Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

U.S. Power Grid Vulnerable to Cyberattacks...do it with (EZ to get) software and a can of Pringles

Posted on 01/23/2003 10:54:14 PM PST by lewislynn

ThomasRegional.com ®  Industrial Market Trends

U.S. Power Grid Vulnerable to Cyberattacks

It’s a frightening scenario—a hacker getting into the U.S. electrical grid to cut off millions of people—and it’s far from inconceivable. In fact, it’s easy for a terrorist, a vindictive employee or even a bored teenager to tap into and disrupt the control systems that operate industrial facilities.

And this vulnerability is widespread—from natural gas pipelines to nuclear plants and water systems. The country’s utilities and factories all run on similar industrial control systems, none of which were designed with security as a consideration. What’s more, their very architecture makes them hard to protect. And connecting them to networks and the Internet has made them all the more vulnerable.

Take one large southwestern utility with about four million customers, for example. Its control system’s weaknesses were almost immediately apparent, says Paul Blomgren, manager of sales engineering at California-based cyber-security firm Rainbow Mykotronx.

“Our people drove to a remote substation,” recounts Blomgren. “Without leaving their vehicle, they noticed a wireless network antenna. They plugged in their wireless LAN cards, fired up their notebook computers, and connected to the system within five minutes because it wasn’t using passwords.”

“Within 10 minutes, they had mapped every piece of equipment in the facility,” says Blomgren. “Within 15 minutes, they mapped every piece of equipment in the operational control network. Within 20 minutes, they were talking to the business network and had pulled off several business reports. They never even left the vehicle.”

And you don’t even have to be a professional to pull off this kind of security breach, says Eric Byres, research manager at the Internet Engineering Laboratory of the British Columbia Institute of Technology in Burnaby. He says any hacker can do it with software you can download from the Internet for free and a can of Pringles.

Wireless systems are very susceptible, says Byres, especially because many IT professionals are unaware of wireless transmitters’ security features and thus, don’t even activate them.

As a result, any person driving by could access the wireless traffic with a laptop PC, a $60 wireless network card and a directional antenna, which can be fashioned from a can of Pringles. And if you don’t know how to make this antenna, all you have to do is go online to Google and type in “Pringles antenna” and about 400 web sites will come up, many featuring instructions, pictures and even videos.

Next, with readily available free software such as AirSnort and NetStumbler, hackers can decipher wireless codes within 15 minutes. Then once they snag the wireless encryption key, they can eavesdrop on the network, using a freebie protocol analyzer such as Ethereal or Sniffit. “They will listen until a maintenance engineer signs onto a PLC,” says Byres. A PLC is a programmable logic controller, which manages a facility’s sensors and actuators.

“Here’s where human engineering comes in,” says Byres. “No one likes to have 20 different passwords, so the password for this PLC is probably the password for the other PLCs and the Windows server as well. Now they have the password to your secure systems and networks.”

Industrial control systems lag behind business networks and the Internet in developing ways to track intruders. One single standard, IEEE 802.11b is used by all wireless transmitters, and it easily succumbs to security breaches, says Byres.

To fix this problem, the Institute of Electrical and Electronics Engineers is currently reworking its standard. And vendors have created software that circumvents 802.11b’s weaknesses. In addition, developers are trying to implement conventional network security measures on industrial control systems.

It hasn’t been easy, however. PLCs, digital control systems, and supervisory control and data acquisition (SCADA) systems were designed under two assumptions, says Joseph Weiss, executive consultant for Virginia-based KEMA Consulting. One, that they would work in isolation, not linked to networks, and two, that they would only be accessed by authorized people.

Such assumptions sound quaint after 9/11, but they started to be impractical even before that day. Downsizing was the culprit. Utilities and corporations yanked employees and put automated control systems at substations, pipeline switches and plants instead. As a result, many utilities today oversee numerous facilities and thousands of operations over SCADA networks connected to a central control room.

And to make matters worse, companies rejected costly private telecommunications links and instead chose the Internet to carry SCADA traffic. In fact, almost all remote terminal units, which manage a facility’s automated field devices, and control systems are now Web- or network-enabled, says Weiss.

Vendors conduct remote diagnostics or upload software updates over phone lines. That means hackers can get in, too, locating modems by dialing phone numbers sequentially until one picks up. If they are able to access a device on the network, they can layout the system and listen in for passwords. This backdoor imperils even those with solid network security.

To prevent this kind of intrusion, some facilities utilize a dial-back modem, but hackers have already found a way to defeat that, too, says Blomgren.

Indeed, to protect industrial control systems, operations people have to go beyond securing modems and implementing better password policies. They have to reconsider IT policy, says Byres. “Standard IT policy is to lock down a console after someone makes three bad password attempts,” he says. “But what if someone made the mistakes because he’s panicking that a recovery boiler is going through the roof?”

To this end, the industry has started to work on procedures that are applicable to control systems. Also, several industry standards organizations, such as the IEEE and the International Electrotechnical Commission, have set up committees to tackle control system protection issues.

Another measure involves implementing a better encryption standard, which would require that a dedicated encryption device be placed between the SCADA remote terminal unit and the modem that connects it to the Internet. That way, even if a hacker does access the line, all he or she would hear would be scrambled information.

But encryption is not fail-safe, protecting wireless traffic from ill-intentioned outsiders but not from disgruntled insiders, or even drive-by hackers. And the Federal Bureau of Investigation has found that 70% of hacks are perpetrated by insiders.

Indeed, stronger IT policies and encryption are only initial steps. The industry must devote time and resources to security and consider such drastic measures as new technologies, new control systems or even, a completely different IT architecture.

Even more fundamentally, it must throw out its long-held belief of “security through obscurity,” which assumes that since nobody knows how its control system operates, it’s safe, says Blomgren.

In fact, the complete opposite is the case because the same SCADA systems that monitor the U.S. power grid also run the grids in Iraq, Saudi Arabia, Indonesia and Iran. Not surprisingly, SCADA documents were found in al Qaeda safe houses in Afghanistan.

And for now, even a Pringles can-wielding teenager with a wireless card and laptop can pose a danger to the U.S. power grid—and all utility and industrial infrastructure.

Source: SCADA vs. the Hackers
Alan S. Brown
Mechanical Engineering, Dec. 2002
http://www.memagazine.org/

 


TOPICS: Business/Economy; Crime/Corruption; Extended News
KEYWORDS: calpowercrisis; computersecurityin
Navigation: use the links below to view more comments.
first 1-2021-23 next last

1 posted on 01/23/2003 10:54:14 PM PST by lewislynn
[ Post Reply | Private Reply | View Replies]

Comment #2 Removed by Moderator

Comment #3 Removed by Moderator

To: lewislynn
Time to ban Pringles!
4 posted on 01/23/2003 11:06:40 PM PST by Iwentsouth
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #5 Removed by Moderator

To: lewislynn
Gee, I haven't heard aanything about the power grid since Gary North and the massive Y2K hoax!

6 posted on 01/23/2003 11:13:57 PM PST by ppaul
[ Post Reply | Private Reply | To 1 | View Replies]

To: seamole; Admin Moderator
No company should install a wireless LAN without understanding the consequences. But a power company...I'm surprised.

I received an e-mail regarding pulling this thread because it would give someone ideas...As if they didn't already have them.

The fact the article says you can make an antenna from a pringles can and use some software from the internet to do it means nothing to the person (like me) who doesn't know how to implement the plan...

However the person who does have the ambition to do it probably doesn't need the pringles can to begin with.

The article wasn't posted to instruct anyone on the how to's but rather to educate the public to the unknown vulnerability of ourselves and how easy it would be to happen....Maybe the power companies will get some heat.

7 posted on 01/23/2003 11:35:27 PM PST by lewislynn
[ Post Reply | Private Reply | To 2 | View Replies]

To: ChiComConservative
For only $99.95 I can sell you a device which will watch your incoming power lines for any insecure electrons that try to sneak by. On second thought, make that $199.95. I'm greedy.
8 posted on 01/23/2003 11:54:41 PM PST by per loin
[ Post Reply | Private Reply | To 5 | View Replies]

To: seamole
My take:

The Myth of Cyber-Terrorism

The hype doesn't help...it hurts.

-Jay

9 posted on 01/24/2003 12:30:14 AM PST by Jay D. Dyson
[ Post Reply | Private Reply | To 2 | View Replies]

To: lewislynn
I received an e-mail regarding pulling this thread because it would give someone ideas...As if they didn't already have them.

No sense in pulling the thread. This stuff has been common knowledge for almost a year now. Cat's long out of the bag.

The fact the article says you can make an antenna from a pringles can and use some software from the internet to do it means nothing to the person (like me) who doesn't know how to implement the plan...

See WarDriving for more info. Besides, Trader Joe's coffee cans work much better than Pringles' cans.

However the person who does have the ambition to do it probably doesn't need the pringles can to begin with.

True. Also consider that the wireless networks are vulnerable only if they don't use encrypted pre-authentication that must be satisfied prior to getting network access. Consider also that these tricks work only on 2.4 gigahertz (GHz) wireless network hardware, whereas folks like myself are already using the 5 GHz range, which doesn't have as large of a spillover and handles much larger bandwidth.

The article wasn't posted to instruct anyone on the how to's but rather to educate the public to the unknown vulnerability of ourselves and how easy it would be to happen....Maybe the power companies will get some heat.

Call me a skeptic and a cynic, but I doubt it. I've seen power companies and the California Independent System Operator (ISO) get breached six ways to Sunday and they still don't have clue one about security.

Sorry if I seem a bit fiesty about all this. Computer and network security is my career. :)

-Jay

10 posted on 01/24/2003 12:37:26 AM PST by Jay D. Dyson
[ Post Reply | Private Reply | To 7 | View Replies]

To: lewislynn
Power lines crossing remote areas are quite vulnerable.
If terrorists had the means to cut the wires at a number
of locations, the nation's entire grid could be shut down in seconds
and repairs would take days, at least. The disruption to the economy would be enormous and it would be very hard to prevent.
11 posted on 01/24/2003 12:38:19 AM PST by Fitzcarraldo
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jay D. Dyson
You are right. On the other hand, one man's nightmare scenario "It’s a frightening scenario—a hacker getting into the U.S. electrical grid to cut off millions of people.." frightens me not at all. The results would be trivial, unless, of course, a million people without working television went suddenly berserk at being cut off from the tube!
12 posted on 01/24/2003 2:16:55 AM PST by Iris7
[ Post Reply | Private Reply | To 10 | View Replies]

To: Iwentsouth
Time to ban Pringles!

When Pringles are outlawed only outlaws will have Pringles

13 posted on 01/24/2003 6:29:14 AM PST by Colorado Doug
[ Post Reply | Private Reply | To 4 | View Replies]

To: Jay D. Dyson
...Trader Joe's coffee cans work much better than Pringles' cans. But is the coffee any good? I've seen a (perhaps THE) packaging line for T.J.'s coffee, in South San Fransico. The cans are inverted, filled from the "bottom" as it were, then sealed with a metal band---but loosely enough, just enough, to let the CO2 (which freshly roasted coffee emits for about three days or so) escape. Otherwise, the "foil" rip-top, at the top end of the can, would bulge upwards like a balloon. The told me that using just the one old Burns Brothers "two-bagger" (300+ lb. batch) drum roaster, they could roast and package 15-20,000 lbs. in one day. Before one says, "that's a lot of coffee!", know that one "lot" of coffee, is in actuality, approx. 250 bags (green), or 37,500 lbs. I've never tried the coffee from T.J.'s... Some of it might be o.k., or even good, though all I've gotten so far in commentary from others, "in the know" about fine coffees, is "it's not very good". Send a reply privately, if any have opinions--- then I may go and try some myself.
14 posted on 01/24/2003 8:07:13 AM PST by 7MMmag
[ Post Reply | Private Reply | To 10 | View Replies]

To: lewislynn

15 posted on 01/24/2003 8:55:55 AM PST by martin gibson
[ Post Reply | Private Reply | To 1 | View Replies]

To: lewislynn
Hey, you gotta working link to the article?
16 posted on 01/24/2003 9:20:39 AM PST by ppaul
[ Post Reply | Private Reply | To 1 | View Replies]

To: seamole; *calpowercrisis; randita; SierraWasp; Carry_Okie; okie01; socal_parrot; snopercod; ...
Thanks for the ping!

Calpowercrisis:

To find all articles tagged or indexed using Calpowercrisis, click below:
  click here >>> Calpowercrisis <<< click here  
(To view all FR Bump Lists, click here)



17 posted on 01/24/2003 11:05:56 AM PST by Ernest_at_the_Beach (Impeach Gray Davis!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: lewislynn
Thanks for posting this, but I am sure that our esteemed Governor here in California would never let this happen!
18 posted on 01/24/2003 11:07:17 AM PST by Ernest_at_the_Beach (Impeach Gray Davis!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach
Thanks for posting this, but I am sure that our esteemed Governor here in California would never let this happen!

I'd like to think he would if he had a clue...but sadly.....

19 posted on 01/24/2003 3:29:04 PM PST by lewislynn
[ Post Reply | Private Reply | To 18 | View Replies]

To: ppaul
Hey, you gotta working link to the article?
20 posted on 01/24/2003 3:33:08 PM PST by lewislynn
[ Post Reply | Private Reply | To 16 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-23 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson