~e; on cyberwar

From human being <human@electronetwork.org>
Date Thu, 24 Apr 2003 23:02:11 -0500



  A one-hour Frontline documentary on Cyberwar was aired
  tonight on public television (PBS) in the US which is set to
  air again, and which also has the whole TV show online at:
  http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/

  It is strange timing, or maybe it is the opposite, for in this
  week's upcoming newsletter is the second in a series of
  high-level resignations in the US cybersecurity force:

White House security adviser resigns // things must be really bad...
White House cybersecurity adviser Howard Schmidt has resigned his post,
becoming the second top government adviser to leave this year.
<http://news.com.com/2100-1009-997840.html?part=dtx&tag=ntop>

  Here are some of the major links to EM content on the site:

---
Vulnerability:
The Power Grid?
full:  
http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/vulnerable/ 
grid.html

"In a potential cyber attack on the U.S., there are experts who believe  
one of the targets could be the country's electric power grid. By  
exploiting vulnerabilities in the control systems utility companies use  
to remotely monitor and manage their operations, U.S. cities could be  
blacked out for extended periods of
time."

Here are excerpts from interviews with Richard Clarke, former White  
House adviser on cyberspace security; O. Sami Saydjari of Cyber Defense  
Agency; Ron Dick, former FBI security expert; James Lewis of the Center  
for Strategic and International Studies;  Michael Skroch of Sandia  
National Laboratories; John Arquilla of the Naval Postgraduate School;  
and John Hamre, former deputy secretary of defense.

---
Vulnerability:
Scada Systems?
http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/vulnerable/ 
scada.html

"Digital control systems, such as SCADA systems, supervise and control  
real-world structures like gas pipelines, oil refineries, and power  
grids -- and they can be manipulated remotely.  That, says experts,  
makes them a potential prime target for terrorist groups who could get  
inside these systems and inflict physical damage on the nation's  
infrastructure. Is the clock ticking on this kind of cyber-based  
threat?"

Here are excerpts from interviews with Tom Longstaff of the CERT  
Research Center; James Lewis of the Center for Strategic and  
International Studies; Joe Weiss of KEMA Consulting; Amit Yoran of  
Symantec;  Michael Skroch of Sandia National Laboratories; and a hacker  
who spoke on condition of anonymity.

---

  What was amazing to hear about are these SCADA (black box) systems,
  which were said to basically be the link between online worlds and the
  potential for offline cyberwar-based effects on Critical  
Infrastructures.

  There has been contention about the issue of the damage that cyber-
  war could bring up in relation to 'physical warfare' of bullets and  
death,
  and this is used by a sector of the defense establishment to discredit
  the threat versus that of the more media friendly and accessible way
  of war: blowing things up, and people seeing and relating to it in some
  tangible way. Versus the, on the whole, intangible connections between
  networks of information and the ability to leverage this as a tool of  
war.

  That it is severely discounted by those in the US Administration is
  beyond troubling, and the high-level resignations, even if it is not a
  'digital Pearl Harbor' scenario, are continuing the traits that lead to
  surprise attacks in the first place. Entirely foolish, as is industry  
if it
  thinks it will escape liability, so too for software companies, in the
  aftermath of losing an entire state's records in one day, all health
  information, all banking transactions, traffic lights do not work, and
  people die from loss of critical systems (in hospitals, accidents in
  cars and transit, weather and communication/emergency-related).

  That SCADA systems run most critical systems, and that a handful
  (5-6) of Operating Systems (OS') run on all these systems, alike, is
  just plain spooky to consider in relation to the fact that they are now
  penetrable, and do open the reservoirs and floodgates, literally. As
  well as high-voltage power switching, likely train and airplane and
  shipping networks, on and on. That this economic impact is not to
  be considered in terms of its social impact, and that _one_attack
  is assumed to be the case, as it seemed in the presentation by
  those who are content with insecure systems, is beyond belief.

  For instance, SCADA systems are unencrypted. An example was
  given of someone sitting outside a powerplant sniffing signals or
  sending a command via wireless. Most of this is automated as it
  seems to be remotely controlled functions for, say, making changes
  from a central station to substations via microwave link. It is likely
  anyone could catch a line-of-site from the top of a building if need
  be. Or, that the signal bends spreads enough over space that it is
  possible to be in the approximate line-of-site to hit the black box
  SCADA controls after gaining access, which is compared to being
  in the superuser position, over hardware, the gear, big nasty stuff.

  How to relate how things are today, in comparison is probably, if
  normal consumer life is to be related, quite similar in that there is
  no strong encryption and every e-mail can be sniffed for data, and
  each computer can easily be overtaken by spam and virii and also
  trojan horses for making attacks, but also data-burglaries in which
  information on one's system, passwords, identity-theft details, can
  be stolen or used, without any protection whatsoever. The entire
  system is insecure, and the encryption used for online banking is
  a reminder that if such systems have been hit in the past, it could
  be an issue of a billion dollars were to vanish in cyberspace, and
  not have that be considered a major problem for the institution and
  also the network. A few ideas on what consumers require today:

  -- Secure dial-up accounts, no rise in pricing due to liability issues.
  -- Secure FTP accounts and chat accounts
  -- Secure websites with insurance
  -- Secure e-mail via PGP over encrypted networks

  Instead what seems to be happening is the opposite of what should
  and that is the transparency is put in the wrong place, on consumers,
  where the zombie computers are harvested, when if these same
  systems were protected they would not be so easily attacked except
  by all but the best cyberwarriors. That would cut the datacrime rate
  down for the stabilization of e-commerce and online services and
  micropayments and such, over time. Instead, all this traffic is in an
  unencrypted state, and routers and other devices (ala Clipper Chip)
  are made to access data from networked connections, which, it is
  important to mention-- can also be accessed by enemies of war,
  basically making a tap on internet communications for anyone with
  the knowledge to do so, and if the security industry is any indication
  of trends, it seems these can be 'hushed' from public knowledge by
  security-through-obscurity, while the problem remains, & the threats.

  A wealth of information is on the site with links above. There is a
  message forum to post comments so the list newsletter info was
  sent there, along with comments about the 'nexus' situation between
  the SCADA black boxes of the 3D world, and the internetwork. It is
  ponderous what could occur given the ubiquity of wireless and wi-
  fi networks in the consumer realm, alone. Where thieves may be
  using sniffers and magnetic card copiers and color laser printers
  rather than crowbars, knives, and guns. Add to this the skills of a
  well-trained and new to the field (with an unknown approach)
  cyberwarriors, led by a general in a concerted multifaceted attack
  on a target, however defined, locally or globally, and the idea of
  security through obscurity does not seem like such a great move
  for regular citizens, or the government. But these days, reason is
  of little use, reaction is at its prime as a mover of the world mantle.

  With SCADA systems, the Critical Infrastructure (EM power, media,
  and large-scaled technological systems) can be compromised. In
  using non-secure operating systems, every home computer can
  be a loaded gun for an invisible visitor, maybe a friendly letter out
  of nowhere, or a spam sent to millions. With electromagnetism in
  the everyday this scales down to most everything computational
  that is connected in a system with some type of control. It may be
  the cyberwar equivalent of the EMP nuclear weapon that can be
  detonated miles above in the atmosphere and destroy everything
  that is electronic below it, for a large radius. In this case, just to  
hit
  the power grid would do that by itself. Think of stealing economies
  and social records in one fell swoop. It sounds possible, probable,
  and reasonable given the state of affairs. One rule of warfare that
  seems applicable here: do not underestimate your opponent. Yet,
  instead, the heads of US national cybersecurity are resigning as
  nothing is changing; nothing has happened, until something does.
  

  the electromagnetic internetwork-list
  electromagnetism / infrastructure / civilization
  archives.openflows.org/electronetwork-l
  http://www.electronetwork.org/list/