Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: FairOpinion; wirestripper
Along the same lines, I found an astonishing amount of information regarding cyberterrorism; and more specifically, the nations' power grids.

It was interesting, thought I'd share it.

There are two fundamental ways for terrorists to disrupt a power grid: a physical attack or an internet based cyber attack.

"The event I fear most is a physical attack in conjunction with a successful cyber-attack on the responders' 911 system or on the power grid," Ronald Dick, director of the FBI's National Infrastructure Protection Center

Power grid control systems, meanwhile, are vulnerable to computer hackers.

A National Security Agency mock attack on systems that control the power grid in the late 1990s found that a cyber attack could bring down the grid.

Could cyberterrorists really take control of a dam or a power plant
46 posted on 08/14/2003 9:52:55 PM PDT by Sweet_Sunflower29 (Since 2002-05-19)
[ Post Reply | Private Reply | To 43 | View Replies ]


To: Sweet_Sunflower29
Correct Link (duh):

Power grid control systems, meanwhile, are vulnerable to computer hackers
47 posted on 08/14/2003 9:54:56 PM PDT by Sweet_Sunflower29 (Since 2002-05-19)
[ Post Reply | Private Reply | To 46 | View Replies ]

To: Sweet_Sunflower29
Thanks for the collection of links.

Yes, I think it would be (was?) only too easy for them.
In your second link it says they actually found an AQ computer which showed they were working on such things:

"One al Qaeda laptop found in Afghanistan, sources said, had made multiple visits to a French site run by the Societé Anonyme, or Anonymous Society. The site offers a two-volume online "Sabotage Handbook" with sections on tools of the trade, planning a hit, switch gear and instrumentation, anti-surveillance methods and advanced techniques. In Islamic chat rooms, other computers linked to al Qaeda had access to "cracking" tools used to search out networked computers, scan for security flaws and exploit them to gain entry -- or full command.

Most significantly, perhaps, U.S. investigators have found evidence in the logs that mark a browser's path through the Internet that al Qaeda operators spent time on sites that offer software and programming instructions for the digital switches that run power, water, transport and communications grids. In some interrogations, the most recent of which was reported to policymakers last week, al Qaeda prisoners have described intentions, in general terms, to use those tools."

48 posted on 08/14/2003 10:01:27 PM PDT by FairOpinion
[ Post Reply | Private Reply | To 46 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson