a pringles can and use some software from the internet to do it means nothing to the person (like me) who doesn't know how to implement the plan...
See WarDriving for more info. Besides, Trader Joe's coffee cans work much better than Pringles' cans.
However the person who does have the ambition to do it probably doesn't need the pringles can to begin with.
True. Also consider that the wireless networks are vulnerable only if they don't use encrypted pre-authentication that must be satisfied prior to getting network access. Consider also that these tricks work only on 2.4 gigahertz (GHz) wireless network hardware, whereas folks like myself are already using the 5 GHz range, which doesn't have as large of a spillover and handles much larger bandwidth.
The article wasn't posted to instruct anyone on the how to's but rather to educate the public to the unknown vulnerability of ourselves and how easy it would be to happen....Maybe the power companies will get some heat.
Call me a skeptic and a cynic, but I doubt it. I've seen power companies and the California Independent System Operator (ISO) get breached six ways to Sunday and they still don't have clue one about security.
Sorry if I seem a bit fiesty about all this. Computer and network security is my career. :)
-Jay
When Pringles are outlawed only outlaws will have Pringles
Calpowercrisis:
To find all articles tagged or indexed using Calpowercrisis, click below: | ||||
click here >>> | Calpowercrisis | <<< click here | ||
(To view all FR Bump Lists, click here) |
I'd like to think he would if he had a clue...but sadly.....
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.