Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

SCADA vs. the hackers [Can freebie software and a can of Pringles bring down the U.S. power grid?]
http://www.memagazine.org/backissues/dec02/features/scadavs/scadavs.html ^ | Alan S. Brown

Posted on 08/14/2003 8:11:00 PM PDT by StatesEnemy

As far as we know, no one has ever deliberately hacked into the U.S. electrical grid and pulled the plug on millions or even thousands of people. Just as on Sept. 10, 2001, no one had ever deliberately crashed a jet airliner into a skyscraper.

Is the power grid vulnerable to cyberattack? What about natural gas pipelines, nuclear plants, and water systems? Or refineries and other industrial facilities that run on similar Internet-enabled digital control systems? Could a terrorist or disgruntled employee cause lethal accidents and millions of dollars of damage? What about a bored 14-year-old?

"Are we vulnerable?" asked Joseph Weiss, executive consultant for KEMA Consulting, which is based in Fairfax, Va. "Of course, we are. We designed ourselves that way."

None of the industrial control systems used to monitor and operate the nation's utilities and factories were designed with security in mind. Moreover, their very nature makes them difficult to secure. Linking them to networks and the public Internet only makes them harder to protect.

Wireless Intrusion

Paul Blomgren, manager of sales engineering at cyber- security firm Rainbow Mykotronx in Torrance, Calif., measures control system vulnerabilities. Last year, his company assessed a large southwestern utility that serves about four million customers.

"Our people drove to a remote substation," he recalled. "Without leaving their vehicle, they noticed a wireless network antenna. They plugged in their wireless LAN cards, fired up their notebook computers, and connected to the system within five minutes because it wasn't using passwords.

"Within 10 minutes, they had mapped every piece of equipment in the facility," Blomgren said. "Within 15 minutes, they mapped every piece of equipment in the operational control network. Within 20 minutes, they were talking to the business network and had pulled off several business reports. They never even left the vehicle."

Blomgren, of course, is a professional with a professional's tools. But Eric Byres, research manager at the Internet Engineering Laboratory of the British Columbia Institute of Technology in Burnaby, maintains that any hacker could achieve similar results—with free software off the Internet and a can of Pringles.

Wireless systems are especially vulnerable to attack, Byres said. He cited as an example a petrochemical plant that he just finished assessing. "They had an overflow pond that wound around the plant site and wanted to put sensors on it, but they were worried that if they ran fiber, someone might dig it up," he said. "So they put in a wireless system."

Because the wireless system was part of the plant network, information technology engineers assumed the firewall would protect it from unauthorized access. That was not the case. Because they thought they were secure, they never even turned on the wireless transmitters' security features. Byres said that many information technology, or IT, professionals don't even know these options exist.

(Excerpt) Read more at memagazine.org ...


TOPICS: News/Current Events
KEYWORDS: blackout; hackers; itreallyhappens; nationalsecurity; powergrids; scada; terrorism
Navigation: use the links below to view more comments.
first 1-2021-4041-44 next last
Our government is failing to protect us.
1 posted on 08/14/2003 8:11:00 PM PDT by StatesEnemy
[ Post Reply | Private Reply | View Replies]

To: StatesEnemy
Be sure to remove the contents of the Pringles can first.
2 posted on 08/14/2003 8:18:59 PM PDT by Fifth Business
[ Post Reply | Private Reply | To 1 | View Replies]

To: StatesEnemy
Pringles?

Nah it's those Cheese Doodles.

You should start paying more attention.

Ask for a cookie.

3 posted on 08/14/2003 8:19:54 PM PDT by smoothsailing
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fifth Business
Well, only if you want the data un-enchipted
4 posted on 08/14/2003 8:20:16 PM PDT by StatesEnemy
[ Post Reply | Private Reply | To 2 | View Replies]

This is really irresponsible... now we're supposed to fear wifi? Because somebody MIGHT do something bad?

The world is full of useful tools that can be used to do bad things.Even a hammer or screewdrive is dangerous in the wrong hands.

Someone forgot to put on his tin foil hat.
5 posted on 08/14/2003 8:20:42 PM PDT by shadowman99
[ Post Reply | Private Reply | To 1 | View Replies]

To: StatesEnemy
I would defintely not discount this at this point. We've now heard a number of bogus suspected root causes and all of them have been shot down. The fact that we still apparently cannot trace the point of origin suggests strongly that a multipoint failure may have occured. Now, what would be capable of causing a multipoint failure?
6 posted on 08/14/2003 8:22:15 PM PDT by GOP_1900AD (Un-PC even to "Conservatives!" - Right makes right)
[ Post Reply | Private Reply | To 1 | View Replies]

To: StatesEnemy
The problem isn't the 14 year olds who cobble together a YAGI out of a pringles can and some nuts and bolts. It's the dumb-ass admins who won't even bother to turn on the security features in their hardware or setting permissions in their networks and software. Terrorists like to blow things up, not dig around in a petrochemicals payroll system.
7 posted on 08/14/2003 8:22:33 PM PDT by Orangedog (Soccer-Moms are the biggest threat to your freedoms and the republic !)
[ Post Reply | Private Reply | To 1 | View Replies]

To: StatesEnemy
Well, only if you want the data un-enchipted

Ouch! Good one!

8 posted on 08/14/2003 8:22:35 PM PDT by Fifth Business
[ Post Reply | Private Reply | To 4 | View Replies]

To: StatesEnemy
The socialist at SCADA is doing enough of a job at turning the country in a tyranny all by themselves.
9 posted on 08/14/2003 8:23:00 PM PDT by Paul C. Jesup
[ Post Reply | Private Reply | To 1 | View Replies]

To: StatesEnemy
Our government is failing to protect us.
Or our failed protectors govern us not wisely but too well.

We need to protect ourselves.

... from ourselves, mostly.
10 posted on 08/14/2003 8:23:02 PM PDT by Asclepius (karma vigilante)
[ Post Reply | Private Reply | To 1 | View Replies]

To: StatesEnemy
The socialists at SCADA is doing enough of a job at turning the country in a tyranny all by themselves.
11 posted on 08/14/2003 8:23:10 PM PDT by Paul C. Jesup
[ Post Reply | Private Reply | To 1 | View Replies]

To: shadowman99
This is really irresponsible... now we're supposed to fear wifi?

No... we should be aware of the vulnerability of allowing sensitive systems to be broadcasting unsecured on WiFi.

Surely this is common sense - not hyperbolic hand-wringing.

12 posted on 08/14/2003 8:25:38 PM PDT by StatesEnemy
[ Post Reply | Private Reply | To 5 | View Replies]

To: shadowman99
This is really irresponsible... now we're supposed to fear wifi? Because somebody MIGHT do something bad?

I don't think it is irresponsible. WAPs are proliferating and extremely tempting to hackers. They are instant access to an internal network with no firewall protection. Furthermore, they are often installed by ordinary computer users with no encryption, creating a major security risk.

13 posted on 08/14/2003 8:26:43 PM PDT by Fifth Business
[ Post Reply | Private Reply | To 5 | View Replies]

To: Orangedog
Terrorists like to blow things up, not dig around in a petrochemicals payroll system.
Students of Chairman Mao's notion of the soft strike (to degrade as opposed to destroying hostile systems), an interpretation of passages from Sun Tzu, excepted.
14 posted on 08/14/2003 8:28:07 PM PDT by Asclepius (karma vigilante)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Fifth Business
Glad you could appreciate...

Humor is the only proof of sanity these days.

15 posted on 08/14/2003 8:28:57 PM PDT by StatesEnemy
[ Post Reply | Private Reply | To 8 | View Replies]

To: smoothsailing
Re: “None of the industrial control systems used to monitor and operate the nation's utilities and factories were designed with security in mind. Moreover, their very nature makes them difficult to secure. Linking them to networks and the public Internet only makes them harder to protect. “ None? Pure B.S. we do not connect our IT network to plant control systems period. No connections make it damn hard for a virus or hacker to access. I guess the fact that plant control computers are kept it locked rooms with discrete terminal access, and limiting what functions can be performed from what terminals doesn’t count as security.
16 posted on 08/14/2003 8:30:11 PM PDT by TheFrog
[ Post Reply | Private Reply | To 3 | View Replies]

To: Paul C. Jesup
Is SCADA one of them "what is is" places?

Honestly, I do not know.

17 posted on 08/14/2003 8:33:22 PM PDT by smoothsailing
[ Post Reply | Private Reply | To 11 | View Replies]

To: StatesEnemy
Here's another little tidbit for the digestive tract.
18 posted on 08/14/2003 8:34:37 PM PDT by StatesEnemy
[ Post Reply | Private Reply | To 1 | View Replies]

To: StatesEnemy
Our government is failing to protect us.

B.S., obviously the author of this piece of crap has not done his research, or has no contacts to get correct information. Yes, most large companies, utilities included are on the internet, but NOT the computers that run their vital systems!! SHEESH!

19 posted on 08/14/2003 8:36:13 PM PDT by blondee123
[ Post Reply | Private Reply | To 1 | View Replies]

To: StatesEnemy
Try this on for size:

Gun-grabbers use this kind of fear, uncertainty and doubt to pass bad laws that restrict your freedom to defend yourself.

Guns do not kill people. People kill people, the gun is the tool.

This article describes common network administration and system diagnostic tools, installed on a portable system. Tools. In this case they may be abused.

Then again perhaps not... "War driving" is a practice of mapping wireless access points There are benign reasons one might do this, just like there could be malicious.

In some cities there are grass roots efforts to esablish free and legal internet over 802.11. To connect, you just need to find the nearest access point. You might use a setup descibed above to get connected. These people even use the pringles can trick. And national security is not at risk. Just communication monopolies.

Remember kids: computers don't hack computers. People hack computers.
20 posted on 08/14/2003 8:38:02 PM PDT by shadowman99
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-44 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson