Going on 13 years since 9/11...
- Ukraine invaded by Russia seeking to annex Crimea
- Malaysia Airline with 239 aboard missing and still a mystery
- Sochi, suspected hijacker tries to divert plane, F-16s scrambled
- Syria aided by Hezbollah fighters, estimates of more than 150,000 dead
- Iran ships medium range missiles to Hamas in the Gaza Strip
- Iraq Suicide bombing a somewhat regular occurrence
- Pakistan death toll in war on terror estimated at 49,000
- Saudi Arabia concerned about Muslim Brotherhood and
Hezbollah
- Lebanon, twin suicide car bombings in capital
- Egypt, terror attack on tourist bus in Red Sea resort
- Somalia, car bombing at national intelligence headquarters
- North Korea accused by South of "reign of terror"
Where are we in the war on terror--are we really any safer?
All opinions my own.
(Source Photo: Andy Blumenthal)
Showing posts with label Cyber Terrorism. Show all posts
Showing posts with label Cyber Terrorism. Show all posts
March 12, 2014
March 9, 2014
SCADA in Pictures
So SCADA are Supervisory Control and Data Acquisition systems.
They are a form of Industrial Control Systems (ICS) that monitor and control major industrial processes from power generation, transmission, and distribution, to water treatment, chemical production, air traffic control, traffic lights, building controls, and more.
These are part of our nation's critical infrastructure.
In the lab, we are able to use tools to capture and analyze communication packets and edit and re-use them to:
- Turn on and off lights
- Open/close perimeter gates
- Control water and gas pipelines
- And even open and close a bridge
This was very scary!
No one, unauthorized, should be able to do this in real life, in the physical world.
This is a major security vulnerability for our nation:
- SCADA systems should not be openly available online, and instead they should be able to be controlled only either locally or remotely through an encrypted virtual private network (VPN).
- SCADA systems should not be available without proper access controls--there must be credentials for user id and passwords, and even two-step authentication required.
No one but vetted, cleared, authorized, and trained personnel should be able to monitor and control our critical infrastructure--otherwise, we are giving them the keys to disrupt it, destroy it, and use it for terror.
We owe our nation and families better, much better.
(Source Photos from lab: Andy Blumenthal)
SCADA in Pictures
March 8, 2014
Security Is A Joke!
Fascinating video with Dan Tentler on the Shodan Search Engine...which CNN calls the "scariest search engine on the Internet."
The search engine crawls the Internet for servers, webcams, printers, routers, and every type of vulnerable device you can imagine.
It collects information on more than 500 million devices per month and that was as of last year, so it's already probably a lot more.
Tentler shows the unbelievable amounts and type of things you can access with this, including our critical infrastructure for the country --from utilities to traffic lights, and power plants:
- Private webcams
- Bridges
- Freeways
- Data Centers
- Polycoms
- Fuel cells
- Wind farms
- Building controls for lighting, HVAC, door locks, and alarms
- Floor plans
- Power meters
- Heat pump controllers
- Garage doors
- Traffic control systems
- Hydroelectric plants
- Nuclear power plant controls
- Particle accelerators
- MORE!!!!
Aside from getting information on the IP address, description of the devices, locations (just plug the longitude and latitude into Google for a street location), you can often actually control these devices right from YOUR computer!
The information is online, open to the public, and requires no credentials.
- "It's a massive security failure!"
- "Why is this stuff even online?"
Where is our cyber leadership????
>>>Where is the regulation over critical infrastructure?
If there is a heaven for hackers, this is it--shame on us. :-(
Security Is A Joke!
February 22, 2014
National State Of Cyber Insecurity
This video is a wake up call on the state of our national cyber insecurity.
It is the opening statement (about 6 minutes) of Chairman Michael McCaul (R-TX) of the Homeland Security Subcommittee of Oversight, Investigations, and Management.
What he describes is quite grave and every American should listen carefully about the state of our cyber insecurity that poses a real and significant threat to our economy and national security.
We are under attack by cyber criminals, terrorists, and hostile nation states.
Our adversaries seek to and can paralyze our critical infrastructure, steal our intellectual property, conduct espionage, and access our personal and financial information.
The collapse of our military networks, financial system, energy, transportation, and electricity "is not science fiction."
The cyber attacks are "real, stealth, and persistent, and can devastate our nation."
It is "not a matter of if, but when a Cyber Pearl Harbor will occur."
And "we have been fortunate that up until this point that cyber attacks on our country have not caused a cataclysmic event."
I read from the Center for Strategic and International Studies (2011) that cybersecurity has taken a back seat after 9/11 to the War on Terror as well as the economic fight after the recession of 2008, with the result that "the United States is unprepared to defend itself."
Chairman McCaul critically states at the end of his opening statement, "Let's do something meaningful [now] because it is not a tolerable situation!"
National State Of Cyber Insecurity
July 21, 2013
Like Buying A Nuke On The Black Market
Nations and terrorists will pay to find the fatal flaw in computer programs that will enable them to perpetrate everything from subversive cyber spying to potentially massively destructive cyber attacks.
As the world is focused on nuclear non-proliferation, computer weapons are the new nukes--able to do everything from a targeted strike on an organization or agency to taking out vast swaths of our nation's critical infrastructure.
According to the New York Times (13 July 2013), there is a great interest in buying "zero-day exploits"--one where governments or hackers can strike using a computer vulnerability before anyone even knows about it and can correct it.
The average zero-day exploit persists for "312 days--before it is detected"--giving amble time for attackers to cash-in!
Brokers are now working to market the computer flaws for a 15% cut, with some even "collecting royalty fees for every month their flaw is not discovered."
The average flaw "now sells for around $35,000 to $160,000" and some companies that are selling these are even charging an annual $100,000 subscription fee to shop their catalog of computer vulnerabilities in addition to the cost for each one that varies with it's sophistication and the pervasiveness of the operating system behind the exploit.
While governments and terrorists are on the prowl to buy the exploits for offensive purposes, technology companies are competing to purchase them and are offering "bug bounties" in order to identify the flaws and fix them before they are exploited.
We've come a long way from people and organizations buying software with their regular upgrades and patches to nations and hackers buying the knowledge of the flaws--not to patch--but to spy or harm their adversaries.
You can buy the bomb shelter or software patch, but someone else is buying the next more lethal bomb or vulnerability--the question is who will pay more to get the next exploit and when and how will they use it.
(Graphic by Andy Blumenthal adapted from here with attribution for the mushroom cloud photo to Andy Z.)
Like Buying A Nuke On The Black Market
February 23, 2013
Analyzing The Law
Let's just say that at this point, I recognize that the more I know, the more I don't know anything.
The class that I am taking now is Cyberlaw, and while I did take law in business school--many moons ago--that was more focused on contracts and business organizations.
This class looks interesting from the perspective of the legal and regulatory structure to deal with and fight cybercrime, -terrorism, and -war.
One interesting thing that I already learned was a technique for evaluating legal cases called IRAC, which stands for:
- Issues--the underlying legal matters that the case is addressing.
- Rules--what legal precedents can be applied.
- Analysis--whether those rules apply or not, in this case.
- Conclusion--rendering an opinion on the case.
This is a structured way to analyze any legal case.
Of course, before you do these, you have to look at the facts--so that is the very first section.
The problem with that is then you have F-IRAC and that can definitely be taken the wrong way. ;-)
(Source Photo: Andy Blumenthal)
Analyzing The Law
Labels:
Analysis,
Case Studies,
Conclusion,
Cyber Attacks,
Cyber Security,
Cyber Terrorism,
Cybercrime,
Cyberlaw,
Cyberwar,
Information Assurance,
IRAC,
Issues,
Law,
Learning,
Photo,
Precedent,
Rules,
Technique
Subscribe to:
Posts (Atom)