Chinese Researcher Says US Power Grid Is Vulnerable, Strategist Overreacts 203
An anonymous reader writes with a story about Wang Jianwei, a grad student in China who recently released a paper detailing a vulnerability in the US power grid. Despite the paper being rather typical for security research, its origin set off alarm bells for military strategist Larry M. Wortzel, who testified before Congress that the student was a threat, despite the fact that the published attack wasn't really feasible. Quoting:
"'We usually say "attack" so you can see what would happen,' [Wang] said. 'My emphasis is on how you can protect this. My goal is to find a solution to make the network safer and better protected.' And independent American scientists who read his paper said it was true: Mr. Wang's work was a conventional technical exercise that in no way could be used to take down a power grid. The difference between Mr. Wang's explanation and Mr. Wortzel’s conclusion is of more than academic interest. It shows that in an atmosphere already charged with hostility between the United States and China over cybersecurity issues, including large-scale attacks on computer networks, even a misunderstanding has the potential to escalate tension and set off an overreaction. 'Already people are interpreting this as demonstrating some kind of interest that China would have in disrupting the US power grid,' said Nart Villeneuve, a researcher with the SecDev Group, an Ottawa-based cybersecurity research and consulting group."
Couldn't Happen (Score:5, Funny)
Re:Couldn't Happen (Score:5, Informative)
The biggest mistake he made in his paper was the assumption that Homer still works at Springfield Nuclear Power Plant. Clearly China is several seasons behind in their 'research'.
The biggest mistake we made was that we actually still have Montgomery Burns running our power plants, and people like him running our national infrastructure. Which was this guy's point: There is in fact a systemic flaw in capitalism -- adding security decreases profitability, therefore security is rarely focused on even in applications that are critical to a country's well-being. The soviets published a report in the mid 80s detailing key areas in our national infastructure that lack redundant power pathways. If about 5% of our infrastructure were destroyed in key areas, about 45% of the grid would be inoperable.
That's simply unacceptable.
Re: (Score:3, Interesting)
since you guys beat the Russians financially I think that is debatable.
Re: (Score:3, Insightful)
since you guys beat the Russians financially I think that is debatable.
We didn't beat them financially. They imploded with a coup de etat. It was an internal affair that the US intelligence community later took credit for orchestrating. Which is part bullshit because if it hadn't have had the support of people within the former Soviet Union to begin with, it never would have succeeded. And I question that we "beat them financially" -- because we've lost in a lot of other areas. International opinion of our country, social services, and other domestic areas. There are large tra
Tea Party Commies (Score:2)
Re: (Score:3, Informative)
We didn't beat them financially. They imploded with a coup de etat.
Huh? The only successful coup d'etat was in 1993 (when there was no USSR anymore), when Yeltsin dissolved the commie parliament. The one before it in 1991 was hardline commies trying to oust Gorbachev, and it wasn't successful.
Regardless of which one you're referring to, the country was gutted long before either one of them.
Re: (Score:2, Informative)
Re: (Score:3, Interesting)
And I question that we "beat them financially"
While I don't know about "financially" (since the USSR didn't organize its finances in an easily comparable way) it's reasonably clear that it was economically where the USA and its allies were ahead of the USSR (and their allies). In particular, the west was able to sustain a higher level of military spending without crippling the rest of its economy.
Of course, we only really knew how bad things had got through the '70s and early '80s quite a bit later, and that wasn't a period when the Maniacs of Wall Str
Re: (Score:2)
Well, maybe inbetweening [wikipedia.org] is done in China now ? (it has already been done in South Korea [wikipedia.org])
In which case, maybe are YOU a few seasons behind ;)
typical military response (Score:5, Insightful)
Yes, it would've been much better for this guy not to publish his research so we wouldn't know about this problem and leave it wide open. We should be thanking this man for his hard work, not lambasting him just because he happens to be Chinese.
If the Chinese government were interested in disrupting our power systems, wouldn't they be a little more secretive about their intentions than shouting out our flaws to all the world?
Re: (Score:2)
Mr. Wang’s work was a conventional technical exercise that in no way could be used to take down a power grid.
no practical scenarios of an attack on the real power grid can be derived from such work.
It doesn't sound like there is a problem per say, having not read his actual work, but it looks like he simply based his theoretical problem in the US because the base data set was the best maintained and he speaks English.
Re: (Score:2)
Maybe the Chinese universities would be happy to take him, let him do his research and publish his stuff.
Just like the other researchers they are welcoming:
http://www.nytimes.com/2010/03/18/business/global/18research.html [nytimes.com]
Re: (Score:3, Informative)
Maybe the Chinese universities would be happy to take him, let him do his research and publish his stuff.
I understand that you didn't read the article, no one ever does, but to not read the summary? He's a Chinese Grad student at a Chinese university. They already let him do his research and publish his findings. The reason he didn't do it on China's grid is that they wont provide him with any data.
Re: (Score:2)
Sorry, was going to wait for the dupe
Re: (Score:2)
Case in point: the insane people who think it's dandy to use wireless technologies for intra-plant communications.
Like here [renewableenergyworld.com].
Perfect setup for spectrum warfare.
Re: (Score:2)
Perfect setup for spectrum warfare.
I believe that outlaw radio signals are a lot easier to trace than outlaw TCP/IP. Your ARRL would be ecstatic over the opportunity to find and shut down illegal radio transmissions - that can affect WiFi too.
Re:typical military response (Score:5, Insightful)
The problem is confirmation bias. The U.S. has been concerned that the Chinese are going to threaten U.S. security by using computers. When the U.S. found a paper written by a Chinese researcher that talked about using computers to attack the U.S. power system, they thought they found someone who was threatening U.S. security. In other words, when they found "evidence" that looked on the surface that it was what they were looking for, they jumped to the conclusion they had found it.
This is just the same as the "quote mining" we've seen from, say, intelligent design supporters who are continually on the lookout for evidence that evolution is wrong. It's also the reason that the hacked CLU emails are being misinterpreted to mean that AGW is a hoax. If you set out looking for evidence to support your idea, you need to make sure you also look for evidence that supports the opposite of your idea, and make sure you are interpreting the evidence you find correctly and neutrally.
Re: (Score:2)
Which is precisely the problem with science. If you cherrypick your studies you can prove anything you like. (Think many so-called survey papers and metastudies. Not to imply they're all fake.)
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2)
In mass media, we call it sensationalism. Newspapers, magazines, and TV reporters present people who proselytize the most extreme viewpoints as evidence of a controversy about this and a controversy about that, even where no such "controversy" exists. They aren't making up that there are people having an argument, but they go out of their way to cherrypick the extremists that are at the opposite extreme ends of any issue. Have you noticed all the reports about Toyotas recently [marketwatch.com]? Remember all the hype about t
Re:typical military response (Score:5, Informative)
Re: (Score:2)
You are right. BTW, I don't doubt that China is building cyberwarfare capabilities for attacks to disable important pieces of infrastrcture. There is too much evidence at the moment to discount that. Also to an outsider, this sort of thing looks bad.
However, all this being said.... This sort of paper is not a threat. If you want to use an attack, the thing you don't do is alert the target to the vulnerability beforehand so that it can be corrected.
Every power grid can be vulnerable (Score:4, Informative)
If you want to build a power grid in country X right now, take a look at the vendors that supply the products. Then take a look a the vendors that supplied the products 10 or 20 years ago. The same dozen or so of vendors supply all the equipment from control room automation to the actual hardware to make and distribute power to everybody everywhere in the world.
If the US power grid can be hacked then so can most other power grids because you will find the same equipment and software over and over again.
It's a bit like the good old MAD during the cold war: sure you can hack my power grid, but I can also hack yours...
I'm also not sure how it's a big deal (Score:5, Insightful)
All power grids are always vulnerable to physical attack. There are few generation stations, relative to the number of customers and many large scale distribution lines. Take those out, and you've disabled power for a long time since they have to be rebuilt. A big, distributed, power grid like we have that does not have tons of excess capacity is just going to be at risk of having large parts taken off line by physical means. Ask anyone who lives in an area of heavy snow.
Now, I understand that an electronic attack could be done remotely, in theory without warning. Ok... To what end? In case people haven't noticed there's a big ole' swath of ocean between the US and China. So if China was to try that as a precursor at an attack, it wouldn't do any good. We'd either already know about the attack, having seen the ships on the way, or it would be way too early, since the ships would take a long time to get here, and it would be back up by the time they got here.
Not that any of that is very relevant to defense. It isn't like aircraft carriers are on the power grid, they've got their own nuclear reactors (2-4 of them in fact). You discover a good deal of important stuff has its own power backup since it isn't like power doesn't go out all the time anyhow. Hell we lose power to our building at work probalby 3-4 times per year, hence there's a generator on critical systems.
I just don't see how this sort of thing is that big a deal. Now please understand, I'm not saying we shouldn't try to secure it. When you find a security hole, you should fix it. Just a good idea over all so you don't have problems in the future. However I don't see it as being a military threat. I see it as being more of a script kiddie type of threat. Some asshole takes power out because they think it is funny. I don't see China trying to knock it out because I can't see how it would be useful, and it would have some rather large negative repercussions if they did and the US found out who was responsible.
Re:I'm also not sure how it's a big deal (Score:5, Insightful)
It is a big deal because, timed correctly, you can cascade a failure and shut down a huge chunk of the grid. Maybe your building has a generator for critical systems, and it can run for 72 hours on its propane tank.
But can the next shift show up, if the trains aren't running? Traffic control is down?
How many hours can you last, with no food and possibly limited and no water? So your server room is running; who is there to man it?
Just talk to the people who weathered Andrew, Hugo and such. Having your own power backup does little good if you also don't have all of the people there to put it to use.
Anyway, this is clearly not a threat. It's a vulnerability, and should be addressed.
OTOH, the intelligence community has a different definition of "threat" from most people. A "threat" is what your opponent *could* do, not what they *intend* to do.
So the intelligence people analyze "threats" from Canada, UK, etc. Certainly UK or Canada are "threats" in that they have the location and/or the military might to cause the US significant damage. It has nothing to do with their "intent"; that's for the politicos to decide.
Re: (Score:2)
But can the next shift show up, if the trains aren't running?
This is AMERICA. If they're too stupid to rely on public transportation, they deserve to be fired for not showing up!
</sarcasm>
Re: (Score:2)
Suppose China disabled the USA's electrical grid via physical attack. There would chaos - transportation shuts down, cities run out of food, medicine, etc. China then sends large scale military force over as a "peace
Re: (Score:2)
Taking out the physical generation stations is actually expensive and difficult. The hard-on factor in a cyber attack is that it theoretically can be executed very cheaply. The US has spent a great deal on defense and would hate to see it bypassed by some sixteen year old with a CoCo2.
Re: (Score:2)
As solar becomes more prevalent, the power grid could be altered to more closely resemble the fishnet that became the internet. You'd have many smaller sources closer to where people us
Re:I'm also not sure how it's a big deal (Score:4, Insightful)
Assymetric warfare. The Chinese have little intention of attacking us openly, physically. Their conventional warfare forces are being developed more to deter us from attacking for revenge, than to be used against us.
Assassin's Mace.
There is so little good information on it - but it's real.
Re:I'm also not sure how it's a big deal (Score:4, Informative)
[goes off, looks it up]
http://archive.newsmax.com/archives/articles/2005/10/20/172811.shtml [newsmax.com] seems to be a good overview. I get the point, anyway.
I'm also reminded of the old not-quite-a-joke:
The mission is to steal sand from an American beach.
The Soviet Union sends a stealth submarine, which disgorges a camo'd scuba dude who swims up to the beach in the middle of the night, grabs some sand, and swims away.
Red China sends a million tourists to the beach.
Re: (Score:3, Insightful)
Pretty damned good find. You deserve a mod point or two, just for taking my post seriously enough to look! ;^)
As the article makes obvious, no one in Washington takes the concept seriously. So, WTF are they doing in Washington? Send them all packing, I say.
The article falls a little short, though. There was a quote from some insider or another in the Chinese government, which defined the Assassin's Mace better. Their plan is, dominating us politically, economically, militarily, AND technologically, wit
Re: (Score:3, Insightful)
Project Manhattan was a desperate gamble in the middle of the war, with the added benefit that America wasn't being bombed on its own soil like Germany was.
We might also note that the US and UK were bombing Germany's research sites, and especially targeted facilities that dealt with things like isotope separation and heavy water. Roosevelt's administration was actively trying to prevent German development of the atomic bomb. It was a lot harder for the Germans to target American research sites.
Of course,
Re: (Score:2, Insightful)
China doesn't have the capability to attack the US militarily but it can cause a significant amount of damage by attacking the US economy and promoting anarchy amongst the US population. The bonus is the possibility of carrying out this attack anonymously. Once the electrical grid is down, not only does the US economy take a hit but people start rioting and looting. The police and military would crack down on its own population and start fueling rage directed towards the authorities. Instead of everybody co
Why would they turn the lights off... (Score:3, Insightful)
Re: (Score:2)
...to property they're going to legitimately own, thanks to the much slicker trick of rigging their currency exchange rate?
Well, just think of yourself as a caretaker. Hell, if you bought a house you don't really own it, not when your local government can and will take it away from you an instant if you don't pay your taxes. The essence of ownership is control, and we've already given that up to our own governments, and it looks like we'll eventually have to give it to China.
Re: (Score:3, Funny)
This is just silly, but no harm done. (Score:2, Interesting)
Re: (Score:3, Insightful)
And yet his name will probably live forever on a No Fly List. Still, no harm done to you anyway.
Re: (Score:2)
You say "there no way for [Wortzel] to judge" the situation. Which seems untrue, unless you are saying that Wortzel is unqualified to discuss or provide analysis of this type of research. He certainly could of looked at the Journal itself and seen what else was in there. He certainly could have talked to others non-Chinese researchers BEFORE talking to Congress.
The fact that the article was in a Journal and published say in a Taliban newsletter should have been at least a starting point; not a point to jump
Re: (Score:2)
I think anything is possible.. and there there is always the possibility of just being lazy... but I think the net result of this is more hostility between the US and China; even though it's been "cleared up" there is sorta of a harmonic effect that the idea that the Chinese are attacking the US power grid is out there... perhaps some benefit from that increase in hostility.
The pro-China modbombers are out in force today. (Score:2)
Still doesn't make it a non-threat. (Score:-1, Flamebait)
Such interests are legitimate threats even if the paper itself is reviewed to be harmless.
Re:The pro-China modbombers are out in force today (Score:5, Insightful)
Re:The pro-China modbombers are out in force today (Score:5, Insightful)
Because the USA is the land of the free and the home of the brave!
Re: (Score:2)
Mr. Wang’s work was a conventional technical exercise that in no way could be used to take down a power grid.
no practical scenarios of an attack on the real power grid can be derived from such work.
From what it sounds like the entire article is about him overreacting to a nonspecific, and in this case completely unworkable white paper. The news here is not that the US is vulnerable but that the people in charge of securing it are a little quick to fire off against anyone who undermines them even if they didn't.
Re: (Score:2)
Although, that kind of lends credence to the idea that it's really not that secure....
Re:The pro-China modbombers are out in force today (Score:5, Insightful)
I suspect this is about the military definition of threats.
(Warning: I've worn that particular hat, as a former MI assigned officer in an S2 shop for a cavalry regiment. I've never been a politician, so what you're getting here is definitely only one side of the argument).
The way Military Intelligence is supposed to work, reports consider capabilities, but they deliberately don't consider intentions. MI is never in command and NEVER makes command decisions, but reports to commanders, or at higher levels, to civilian overseers.
For example, an high ranking Army Intelligence officer might be supposed to give the US Congress a good answer to whether country X has missiles with enough range to reach the US. He or she can't give a good answer, and so shouldn't comment, on whether country x has intentions to use them on the US or on someone else (at least unless there's a real obvious 'smoking gun', like the officer has found a copy of the orders where all the missiles are suddenly being retargeted at country Y and the job has to be completed by 1300 hours when "Operation Obliterate Country Y" begins).
It's up to civilian oversight to determine whether a threat (potential) becomes an enemy (actual). The military is not supposed to decide when to go to war, that's the job of civilians. If you want congress or the president to be the ones to decide whether the US needs to go to war or not, you can't have the pentagon declaring in advance who is an enemy and who isn't.
Right now, Great Britain has pretty serious threat potential (They have weapons which could damage the US, and ways to transport them to us). They don't suddenly count as an enemy just because of that. Pakistan has less threat potential (not as many weapons or delivery systems). Imagine a coup puts militant Taliban related forces in charge of Pakistan's nuclear weapons. They might suddenly be classed as an enemy nation, but what happened to the threat assessment? Nothing! They are exactly the same threat, from a Military Intelligence assessment, as before. Same number of bombs and missiles and troops, same threat.
Put that way, a person who can figure out a good way to attack the US is a threat, or a small part of a threat. That he's shared his info with us should make the civilians who are supposed to decide what actions to take figure he's not an enemy, and that any potential threat here is not likely to become an actualized attack. Common sense tells normally rational people that if this person was part of a secret plan that would eventually use his information against us, he wouldn't have mentioned it all publicly. The people he was connected to in China would be unknown to us, not publicly accessible, and so on. But that means any intelligence system which discovered threat potential here probably reported it right, it's just civilian overseers acted like paranoid fools.
For another analogy. Let's say you have two people nearby who can both lift over 300 pounds. They both represent similar threats to you, in the most technical sense. One is there to help you move your furniture, the other is an escaped convict looking for a hiding place. Only one of them is at all likely to attempt to harm you, and it's quite possible he has no intentions against you either. You might classify the mover as an ally, and then it's a judgement call if the convict is an enemy at that point, but both technically have near identical threat potential from what you know. This whole matter sounds like a case where someone is conflating the facts and the conjectures, to try and make people be equally worried about 'moving men' and 'escaped convicts', and then assume the worst possible scenarios are inevitable and not just possible for the convicts as well.
Re:The pro-China modbombers are out in force today (Score:5, Insightful)
The issue of vulnerable power grid is a legitimate threat, but the individual creating a study about it is not. You get it backwards when you say the individual is a threat and paper (or the vulnerability) might be harmless. A grad student won't have capability or interest in taking down US power grid, instances with capability to harm US power grid have also means to create similar study on their own. I'm sure even US military has created similar study and have planned on supplying electricity to critical locations without the electric grid.
There are many valid reasons why US electric grid was chosen to be target of the study. Creating similar risk analysis on Chinese electric grid could be a serious offense in China, or information about US electric grid was more available than any other major electric grid in the world. Most likely this student has interest in working at the electric grids and wants to help to build one that is more secure.
Scapegoating abounds and we all suffer (Score:4, Insightful)
From the liberal in the 1950s branded as a commie pinko, to the
19 year old with a 15 year old girlfriend branded as a pedophile, to the
Casual torrent downloader branded as the biggest threat to Hollywood ever, to the
Security researcher branded as an enemy of the state,
we all suffer when people are scapegoated so someone can get his time in front of a microphone.
Would someone please dig up J. Edgar Hoover's body and make sure he's still dead? Methinks his ghost never left us.
Re: (Score:2)
Would someone please dig up J. Edgar Hoover's body and make sure he's still dead? Methinks his ghost never left us.
We dug him up quite a while ago when we were trying to find Jimmy Hoffa's body. Now that we're no long contenders in the 'Find Jimmy Pool' we let him roam free. Our bad, sorry about that.
Re: (Score:2, Insightful)
we all suffer when people are scapegoated so someone can get his time in front of a microphone.
Conversely, we all suffer when truly guilty persons are portrayed as innocent martyrs so some bleeding heart can get his time in front of a microphone.
Re: (Score:2)
Everyone is truly guilty of SOMETHING. That's just human nature.
Re: (Score:2)
Sorry, I don't buy that christian original sin bullshit.
Way to miss the point. I don't buy that crap either - I'm an atheist. However everyone has lied, or stolen something, or done something illegal at SOME point in their life. EVERYONE. The day that "authority" is capable of strictly enforcing the law on everyone everywhere and at all times is the day we lose our humanity and truly become nothing but disposable cogs in society's machinery. Because sooner or later everyone can and will be rounded up, it wi
Let me guess... (Score:2)
You are more of a Otto von Bismarck than Ben Franklin [wikipedia.org] kind of guy, right?
Re: (Score:2)
Public security research is not a threat (Score:5, Insightful)
Responsible disclosure (Score:2)
That ignores responsible disclosure completely.
Re: (Score:2)
"Responsible disclosure" is a concept dreamed up by vendors to allow them to stall and procrastinate when it comes to fixing bugs as long as possible. The only "responsible" disclosure is full disclosure.
Re:Public security research is not a threat (Score:4, Insightful)
Public security research is not a threat. Vulnerable infrastructures that go unchecked are. The trend is to penalize security researchers for publishing their findings will only increase underground security research that will then just be sold to the highest bidder.
Public security research is a threat. But it's not the researcher's fault; It's the people who wait for research like this to be published and then use it (open source intelligence gathering) to develop attacks. It's easier to target and blame the researcher for publication than to attempt to find the malignant factors, who are increasingly operating independently and lack connections to an organization. Which means, in short, they're operating under the radar. Conventional intelligence-gathering efforts depend on the fact that as the number of criminals cooperating increases, the chance of mistakes being made which expose them increase exponentially. Also, the number of communication channels between people increase geometrically, resulting in a larger signals intelligence footprint.
So basically, it's cheaper, even if it's not ethical. And ethics, as you know, are decided by those in power. So there will always be a rationalization to discredit and imprison people who come forward with security problems, simply because it's cheaper to do so than fix the underlying problems, which they are already well aware of and would prefer you not tell them that the emperor has no clothes.
Unfortunately, the logical conclusion for this kind of reactionary thinking is that eventually a backlash will build up and people will begin independently engaging in small-scale acts of sabotage in an attempt to bring attention to these problems (which has recently started to happen domestically). The government's over-reaction to these attempts by the citizens to excercise the only recourse left to them by creating harsher penalties, more survillance, and secret courts, will eventually result in larger targets being attacked and destroyed, by independent citizens or small groups.
We've been here before -- in the late 1800s, in the 1960s and 70s, and briefly again in the late 90s. It's cyclical. The problem is, each time it happens, it gets worse, and the government refuses to acknowledge this systemic failure of its domestic intelligence policies. Eventually, we're going to have another 9/11, but we won't be able to blame anyone but ourselves when angry citizens start taking out government buildings.
And the reason is we've left them with no alternative: Terrorism is, in fact, a valid way of promoting change when all other methods have failed. The strength of a democracy is the fact that we have all those other methods open to us. Close them off, like we're doing now by punishing people who have knowledge and publicly state the failings of the system and draw attention to needed repairs... And it will come to our own soil with a vengance. And we'll have nobody to blame but our ill-designed domestic policies for it.
Perhaps the intelligence community needs a better way of accepting reports of these problems and rewarding citizens for being diligent, instead of imprisoning them and invading their privacy as potential subversives. And perhaps expanding the definition of citizen to include anyone who works to secure our future, domestically or internationally. How about the concept of honorary citizen? These are the principles and actions we should be striving for -- not this goddamned police state bullshit.
Re: (Score:2)
The REAL Threat... (Score:2)
is financial. There's no point maintaining a secure reliable grid if you can't afford to use it [denverpost.com].
Détente (Score:4, Funny)
This has always been the problem with the U.S. (Score:3, Insightful)
The U.S. is reactive and not proactive. The U.S. always has to wait until after the fact to admit that there was a threat. This is nothing new to me. Just read Unrestricted Warfare [c4i.org]. The Chinese have been stating this for years now. Yes everything will be fine until the lights go out.
Re:This has always been the problem with the U.S. (Score:4, Insightful)
Re: (Score:2)
No, you don't offend me. I see where you are coming from due to our "over reactive responses" to 9/11. What I am talking about is taking more proactive measures. Perhaps 9/11 could have been avoided have we had a different foreign policy, didn't arm extremists with the short sight that in the future there could be blow back, and last but not least ignore all the guys taking flying lessons that didn't want to learn how to land the aircraft.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I got interested and read a few passages. I am convinced it is a forgery, and of bad quality at that. One hilarious passage read:
Only a conservative Christian could write such a passage. A PLA colonel would avoid religious references entirely, and surely would not write about a single creating entity. There is some material on W
Solar Storms Are More Of A Concern (Score:2, Informative)
How old are these "strategists"? (Score:2)
Sometimes I wonder how old they are. They act like children.
EVERYBODY knows that it’s just a research paper.
But these people always pull some childish obvious bullshit out of it.
It really reminds me of the latest South Park episode. ... *shifty eyes*”
“Yeah, must be a wizard alien!
It's far more than an over reaction (Score:5, Insightful)
(from his webpage)
The guy is a member and servant of the circle of elites who profit, and enjoy enormous social success from their support of our militarized social and economic system. Pursuading a population of relatively free and relatively educated person to support an political system which can afford to spend $3 trillion dollars (washington post estimate) [washingtonpost.com] on an injust, unjustified terrorist war against an impoverished nation, against a dictator we incidentally empowered and supported through the worst of his crimes, and over the objections of its own citizenry, but quails at spending $1 trillion to ensure health care said citizens.
Wortzel enjoys a position of prestige and wealth for his support of the forces of that are destroying us, as do the reporters and editors of the New York Times for parading his observations without the criticism they deserve.
For anyone with a certain amount of research background, or even basic knowledge of network security and stability issues (in this case network in question is power network), the appropriate response to the paper would be analysis, and investigation and applicatoin of measures to improve the stability. The U.S. power grid has in recent years suffered from such cascading network failures several times in the last decade, and we Americans should be grateful that someone is investing the resources to investigate these issues. By publishing his results in a peer reviewed scientific journal, Mr. Wang has done us a service, and deserves our gratitude. Instead he's getting caught up in this policy wonk's latest search for enemies.
Security? (Score:2)
Since no one has said it, (Score:4, Funny)
LOUD SHOT. Wang grabs his chest and drops dead.
U.S. Military: And this is how we deal with threats.
(you can mod me down now)
China has no interes in us (Score:2, Interesting)
The trouble with market-based electricity. (Score:5, Informative)
It's a worry. Power grids use the Internet extensively. Since "deregulation", generating companies and distribution companies are separate businesses, and the generating companies compete with each other. The generating companies make bids, the distribution companies buy from the bids, and the grid operator (a neutral party) keeps the players connected and runs the market. Bear in mind that these systems don't have much excess generating capacity. 12-20% excess capacity during peak periods is typical. For a good overview of how this works, see Background on Generation Control [acrobat.com], an online training course from PJM, the biggest grid operator in the world.
Most of the communication between the various players takes place over the Internet. The bid handling is done on machines connected to the Internet and many of the applications involved are Windows-based. The execution of a power buy involves the transfer of a set of switching decisions from the bid-handling machines to the machines which actually have control over generation and transmission equipment.
Details of the PJM Dispatcher Application and Reporting Tool [isomou.com] are available. This is the main way generation companies and the dispatch center communicate. The user interface is Flash in a browser [pjm.com]. Bid and buy information is shipped around as XML. [pjm.com]
If the Internet-based apps go down, they revert to "conservative operation" and stop trying to optimize the economics. All generation facilities, even high cost peaking plants, crank up to at least standby power levels, in case they're needed. Export of power to outside the control area in trouble is stopped. Coordination is over the "all call", a squawk box system, and satellite phones. Worst case, everybody backs down to a preplanned schedule of what they're supposed to be doing at each hour of the day. In this mode, millions of dollars per hour are being lost, but the grid can probably be kept up.
One worry is insertion of bad data into the bid system via the Internet. The California ISO had outages in the early part of the last decade when energy traders put bids into the system which resulted in transmission congestion, forcing the CAISO to buy more expensive power. Back then, California had an energy auction every half hour. That was an extreme of deregulation. Now, the grid manager has more authority; generating companies put up data which offers price/quantity curves as bids, the grid operator takes them in increasing order of cost, and "energy traders" like Enron are no longer involved in hour by hour decisions. So there's more stability in the system.
Internet-based attacks against the control systems are also a worry. There definitely are connections to the external Internet. PJM seems to be using XML, in well-defined formats, to pass data across that boundary. They're not dumb. The problem is making sure that there aren't unwanted connections somewhere amongst the hundreds of different companies which connect to the control side of the system.
It's interesting that PJM doesn't rely on "security through obscurity". Hundreds of thousands of people have to know how this works. So they put the manuals, training materials, and live operational data [pjm.com] on the Internet. (Right now, there's a problem near the West Virgina/Ohio border.)
Re:Still doesn't make it a non-threat. (Score:5, Funny)
I must not fear.
Fear is the mind-killer.
Fear is the little-death that brings total obliteration.
I will face my fear.
I will permit it to pass over me and through me.
And when it has gone past I will turn the inner eye to see its path.
Where the fear has gone there will be nothing.
Only I will remain
Re: (Score:2, Funny)
Re: (Score:2)
Re: (Score:2)
Oy WILL kill yew!
Re: (Score:2)
God that movie was hideous. The book is a Sci-Fi classic, and there is a mini-series that did it much much better. Please use either of those as your reference instead of the god-awful 80's movie. I love Patrick Stewart as much as anybody, but even he couldn't make up for that movie. It was just all wrong.
He's probably just being proactive. (Score:3, Funny)
Look, I know it's easy for people to think he's planning an "attack", but I think he's just trying to be proactive.
Being Chinese, he no doubt craves video games, online MMORPGs and anime to a level that a Westerner just can't understand. Just put yourself in his shoes for a moment. Could you really go 30 minutes, or maybe even an hour, without playing some Wii or playing WoW or seeing some tentacle rape? No, you probably couldn't. So you'd do everything you possibly can to ensure that you have electricity 1
Re:He's probably just being proactive. (Score:4, Funny)
I am just surprised at the lack of Wang jokes all this time :)
Re: (Score:2)
Hoe Wang is een Chinees?
Re:Still doesn't make it a non-threat. (Score:4, Interesting)
I would say that it's not only the US power grid that's vulnerable. It's power grids and users all over the world that are vulnerable to threats.
So I would say that the report hardly surprises me. Coordinated attacks on power lines in areas hard to access in a part of a country and then a follow up with some anti-aircraft weapons to take down the maintenance helicopters and you have a big problem. Take out a number of transformers and you can really sit back and see that those oddballs insisting on collecting firewood are the survivors while the rest are running around in circles. Especially tough in the middle of the winter.
Secondary effects of a prolonged power outage would be telecom breakdowns, water and sewage plant failures, failure to get fuels for vehicles etc. Those are just the direct and obvious effects. The economy would be taking a major hit at the same time.
Just figure out if there were a coordinated attack that cut off electricity to many major cities at the same time. It would make what happened in New Orleans when Katrina had struck just an exercise.
Re: (Score:3, Interesting)
"Take out a number of transformers and you can really sit back and see that those oddballs insisting on collecting firewood are the survivors while the rest are running around in circles. Especially tough in the middle of the winter."
This is going to derail the discussion massively, but I read a neat article recently which pointed out that survivalists, preparers etc are sort of missing the bigger picture. If the world goes to hell in a handcart and you're the one sitting pretty on a two hundred year supply
Re: (Score:2)
Re: (Score:2)
Our family farm is just outside the tank-of-gas-plus-how-far-'til-the-blisters-cripple-the-flatlanders range of the major cities. Pop's hoping for the National Guard to secure the pass over the mountains. If not, we are prepared to repel boarders as well. I've seen angry mobs before, and I'm pretty confident they will stop each other pretty much right where they coast to a stop. What did we overlook?
Re: (Score:2)
Helping your fellow human beings, perhaps?
Re: (Score:2)
A lovely sentiment, to be sure; I take it you weren't in Los Angeles in April of '92. I would be saying that myself if I hadn't personally observed the shmoogs, unleashed. I will likely be helping some of my fellow human beings, to a point. I am not a "Christian" and I feel strongly disinclined to draw that line anywhere near to the risk zone. Refugees are welcome to pass by, (preferably out of range), and try their luck in town, but I imagine they'll be as welcome as the Joads. Too bad,so sad.
Re: (Score:2)
Just figure out if there were a coordinated attack that cut off electricity to many major cities at the same time. It would make what happened in New Orleans when Katrina had struck just an exercise.
There is a pretty good template here at Northeast Blackout of 2003 [wikipedia.org] on how to take out power to 55 million people; just substitute shot-out high-tension insulators for power-line tree contact. It easy to dog on authorities for being over-zealous but when you compare "what has been done" to "what could be done" multiplied by " how many whack-jobs would like to do it" it's hard to blame them.
Re: (Score:2)
Probably.
Re: (Score:2)
Re: (Score:3, Insightful)
I was thinking more along the lines of "effing great, kill the messenger".
Here's your "enemy" telling you where a critical resource of yours can be attacked. This alone is a boon, not a threat. Assess his attack vector and there are two possible reactions: Either you notice that he is wrong and you keep it at that, hoping that your enemy will believe that this is a feasible way to attack you. When they do, it fails but gives you a the psychologic and diplomatic upper hand. Or he is right and you should get
Re:What is it with you filthy Republicans? (Score:5, Insightful)
Actually, I am American, and I love America - enough to have served her armed forces for 8 years, and to raise both a soldier and a sailor. But, I agree with AC. WTF is it with torture? Torture was almost universally condemned throughout the western world, until Herr Shrub came along. FFS, any competent intelligence officer will tell you right out, he can get better results by buddying up to a suspect, rather than torturing him. Offer the guy a cigarette, a beer, ask about his wife and kids, tell him how beautiful his wife and daughters are (even if they are Sumo heavy weights whose faces have been used for dart boards) - sugar catches more flies than vinegar ever did.
Re:What is it with you filthy Republicans? (Score:4, Insightful)
I am not only American and love America, I have (almost) always voted Republican.
Gitmo needs to be closed as a detention facility. I'm not even sure it needs to exist as a naval base, but that's a different issue.
The "detainees" are either criminals or they are prisoners of war.
We have rules for dealing with both. A determination needs to be made, one by one, in an expedited manner, which is which, and those rules followed.
If we can't assign a person to either group then maybe they should be released wherever they were captured, with a change of clothes and an apology for the water boarding and genital chewing.
The fact that we are apparently incapable of doing so and would rather continue the water boarding and genital chewing is an embarrassment.
Instead, if the Chicago Tribune is to be believed, we're going to start sending them to Bagram (Afghanistan) instead. (Today's paper, section 1, page 25.)
The whole point of "closing Gitmo" is supposed to be to do the right thing - not to do the wrong thing again, just somewhere else. Some quotes:
From my perspective, that is kind of the point. If the U.S. government is holding someone, that person should have access to U.S. courts, or they should be subject to the Geneva Convention rules. Period.
This kind of behavior is not what the United States is supposed to stand for - it isn't even what we are supposed to tolerate in other countries.
Re: (Score:3, Insightful)
You, sir, are quite likely a real "Republican", as opposed to the "neoconservative" crowd that is so fashionably popular today.
I salute you. I could almost have been a Republican, because I am a conservative at heart. To bad the party has been hijacked.
Re: (Score:2)
The "detainees" are either criminals or they are prisoners of war.
Do I read that right? If they haven't been found guilty of anything, they are automatically prisoners of war? Thank goodness nobody innocent ever got locked up!
I think the point was that the detainees are either accused of criminal activity or prisoners of war. The government needs to make the call on each individual and treat them to the laws that govern handling of accused criminals or prisoners of war.
Re: (Score:2)
sugar catches more flies than vinegar ever did.
Looks like somebody never tried to catch flies with vinegar.
Vinegar is extremely effective at catching flies because it smells like rotting fruit (that's basically what it is, actually). Flies love rotting fruit a hell of a lot more than they like fresh fruit, in case you haven't noticed.
The classic trap is to fill a jar with vinegar and attach a funnel just large enough for the flies to get in but small enough to make it difficult to get out - the hole can be several times the size of the fly and still ac
Re: (Score:2)
Indeed. And fixing the problem here can't be done by attacking him and others who take the approach of "Shoot the messenger" in cases like this. It might be fairly obvious to a lot of us that we want people finding such problems and telling us about them. The alternative is that we don't hear about a problem until someone exploits it. But