Free Republic
Browse · Search
News/Activism
Topics · Post Article

This is a Washington Post article, click here to read it in full.

Warning: It's VERY long.

1 posted on 06/26/2002 3:56:37 PM PDT by Timesink
[ Post Reply | Private Reply | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-26 next last
To: Admin Moderator
Can moderators fix the "Author" field in article postings? I screwed this one up. Author is one Barton Gellman.

Thanks!

2 posted on 06/26/2002 3:57:47 PM PDT by Timesink
[ Post Reply | Private Reply | To 1 | View Replies ]

Thurs., 11 a.m. EDT: Washington Post reporter Barton Gellman will be online to discuss this story.
3 posted on 06/26/2002 4:00:27 PM PDT by Timesink
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
Because the digital controls were not designed with public access in mind, they typically lack even rudimentary security, with fewer safeguards than the purchase of flowers online

I have a marketing idea for the credit card companies. Facilitate putting security on such systems by wrapping them in a plain old e-commerce web front end. Then allow operators to log in using their credit cards. Charge the card, say, a nickel for each access. This way, all access is tracked by the credit card infrastructure. For discussion.

4 posted on 06/26/2002 4:05:25 PM PDT by old-ager
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
If rthe jihadists are first destroyed, they can't carry out there nefarious plans! wake up America!
5 posted on 06/26/2002 4:10:24 PM PDT by sheik yerbouty
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
Counterterrorist analysts have known for years that al Qaeda prepares for attacks with elaborate "targeting packages" of photographs and notes.

We keep reading about 'visitors' seen taking photos of water installations, etc. Yet nothing is do since they are on 'vacation'.

Time to shoot first and ask questions later.

8 posted on 06/26/2002 4:22:50 PM PDT by Lockbox
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
Timely, very timely. What can be done in this way is sort of mindboggling, if you pay some attention.

Goes far beyond the article and what they refer the intruders having looked at.

9 posted on 06/26/2002 4:23:25 PM PDT by Cachelot
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
Some people here must get an orgasmic high out of being afraid of claptrap that shows up in newspapers. Maybe if they're lucky, there'll be another asteroid on a collision course with Earth when CNN comes to terms with the arrival of another hot, dull August.
10 posted on 06/26/2002 4:34:40 PM PDT by dr_who
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
Fascinating article; thanks for posting it.

Seems to me we have to take these devices off the Internet without further delay. Either that or use iron-clad authentication protocols.

The use of cryptographic certificates for control of devices would probably solve this problem at reasonable cost.

D

12 posted on 06/26/2002 4:38:35 PM PDT by daviddennis
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
I've been very puzzled why the terrorists haven't striven to do this type of thing. The only explanation I can come up with is they're idiots with a wanton lust for blood and killing. As the Devil's Advocate for a moment, sure, spectacular attacks on citizenry, military, and property look pretty impressive on television and I suppose if I were waging a terroristic war against an entire culture I would include them in my plans. But, really, these type (bloody) attacks serve to unite and strengthen the resolve of the people you attack and in that sense they are counterproductive.

A long, drawn out guerrilla war where the attacks were targeted at the infrastructure of the culture would be much more effective even if they weren't "sexy" to potential recruits. Just slowly bleed the culture's economy to death- this so called 'death from a thousand cuts'. Some items I would try to accomplish if I were in their shoes:

These things and many more I would've expected the terrorists to do. Just general disruption of our way of life. It would be very costly monetarily- for the victim and would be generally low risks for the organization carrying these things out. I mean you could do a lot of damage to a smaller community by simply setting the local factory or mill on fire- putting a major employer out of action. There's no way a nation's security apparutus could successfully defend every single target in addition to guarding nuke plants, airports, water supplies etc etc. Maybe they are just stupid and stuck in a Middle Ages type mentality. But if you successfully attack and disrupt an enemies supply/support lines- you will eventually defeat him and I suppose I'm glad they have this mentality.

14 posted on 06/26/2002 4:48:55 PM PDT by Prodigal Son
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
Instead of going for a direct attack, the terrorists could do something like find a hacker with a bunch of credit card numbers (like that one that supposedly had 300k of them from CD Universe) and publish them on the web. Pretty soon every krad d00d and his brother will try and use them, clogging up Visa's and MC's computers with bogus entries. Merchants will be leary of accepting any credit card. yada yada yada
18 posted on 06/26/2002 5:08:17 PM PDT by lelio
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
I haven't read the full article yet, although I will shortly. My initial reaction is that al-Qaida isn't this sophisticated.

They certainly didn't include computer courses at their training camps in Afghanistan. That's not to say that we aren't vulnerable at these spots or that terrorists won't eventually develop the expertise to attack us using cyberwarfare.

But this enemy hasn't proven themselves to be terribly sophisticated yet. They are bold, and imaginative. They are cruel and evil. But brainiacs? I don't think so.

20 posted on 06/26/2002 5:21:03 PM PDT by Dog Gone
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
I'm sorry, in my opinion as an engineer this is just baseless hysteria on the part of the WP. Purely the kind of crap that sells papers and nothing else.
23 posted on 06/26/2002 5:38:53 PM PDT by snopercod
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
They keep letting these people in on student visas to learn all about America and how it's systems work.
Who's in charge of this country, anyway?
Makes me wonder whether they really want to stop the terrorist. They don't seem to be trying very hard at all. They just keep opening the door for them.
I don't understand the logic.
25 posted on 06/26/2002 5:55:06 PM PDT by concerned about politics
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
By disabling or taking command of floodgates in a dam, for example, or of substations handling 300,000 volts of electric power

Any idiot who hooks up either of those vital systems to any other system connected to the Internet deserves to be shot.
27 posted on 06/26/2002 6:06:04 PM PDT by Bush2000
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
What we are doing to overcome our fears and taking charge of the terrorist situation is the BIG story!

30 posted on 06/26/2002 6:20:44 PM PDT by Cindy
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
Wow. That was long but worth the read. Scary, very scary.
33 posted on 06/26/2002 6:53:17 PM PDT by snippy_about_it
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
This is baloney. Communication networks do have flaws, and the flaws can be exploited. But communication networks are not monolithic: different vendors' equipment have different flaws. It would be devilishly hard to mount an attack on a sufficient number of vulnerabilities at the same time. Our NSA might be able to bring down communications in, say, Iraq. But Al Quaida has no practical chance of causing more than one or two U.S. networks to have a temporary outage. Europe's Internet certainly did not fail when KPNQuest was unplugged. If we can survive Bernie Ebbers, Al Quaida hAx0rz have no chance.

What this is is a distraction from serious vulnerabilities like a bioweapon attack or a SAM attack on airliners.

42 posted on 06/26/2002 9:23:40 PM PDT by eno_
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
Oh, and the thing about ASN.1 is just plain laughable and shows what fools the reporters are for letting themselves get spun that way. You could no more bring down a network with ASN.1 than you could a UNIX system with a bootleg copy of yacc.
43 posted on 06/26/2002 9:26:00 PM PDT by eno_
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Timesink
Just a few things to share with this thread, since it seems relevant...

My company manufactures control/telemetry equipment for municipal utilities, and we also author a great deal of firmware/software for this equipment. We have been very tuned into the security aspects of these control systems for years now. As you can imagine, we are focused upon this more now than ever.

Have suspicious arabs shown an interest in these systems? Yes. Homeland Security had heard of some inquiries, and they sent us a fax this past winter to be on guard. Also, our company was approached once. A few years ago, a saudi requested detailed information on our control system via email; and we responded with the standard brochures (nothing sensitive). Didn't think much about it at the time, and deleted the email long ago. Also, he didn't like my "foreign business policy"... foreigners pay in advance :-)

This summer, we also observed a man making inquiries to an internet programmers newsgroup targeted toward web server programmers/administrators on Windows platforms. All of his requests focused on finding ways to break into web servers such as Apache, IIS, and Netscape. It became very apparant when looking at all of his posts as a whole. We found that his ip address is in the united arab emirates, and then we notified the FBI with the info. (don't know if they pursued it further.)

Do I think they will hit our water and power supplies? Not really. I have yet to see them take any action which is not based upon killing a lot of people.

Shutting down computerized water pumping stations will not even run people out of water. First, most water systems have a large amount of pressurized storage (water up in the water towers). Second, every piece of industrial equipment that I have ever seen always has "manual" controls in addition to the computers. Could they poison a water supply? Does anyone know how much poison it would take to overcome the dillution of 10's of millions of gallons in a water system? Not likely to happen. Anthrax in the water? The chlorine would kill it. Worst case scenario with water: some people get sick, no deaths. Best case scenario: alqaeda gets shot by the neighbor who lives next to the water tower.

Dam control system disruptions? The filling/emptying of a dam is a VERY slow control processes. "Manual" override would be instituted far in advance of any repercussions.

Power? Power is a lot more vulnerable, because there is no "storage" within the system (as with water). Even a short disruption would be noticed. And power is everything. Actually the best way to shut down a water system is to shut down its power. And why attack the power grid control computers, when much more lasting damage can be done through a physical attack? (Look at what we did to the power system in Yugoslavia). However, although a power shutdown would be pretty darned inconvenient, I still don't see how it is going to kill Americans.

In summary... I don't see alqaeda pursuing this computer hacking angle, because it doesn't kill anybody. These guys are all about killing.

ps. This is just my educated opinion. I'm sure there are smart people who would disagree.... and sorry about the long post. Usually I specialize in short, smartass comments. :-)

44 posted on 06/26/2002 9:33:44 PM PDT by TheEngineer
[ Post Reply | Private Reply | To 1 | View Replies ]

To: *AirSec_List; *Bush Doctrine Unfold; *Clash of Civilizatio; *Computer Security In; ...
late night bump and adding to bump lists
47 posted on 06/26/2002 9:57:27 PM PDT by Timesink
[ Post Reply | Private Reply | To 1 | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-26 next last

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson