At How Much Risk Is the US's Critical Infrastructure? (csoonline.com) 162
itwbennett writes: There is growing evidence that intrusions into the power grid and other critical infrastructure by hostile foreign nation states are real and happening. But there's "much less agreement over how much of a threat hackers are," writes Taylor Armerding. "On one side are those – some of them top government officials – who have warned that a cyber attack on the nation's critical infrastructure could be catastrophic,"writes Armerding. Others are crying FUD, including C. Thomas, a strategist at Tenable Network Security, who got some attention when he argued in an op-ed that the biggest threat to the U.S. power grid not a skilled hacker, but squirrels, are crying FUD. Who has it right? Agreement seems to coalesce around two points: 1) the cyber security of industrial control systems remains notoriously weak and 2) hostile hackers will improve their skills over time. So, while we haven't reached "catastrophe" yet, a properly motivated terrorist group could become a cyber threat.
From neglect or from hackers? (Score:4, Insightful)
Because the former is WAY greater a threat than the latter.
Re: (Score:2)
QFT. Flint, MI says hi. Public works and infrastructure require a lot of maintenance, and they're not always getting what they need. Over time things end up neglected and you see the inevitable result.
Is this why the Proserpina dam, built by the Romans in the first century AD, is still in use today?
Or do people who work on public works intentionally do a crappy job so that they will have continued work in the future in the form of maintenance?
Re: (Score:3)
I suspect I detect a whiff of sampling bias here.
Re: (Score:2)
Yes, and no. Yes, there are many Roman bridges and engineering works that are long gone. There are also changing needs.
On the other hand, it shows that you *can* make things that last, which tends to make me wonder why, with modern technology, we haven't. It's not just luck, either. The Pons Fabrico, a bridge built in Rome in 62 BC is still in use, mostly unchanged in all of those two thousand years, and actively in use that entire time. We know how the Romans made things last, and although there are l
Re: (Score:2)
Fun fact, the Romans DIDN'T have problems with lead in their drinking water. This is because the water is so hard that lime scale quickly builds up in the pipes. Heck, they had people who's full time job was to chip scale out of aqueducts. It also means that they had to occasionally lay new pipes as old ones got clogged.
The lesson is twofold. First, some Roman engineering required regular maintenance. Second, the cause to Flint, MI's problem might be the solution to it as well.
Re: (Score:2)
Fun fact, the Romans DID purposefully put lead in their drinking wine, to make it taste sweeter, and used it in cosmetics and other things.
Lead leeching into Flint MI's water is apparently because the water is corrosive enough to remove the lime scale and dissolve lead from t
Re: (Score:2)
The more you know. Apparently there's a sweet spot for water. Too soft and no scale coats the pipes, but too hard and it's acidic enough to dissolve the lead in the pipes. Guess the Romans got lucky. Not that they would have cared.
Re: (Score:3)
Every item built needs to be maintained to work in the long run. A dam doesn't see the same amount of wear as a road, but there's some work needed now and then.
When it comes to infrastructure it's a continuous work since people have a tendency to move around.
Re: (Score:2, Insightful)
It also takes a bit of intelligence and forethought.
I mean, WHOSE bright idea was it, to put critical infrastructure controls on the internet for God's sake? Let's not get into the fact they often put things up very insecurely, but the bigger question is, why are such components ON the fucking internet to begin with?
Not everything needs to be connected, you know.
Re: (Score:2)
You could make equipment unconnected, but then it requires on-site support personnel to handle any problems, so you'll be "wasting taxpayer money".
Or you could make it remotely connected via a dedicated channel, but then you'd need to pay for that channel, and it's not necessarily secure.
Or you could just put the controls on the Internet, fire most of your staff, be hailed as a business genius and earn a huge bonus. And, if you're so inclined, make yourself
Re: (Score:2)
The dam is a huge pile of earth and stones with basically static load pushing on it. There's a lot of material to remove and relatively little erosion doing so. Of course it's going to last a while. By contrast, the aqueduct it was built to supply didn't [wikipedia.org].
Most publ
Re: (Score:2)
Is this why the Proserpina dam, built by the Romans in the first century AD, is still in use today?
Yes, it's why it's still in use today. Because it's been maintained
Amortized over its entire working lifetime, what is its overall maintenance loading, per year, in terms of a percentage of cost of initial construction, compared to similar public works in the U.S.?
Thought so.
Yes, things have to be maintained.
No, shovel-monkeys do not all need continuous full-time employment, merely because they are not qualified to perform other tasks. That is what the idea of Universal Basic Income is designed to deal with.
Re: (Score:2, Informative)
It wasn't lack of maintenance that caused the environmental disaster and poisoning of 100k people in Flint. It was an attempt to run government on "free market" principles. An emergency manager appointed by Gov Rick Snyder (R-Atlas Shrugged) decided to change the water source to a polluted river to save money, punish Democratic voters and kill poor people.
It was a Republican governor sending small pox infected blankets to
Re: (Score:3)
FTFY
Actually, though I doubt the state government purposefully lead-poisoned the citizens of Flint (they would have known it would be a scandal), you are underestimating the capacity of those in power to hold the working poor in contempt and being OK with letting those freeloaders get hurt: After a
Re: (Score:2)
I'd worry more about the squirrels (Score:4, Funny)
But they aren't very organized. Once they set up a twitter feed, or at least unionize, I'll start being concerned.
Re:I'd worry more about the squirrels (Score:4, Funny)
Re: (Score:2)
Squirrels are good for business! One gift-horses us a $2MM project a few years back when things were tight... God save the squirrels... or at least make them very sexually active!
Re: (Score:2)
The real risk (Score:3)
Re: (Score:2)
Not to mention downsizing of workforce so that maybe only 2 persons understand the whole infrastructure network while the rest are hired by the hour for short term work. Documentation only reaches to a certain limit, it shows how things was done, rarely why.
We used to solve that problem (Score:2)
Washington DC (Score:3)
Re: (Score:3)
That's one thing that amazes me - I'm from Europe and overhead lines are only used out in the boondocks. As soon as you are in a village then they are put below ground, same with telephony and internet where I live. But in almost every village and town in the US they are above ground cluttering the view and put at great risk for influence from the elements, accidents and possible sabotage.
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
No, it wasn't any difference, it was started roughly simultaneously on both sides of the Atlantic, in the 1880's, so that's actually not a reason.
The reason has more to do with the willingness to realize that the long term maintenance costs are a lot lower with buried lines.
Re: (Score:2)
The reason has more to do with the willingness to realize that the long term maintenance costs are a lot lower with buried lines.
The fact that they got to rebuild after having most of their infrastructure bombed to rubble was much more influential. Europeans don't have any better long term focus than the US, a common failing of representative governments.
Re: (Score:2)
Not all of Europe, Sweden wasn't involved and powerlines are buried here as well.
Re: (Score:2)
Re: (Score:3)
Europe has plenty of old areas. Many of them were bombed back into the stone age 70 years ago, and had a chance to build new infrastructure when they were reconstructed. When someone does an ROI calculation, it's a lot easier to get things done when the choice is "Spend 20% more to install buried lines rather than overhead lines" vs "spend 120% more to replace existing, working, overhead lines with buried lines."
Not saying this is right, but it is reality. It's probably why the US infrastructure is in su
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The microwave comms are encrypted. You can intercept them if you like, but they are point to point and this can be detected. It isnt very easy to detect a tapped cable. In fact that is why agencies choose to tap cables.
The fiber cable comms are encrypted too and how to you detect that microwave transmissions are intercepted?
If your cables are in PDS it is very, very easy to determine that someone has penetrated the PDS and is possibly tapping your cable, also tapping if not done perfectly can result in signal degradation.
Re: (Score:2)
Re: (Score:2)
Rate payers don't want to pay for it, but they sure do want to bitch about the overhead lines when the power goes out. It comes down to penny wise-->pound foolish.
Re: (Score:2)
Well said. 66kV lines should be on steel poles, but neighborhood 5-25kV lines are easier to maintain in the air. Underground lines are nice when you have a low water table and a lot of wind/snow.
Honestly, people should just expect less from the electrical utility at this point-- get yourself a grid-tie battery that can isolate itself, and a little portable generator if reliability is important to you. Nobody wants to pay for a reliable utility.
OMG (Score:4, Funny)
Re: (Score:2)
Many electrical substations are connected via radio to a control center. But most control centers have internet access. And today there are a lot of possibilities to intrude on the radio links due to the large availability of cheap radios on the net.
Go buy a Baofeng radio (or what they are called this week), program it to an unauthorized frequency. Oops, that frequency was used by the power company for controlling your local substation. Once in a while when you transmit you may actually disrupt something at
Needs Prodding (Score:2)
I work in the industrial control world, some anecdotal things to share...
I've seen access to PLC's running critical water structure completely available via a web browser from anywhere in the world...since fixed. There is movement to close all these holes but the industrial control world moves very slow. It's very conservative, thinking "if it ain't broke, don't fix it" with the definition of broke being physically destroyed. It's easy to be critical of them for this but industrial controls are typically
Re: (Score:3)
I've had vendors tell me water/sewage gear in a mid sized city did not support routing. OK sure I can see them sending arp requests for the gw they have set when I inject traffic at them, but who knows maybe they have some funky L2 broadcast component. I'm voting for the vendors looked at old gear and went the answer is no get new stuff for anything it was not currently doing.
I had those same vendors tell me their gear did not support running through a tagged vlan, as in no change but moving their uplink
Neither (Score:2)
Neither hackers nor squirrels. Physical attacks have already happened in California. A relative few attacks coordinated to occur simultaneously on multiple power stations would do the trick.
I can't remember where I saw it, but in a story about EMPs the author noted that the components that are used to build the transmission stations are only manufactured by one or two companies overseas. The build time on these components is 3-5 years. They don't have spares sitting around.
What's this "US Infratstucture" Thing ? (Score:2)
What's this "US Infratstucture" Thing you keep talking about? :-)
SCNR
It's worst than we think (Score:2)
Wait until we get squirrel hackers. Then we're in trouble.
Answer: both (Score:5, Insightful)
"The biggest risk is squirrels."
Do these people not understand that these two statements are not contradictory? Does anyone here understand that? The question "who is right" is trivial to answer. Both are.
A cyber attack could be catastrophic, albeit rare. And squirrel outages, due to the comparatively high rate of occurrence combined with the level of damage, are a bigger risk.
Hacker Squirrels! (Score:2)
Imagine that. :O
New law Critical Infrastructure must made in USA / (Score:2)
New law Critical Infrastructure parts must made in USA / other non China places / or at very least have no overseas coders in the mix / full code review with the US GOV.
Better to do it now then later by force of martial law.
Industrial controls are having their "XP Moment" (Score:2)
I work with lots of serial-to-Ethernet stuff, various gateways, etc. in an industry with a lot of old technology. The truth is that the vendors of this stuff make it easy to set up, open access by default, and almost never updated. Patches for known things like ssh vulnerabilities or kernel bugs take months. What often happens is some lowest-bid contractor is hired by the utility company to implement control systems, leaves them wide open and the company has no idea how to secure them.
Remember Windows XP SP
Re: (Score:2)
> serial-to-Ethernet stuff
Haha, I worked at a company whose bread and butter were devices like that... then they got into payment processing as well.
Products were barely cobbled together by people with not enough time or understanding to make a secure system. I left, and they tried to get me back to do some consulting.. I asked em about what kinds of security testing they do... 'well we use openssl'... hahaha ok... sure.. jesus.
Don't even have to read the article to know the (Score:2)
answer is:
VERY at risk.
Like all infrastructure, management and budgeting is done on a by crisis basis.
The rest of the time it is ignored to make the numbers look good and keep the bonuses flowing.
Re: (Score:2)
answer is:
VERY at risk.
Like all infrastructure, management and budgeting is done on a by crisis basis.
The rest of the time it is ignored to make the numbers look good and keep the bonuses flowing.
The correct answer, depending on your perspective, might be:
NOT ENOUGH!
but that'd be foolish. Its already plenty at risk.
Just wondering... (Score:2)
As opposed to what, a lazy one? Do they have motivational away days for the team to get them all fired up?
Re: (Score:2)
"a properly motivated terrorist group"
As opposed to what, a lazy one? Do they have motivational away days for the team to get them all fired up?
Thats what sting operations are for!
Cyber attach the best options for 3d world enemies (Score:2)
There are a good number of countries that wish the US ill will. Few of them have the means for direct military conflict and all are an ocean away. They have very few ways they can directly attack the US, short of a 911-style incident. We are also in economic competition with our "friends". Malicious hacking is one of the few available avenues, with a relatively low barrier to entry. It's also more difficult to prove who launched the attack or even to prove that it wasn't a "rouge individual" versus a gov
Accidentally Some Words (Score:2)
Others are crying FUD [...] are crying FUD.
Slashdot, never change.
If hacking a real risk, wouldn't it have happened? (Score:2)
It's not like the US hasn't had a shitload of enemies for a long time who would have loved to have turned off the lights. They were willing to fly fucking planes into buildings.
Even your basic basement hacker might have an interest in this, if only for the thrill of knowing you were responsible for a blackout.
Even if you argue that major state actors wouldn't do this until they "needed" it at some crisis moment, that doesn't exclude more generic non-state actors interested in more immediate results.
So why
Re: (Score:3)
Mostly because it requires coordination and some special skills. The 9/11 terrorists needed to learn how to fly just enough to hit buildings and that required a number of attackers, good organization, and backing. That doesn't mean that the capability didn't exist for planes to fly into buildings for decades, it just wasn't used.
You will also note that hijackings are not a "thing" like they were in the 70s and 80s. 9/11 was both the worst case scenario, and immediately made hijacking much, much harder af
Re: (Score:2)
I would think that the ability to knock out the grid, or parts of it, would be something that wouldn't have a long shelf life.
Components get replaced, security systems change, the people managing it do stuff differently, accounts get removed/added/changed, patches get installed, operating systems change, etc.
Some remote exploits may allow more durable penetration, but I would bet a fair amount just might expire, making maintaining the capability a long-term prospect involving greater exposure and more risk.
It is not really about America's, but the west (Score:2)
Re: (Score:2)
Re:It will all collapse (Score:5, Insightful)
Re: (Score:2)
What part of Keynesian economics don't you understand?
https://en.wikipedia.org/wiki/Keynesian_economics#Active_fiscal_policy [wikipedia.org]
Re: (Score:3)
If you haven't noticed the financial news today, the US economy is stronger than the world economies because those other idiots choose to cut their budgets and strangle their recovery in the mistaken belief that government spending was bad. In fact, those other idiots are now embracing stimulus.
https://uk.finance.yahoo.com/news/world-stocks-oil-surge-central-125120140.html [yahoo.com]
Re: (Score:2)
The claim that the American economy is stronger than most is obvious bunk.
That's not what The Wall Street Journal is telling me. Since Wall Street is taking a pisser for no obvious reason that's related to the US economy, I've been buying cheap shares of stock that are fundamentally sound.
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
And that they use the same password on all devices if they do use a password.
Re:OMG!!! (Score:5, Informative)
Re: (Score:3)
The only thing keeping terrorism at bay is the technical knowledge necessary to mess with it.
Doesn't take much technical knowledge to cut cables in an underground vault and shoot transformers with a sniper rifle.
http://www.npr.org/sections/thetwo-way/2014/02/05/272015606/sniper-attack-on-calif-power-station-raises-terrorism-fears [npr.org]
Re: (Score:2)
Engineers at power stations are old farts, and they like things a certain way, the old way. PLCs communicate to other machines in the field using ancient serial protocols, proprietary back planes, and discreet data points. As Rockwell and Siemens and etc decide they need to wake up to the real world however they are putting more of their data over ethernet, but security is an afterthought, and there's your problem..
Security is absolutely NOT an afterthought at power stations. At least not in the US. That's simply flat out wrong. And those old fart engineers know what keeps a plant running reliably, they have very good reasons and experience to have things a certain way. A smart noob would do well to ask the old engineer exactly why they like things a certain way. Now, there are always going to be better ways that come along, but they won't come through ignorance of what has been working well for quite some time.
Re:Security in various protocols (Score:2)
[ Vendors ] are designing security into newer protocols...
That's nice... *today*. Well, assuming every protocol someone designs and that someone implements will be free of security flaws... But, "nice today" is not very useful long term.
Imagine, for example, that something is running using Windows XP or a decades old Linux distro. They could have had the best available security when they were built, but they would suck now. A decades old SSH would now be vulnerable.
It seems that historically, sites always end up with some sort of old cruft in existence. As lo
Re: (Score:2)
Re: (Score:2)
They are designing security into newer protocols, I actually worked on something called DNP-3
I'm actually highly sceptical of this approach. I grilled one of Schneider's techs who worked on DNP-3 implementation about their long list of security advisories they published over the past few years. I flat out think that people who don't understand security shouldn't be in the business of designing security.
Give me a control system run over a VPN from a dedicated network / security vendor without any further encryption any day. A direct to internet connected device which is difficult to upgrade firmware
Re: (Score:2)
As someone who has the daily job of making the case for security for my company, I can tell you that its not really laziness. It's an inability to understand and properly assign risk.
Businesses who don't understand risks make poor prioritization decisions.
Most places I have worked at do not complain about security, they just believe they have higher priorities for the time of the various staff and resources we have and don't assign the resources for all of the projects needed. And even I have to admit, it
Re: (Score:2)
Why is it a matter of assigning risk? Why isn't it just part of "Best Practices"?
Because if it's a low risk low impact item then spending money on it is poor prioritization. There are always more needs for resources than there are resources available.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
Russia and China already has that capability to take down the entire US power grid.
What would a successful EMP attack look like? The EMP Commission, in 2008, estimated that within 12 months of a nationwide blackout, up to 90% of the U.S. population could possibly perish from starvation, disease and societal breakdown.
http://www.wsj.com/articles/james-woolsey-and-peter-vincent-pry-the-growing-threat-from-an-emp-attack-1407885281 [wsj.com]
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
A couple of high altitude fairly large nukes would do the job just fine.
No, they would not.
Re: (Score:2)
Re: (Score:2)
https://en.wikipedia.org/wiki/... [wikipedia.org]
Yup, EMPs have been created, nobody is arguing that. Now, where exactly does it say what it takes to take out the entire grid?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Russia and China could simple destroy all US cities with regular bombs, so who cares if they can knock out the power grid with an EMP bomb?
Re: (Score:2)
And yet you ignore cascade failure (Score:2)
As shown a few years ago a simple software bug in an operator room led to a breakup, which led to a cascade failure https://en.wikipedia.org/wiki/... [wikipedia.org] read the sequence of event. You may not even need a big emp, a few well placed C4 charge on important transformer and equipments in the power network may be enough as this above demonstrate.
Re: (Score:2)
Re: (Score:2)
"You can take down a power grid with an EMP bomb."
No need for that. Every year thousands of outages are caused by termites, squirrels, birds, ice rain and drunks in the US and still power cables are nailed to the same wooden posts as 100 years ago.
Re: (Score:2)
Re: (Score:2)
But there is the rub in an effort to do things cheaper they are trying to do things like replace dedicated fiber with DSL and VPN's.
Re: (Score:3, Funny)
Squirrels don't work in groups.
You are so, so very wrong.
The problem is that most people who know that squirrels work in groups are now dead. Very very dead. With Oak trees growing out of their rotting corpses.
Posting anonymously for obvious reasons...
Re:Well, C. Thomas got it wrong. (Score:5, Funny)
Re: (Score:2)
Marines should be used to that.
Re: (Score:2)
They used to but it is cheaper and probably more robust to rely on the Internet for communications paths. Not necessarily better but definitely cheaper.
Re: (Score:2)
Where do you think they get critical security patches from? :)
And in case you don't recall, no one needed to hook up Iran's nuclear facilities to the Internet for Stuxnet to work.
Speaking as someone who had to clean viruses off of floppy disks before the Internet was really a thing, I can tell you that you don't need the Internet to get hacked if someone knows what they are doing and are dedicated to making it happen. The Internet makes remote intrusion and exploits many times more effective than otherwise
Re: (Score:2)
Nahhhhhh. That can't happen. [wikipedia.org] Twice. [wikipedia.org]