Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Power United States Hardware

Massive Power Outages In Brazil Caused By Hackers 462

Hugh Pickens writes "CBS reports on 60 minutes that a massive two-day power outage in Brazil's Espirito Santo State affecting more than three million people in 2007, and another, smaller event in three cities north of Rio de Janeiro in January 2005, were perpetrated by hackers manipulating control systems. Former Chief of US National Intelligence Retired Adm. Mike McConnell says that the 'United States is not prepared for such an attack' and believes it could happen in America. 'If I were an attacker and wanted to do strategic damage to the United States, I would either take the cold of winter or the heat of summer,' says McConnell, 'I would probably sack electric power on the US East Coast, maybe the West Coast and attempt to cause a cascading effect.' Congressman Jim Langevin says that US power companies need to be forced to deal with the issue after they told Congress they would take steps to defend their operations but did not follow up. 'They admit that they misled Congress. The private sector has different priorities than we do in providing security. Their bottom line is about profits,' says Langevin. 'We need to change their motivation so that when see vulnerability like this, we can require them to fix it.' McConnell adds that a similar attack to the one in Brazil is poised to take place on US soil and that it may take some horrific event to get the country focused on shoring up cyber security. 'If the power grid was taken off line in the middle of winter and it caused people to suffer and die, that would galvanize the nation. I hope we don't get there.'"
This discussion has been archived. No new comments can be posted.

Massive Power Outages In Brazil Caused By Hackers

Comments Filter:
  • by thenextstevejobs ( 1586847 ) on Sunday November 08, 2009 @08:27PM (#30026922)

    Probably impossible.

    As we all should know by now, impenetrable security doesn't exist. What we should probably have is tighter backup power for essential services and places like hospitals, where local redundancy could help in the face of a remote 'hacker' type attack

    Places where there is a lot of danger for people without electrical power don't need billions spent on the security of their power systems. They need redundancy, generators in their buildings that could be used to keep people alive, batteries, and common sense.

    Oh well, let's spend a bunch of money on fear like we always do.

    • Unsecure infrastructure networks vulnerable to internet based attack.

      Movie at 10.
    • by jeffstar ( 134407 ) on Sunday November 08, 2009 @09:49PM (#30027640) Journal

      there's the attitude: There is always somebody out there smarter than you, and there is always going to be a bug or security vulnerability somewhere in the system.

      There was an interesting blog in the economist magazine pondering what else could be done with the 680 billion the US spends annually on defense.

      While the US has spent a trillion in Iraq the chinese have spent a trillion improving their infrastructure.

      • Re: (Score:3, Interesting)

        by CrazyJim1 ( 809850 ) *
        Are we better off spending money assaulting terrorists where they live, or would we be better if we built more skyscrapers? I think no one knows.
    • Re: (Score:3, Insightful)

      by aaarrrgggh ( 9205 )

      It is easy to say that a data center needs its own source of standby power, but there are a lot of industries where a one minute outage causes a six to twelve-hour restart time, and the margins are far too thin to support the additional generation infrastructure.

      I know a few people putting in multi-megawatt fuel cell systems, but these have the same restart-time problem that the utility grid has, which is ultimately the problem.

      The easiest fix at a utility scale is to increase the amount of spinning reserve

      • Smart grid makes it more exposed to hacking. If we're talking about the ability to manage major appliances such that they can be spread out so that we can put a higher load on the grid without overloading it, imagine if someone broke into that system and did the opposite by synchronizing usage. Coupled with the fact that loads are even higher, it's a perfect storm for melting down parts of the grid which would take a long time to repair. During that time, people who are most vulnerable (the elderly) woul
    • Re: (Score:3, Insightful)

      by PPH ( 736903 )

      So each facility evaluates its energy reliability needs. Some may come to the conclusion that they need higher reliability than what the local utility provides. But today, that's just based on gut feelings. Because there is no reliability or 'uptime' standard to which utilities must adhere. And as a result, there's no marginal price for additional MTBF or grid uptime. So people who think they need better reliability just go out and buy their own genset.

      In some ways, this is analogous to servers. Everyone ca

    • Re: (Score:3, Interesting)

      by sjames ( 1099 )

      Impenetrable security may not exist, but good security and crappy security do exist. We'd rather have good than crappy, but the power companies would rather spend on executive bonuses than on good security.

      We do need improved security on SCADA (like making it REALLY separate from the internet and business LANs), but that's not billions in cost. As you point out, backup power is good.

      More resiliency in the grid is a big one. If the grid has adequate spare capacity it can tolerate a few sudden losses and can

      • Re: (Score:3, Interesting)

        by mlts ( 1038732 ) *

        Maybe it might be for the best to have SCADA controlling systems airgapped, or at the least, if people want reports from the systems, have locked down machines that poll them and then copy the results to another network. You could have two boxes on separate networks that communicate text solely through a serial cable (no PPP or SLIP, just data passed as a stream through the cable from the inside box to the outside one. Perhaps even cut the RX+ and RX- lines going to the inner box for maximum security) to

    • by Grishnakh ( 216268 ) on Sunday November 08, 2009 @11:30PM (#30028358)

      As we all should know by now, impenetrable security doesn't exist.

      Totally impenetrable physical security doesn't exist, but totally impenetrable electronic security most certainly does. It's quite simple to make something completely immune to hacker attacks over the internet: disconnect it from the internet!

      Why the nation's power grid control absolutely needs to be tied into the internet, I have no idea. Maybe someone in the field can enlighten me. But if this is a big concern, it seems like it'd be pretty to eliminate the security threat by not having any control over the power grid exposed to the internet. If someone needs to exercise some control over the system, they have to get in their car and drive to the power plant.

      Of course, this wouldn't prevent someone from sneaking in somehow, but that's a far more remote danger than some hacker on the internet (who could be anywhere in the world, and probably not anywhere near your power plant) gaining access.

    • by cetialphav ( 246516 ) on Monday November 09, 2009 @12:43AM (#30028864)

      As we all should know by now, impenetrable security doesn't exist. What we should probably have is tighter backup power for essential services and places like hospitals, where local redundancy could help in the face of a remote 'hacker' type attack

      Places where there is a lot of danger for people without electrical power don't need billions spent on the security of their power systems. They need redundancy, generators in their buildings that could be used to keep people alive, batteries, and common sense.

      This isn't about impenetrable security. This is about taking basic precautions about known attack vectors. For example, many of these systems are not fail safe so an attacker can actually cause a generator to physically destroy itself. Since these generators are very specialized pieces of equipment, you don't just go to Home Depot and pick up another one.

      It is not enough to protect hospitals, etc. A prolonged loss of power to the northern part of the US in the depths of winter would be devastating. Even with backup power supplies, no one has plans to deal with a month of no electricity.

      This isn't about spending money on fear. It is about naively ignoring a threat and hoping it will never happen. We need to find a way to force utility companies to take these threats seriously and the only way to do that is to have financial penalties for lax security.

    • Re: (Score:3, Insightful)

      It's perfectly possible. It's called an air gap. If you still want centralized control of a remote substation, don't do it over the public internet. That's not as bad as it sounds in terms of costs, because if you're the power company, you already own a completely independent set of cables to said substation. Now the hacker has to get out of his mom's basement and climb a utility pole to hack you.

      Still worried about the possibility of remote hacking from a guy who spent too much time climbing trees in hi
    • Re: (Score:3, Insightful)

      by 1s44c ( 552956 )

      Probably impossible.

      As we all should know by now, impenetrable security doesn't exist.

      Maybe not. But a good first step would be to not connect critical infrastructure to the internet.

    • by mcgrew ( 92797 ) * on Monday November 09, 2009 @10:06AM (#30032052) Homepage Journal

      Oh well, let's spend a bunch of money on fear like we always do.

      Terrorists are the least of out worries here in the midwest US. In the winer we have ice storms, in the spring and summer we have storms and wind. An outage caused by hackers probably wouldn't last lomg here, but when a tornado rips through and destroys every utility pole and the equipment hanging from them, it'll take a while to get back on line.

      When the tornados ripped through here in 2006, [slashdot.org] as I walked through the destruction in search of a hot cup of coffee the next day, the thing I thought most was "If Bin Laden saw this he'd give up. No way could a terrorist do this much damage!"

      The threat is narural events. The danger from terrorists is minimal.

  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Sunday November 08, 2009 @08:28PM (#30026944)
    Comment removed based on user account deletion
    • Re:So... (Score:5, Informative)

      by Peter Mork ( 951443 ) <Peter.Mork@gmail.com> on Sunday November 08, 2009 @09:37PM (#30027542) Homepage
      Every time one of these stories hits the Web, I find that I need to explain how control systems end up connected to the Internet (at least in those cases I've heard of). The control system, itself, is NOT connected to the Internet. However, the HR system ends up getting connected to the Internet so that people can fill out their time-cards, etc. Unfortunately, the HR systems are on the same intranet as the control system. So, once an attacker has subverted the HR system, he/she has access to the control system. The only good solution is to run multiple intranets, but this seems rarely to be the case.
      • Re: (Score:3, Informative)

        by aaarrrgggh ( 9205 )

        Remote access and e-mail notifications more often drive the internet connections we have seen. When facility engineering is out-sourced, it becomes even more complicated, because there is fundamental conflict in the way the contracts are written-- the Owner might require all security go through them, but they don't allow the facility engineers to be on their network.

        Usually you end up with a DSL connection and a "firewall router." Usually it is just a monitoring network, but control seems to creep in more

  • by Bananatree3 ( 872975 ) on Sunday November 08, 2009 @08:29PM (#30026952)

    "Congressman Jim Langevin says that US power companies need to be forced to deal with the issue after they told Congress they would take steps to defend their operations but did not follow up. 'They admit that they misled Congress. The private sector has different priorities than we do in providing security. Their bottom line is about profits..."

    Exactly right, this is a capitalist society, ran on making money. If they won't integrate safety systems to protect the system properly from hacker attacks, hit them in the wallet, hard. Pass sound regulation to force them to implement safeguards, require inspections/audits that they are done, not just take their BS word for it. If all they give you is hot air and no implementation, fine them millions of dollars, and on a regular basis if needbe til they implement it.

    • Re: (Score:2, Insightful)

      by stagg ( 1606187 )
      But how much energy can congress really expect them to expend defending against imagined threats?
      • Re: (Score:2, Insightful)

        by HangingChad ( 677530 )

        But how much energy can congress really expect them to expend defending against imagined threats?

        There's nothing imagined about any of these threats. They are very, very real. What we know about is scary enough, what we may yet learn could be truly frightening. Maybe you caught that little part in the story where the military is having some of their computer chips made overseas. I wonder how much money you'd think it would be worth to stop four of five of our own Predators and Reapers from bombing US

      • You spend the money in such a way as to make the system generally more robust, not just against terrorist attacks, but also against acts of nature, disgruntled employees, criminal extortion, and sheer human idiocy.

        A lot of US infrastructure has been desperately vulnerable for years. How many terrorists would it take to black out fifty million people in North America? Apparently zero.

        Remember the Northeast Blackout of 2003 [wikipedia.org] ?
        If the reporting was accurate, that affected 55 million people across eight US s

    • Re: (Score:3, Interesting)

      by cjfs ( 1253208 )

      Exactly right, this is a capitalist society, ran on making money. If they won't integrate safety systems to protect the system properly from hacker attacks, hit them in the wallet, hard.

      This is the fundamental point. Those with the ability to secure the system need to be the ones paying for breeches. Bruce Schneier had several good articles around this point. The main example being banks/credit card companies paying for fraud. If they could just push that onto the customer, there would be far more instances of fraud. Instead, they take responsibility for the whole system and customers are far better off for it.

      • Re: (Score:3, Interesting)

        by maxume ( 22995 )

        Credit card companies push the consequences of fraud onto stores and such. Those stores that choose to accept credit card payments factor the risk of fraud into the prices they charge. The credit card companies do attempt to protect their customers from fraud, but only because they wouldn't make any money if they didn't have any members (they also work with stores to prevent fraud, as they figure it will lead to clearing more transactions).

        The credit card companies certainly don't pay for fraud though.

      • breeches[brich-iz]

        -noun (used with a plural verb)
        1. Also called knee breeches. knee-length trousers, often having ornamental buckles or elaborate decoration at or near the bottoms, commonly worn by men and boys in the 17th, 18th, and early 19th centuries.
        2. riding breeches.
        3. Informal. trousers.
        --Idiom
        4. too big for one's breeches, asserting oneself beyond one's authority or ability.

    • Comment removed based on user account deletion
    • Re: (Score:2, Funny)

      by inhuman_4 ( 1294516 )

      Thats crazy talk. Here is the solution:

      1) It's government regulation that is the problem. If the government would just loosen the regulations a little the power companies would be able to make more money. Then they could spend that money on other things like security, safety, and protecting the environment.

      2) We should allow power companies to join the RIAA. Once hackers know they will face life imprisonment for copy right infringement, they will too scared to do anything. While we are at it, why not just g

  • Internets... (Score:5, Insightful)

    by Shadyman ( 939863 ) on Sunday November 08, 2009 @08:35PM (#30027020) Homepage
    Things like this make me wonder why mission- and life-critical systems are (presumably) set up on Internet-facing systems. Sure, it's cheap, but when the walls come tumbling down like this article implies, cost is a moot point.

    I don't see why they can't just buy a phone line for each power station and link to central stations (also with NON-Internet-facing systems) like that.
    • by selven ( 1556643 )

      That's not the worst. There are stories of medical systems running Windows, connected to the internet, and shutting down at one point because of an autorestart from Windows Update.

  • Security (Score:5, Interesting)

    by Renraku ( 518261 ) on Sunday November 08, 2009 @08:35PM (#30027028) Homepage

    Most systems here in the US are only secure because they're obscure. Someone who has worked in the industry for more than about a year has enough knowledge to cause some widespread destruction. Up until recently, the emergency broadcast service was only a phone number and modem, with no authentication!

    • No Security (Score:5, Interesting)

      by Anonymous Coward on Sunday November 08, 2009 @09:24PM (#30027440)

      Up until recently, the emergency broadcast service was only a phone number and modem, with no authentication!

      The CATV company I work for had a crazy insecure ebs system. It was these ancient boxes in the head ends that just watched for a carrier on a certain freq in the return path. Once it saw any carrier it would flip over the EBS system and all the audio on our analog channels would go down. This carrier came from another dumb box that was in the main head end. That box was triggered by a unsecured phone line and all you needed to do was know the number to it. All anyone needed to spam 250K customers was a telephone.

      The whole system looked like it was built by some ham radio op with parts from RadioShack in the 1980's.

      We only got rid of this system LAST YEAR after some prankster with a signal generator figgered out how to trigger one of the dumb boxes. We now have a new system with scrolling text across the screen and clear audio... though I wouldn't be surprised if it was just as half assed as the old system.

      Im posting this AC because coworkers know my /. nick :)

    • by barik ( 160226 )

      I concur. Airports are the same way, and still this way. Many are running standard PLCs like Allen-Bradley or Modicon. They are connected directly to a modem line with no authentication. So grab yourself a copy of RSLogix or Unity Pro, dial into these places, and have fun modifying the ladder logic and wreak havoc on the airport as all bags get re-routed to who knows where. I've seen the same issues with power plants and water treatment facilities.

      The only upside is that the modem line isn't hooked up all t

      • Re: (Score:3, Funny)

        by Falconhell ( 1289630 )

        wreak havoc on the airport as all bags get re-routed to who knows where.

        Is that not standard airline practice?

        Hell the bags might end up at the right place for once.....

    • by cptdondo ( 59460 )

      Most of the systems are controlled by PLCs. Most PLCs to this day have no access control whatsoever. Some of the attempts at "security" I've heard for PLCs are salesguy technobabble. (The password is stored on the PC being used to access the PLC; the PLC retrieves the password FROM THE PC in order to verify the validity of the user. No shit, this is what a major vendor told me.)

      A kid with a laptop with the right software, a modem, and knowledge of a few phone numbers could take out significant infrastru

      • by Renraku ( 518261 )

        A kid with a length of chain and a potato gun could also take out some significant infrastructure in the power industry. Physical security is important as well.

        • Re: (Score:3, Funny)

          by cptdondo ( 59460 )

          Hehe... Back when I was in the Air Force, we had a squirrel shut down the entire base for 8 hours. S/he crawled into the main power station, and committed suicide across the breakers, blowing up a good chunk of the station and about 100' of main feeder line.

          Today no doubt the press would have whipped up frenzy about a "possible terrorist attack" with artistic renderings of the squirrel in mufti....

  • Nostalgia (Score:3, Insightful)

    by stagg ( 1606187 ) on Sunday November 08, 2009 @08:37PM (#30027040)
    Awfully reminiscent of the hysteria that took place in the 80s, when the FBI and media were convinced that hackers were going to "crash the grid," launch a nuclear attack or god knows what other heinous crimes. The cost to the freedom of their own citizens, and the financial expenditure on all of this hysteria seems awfully prohibitive compared to the actual risk.
    • Re: (Score:3, Interesting)

      by Telvin_3d ( 855514 )

      The cost to the freedom of their own citizens, and the financial expenditure on all of this hysteria seems awfully prohibitive compared to the actual risk.

      To be fair, almost no amount of prevention could begin to equal the cost of a truly major event like a significant amount of the US power grid being down for more than a brief flicker.

  • by Nefarious Wheel ( 628136 ) on Sunday November 08, 2009 @08:41PM (#30027086) Journal

    I work for a company involved in SCADA systems that control half of Australia's water supply and a fair bit of the country's power grid.

    SCADA networks have evolved, out of convenience, to coexist with existing LANS and thus progressively have become more dependent on TCP/IP protocols, thus becoming (rather by default) Internet-enabled.

    Vulnerabilities are to some degree covered by the RTU programming, which has built in safeguards against doing wrong things. But it's not impossible for a dedicated hacker to create a bit of havoc, and this point is not lost on our client base. Our clients are actively investing now to isolate SCADA networks from the Internet, because safety has to overrule operational convenience. Work is going on now, and the door is fast closing on this avenue of attack.

    It's all about SCADA. Little intelligent valves in little steel boxes attached to a lot of industrial plant. It's automation, true, but there are rather a lot of eyes watching it.

    • most of the control protocols have no authentication built into them either, in fact none of the ones i've worked with. maybe the newer ones do?

      • by barik ( 160226 )

        I'm not aware of any that do? Off the top of my head I can think of CIP, Modbus, Ethernet/IP, Profibus, ProfiNET, DeviceNet, and CANOpen and none of these have any authentication. At best, some of these like CIP have security through obscurity, but others like Modbus are completely known specifications.

    • hey, while you're spending money to do that, why not also spend the small chump change it would take to harden our grid against EMP and geomagnetic disturbances?

    • Re: (Score:3, Insightful)

      by twostix ( 1277166 )

      Then again I could just take my $2000 plasma cutter, $500 generator and $6000 hilux and head up into the mountains and take down three or four high voltage towers and kill power to about 8 million people for a week or more and be home before nightfall. Just in time to laugh at all of you while you scream in hysteria demanding quadzillions be spent on protecting over hyped "attack vectors".

      Talk about not seeing the forest for the trees...

      But as long as it's protected by fancy sounding acronyms it appears th

  • by DoofusOfDeath ( 636671 ) on Sunday November 08, 2009 @09:03PM (#30027260)

    'If the power grid was taken off line in the middle of winter and it caused people to suffer and die, that would galvanize the nation. I hope we don't get there.

    If 9/11 was any indication, our national response would be characterized by...

    • NSA snooping into all of our computers, and "state secrets" claimed whenever we tried to invoke the 4th Amendment in court.
    • A few massive, no-bid contracts by the Federal Government which achieve almost nothing of value.
    • RIAA/MPAA sleezeballs capitalizing on it in ways I don't even want to contemplate.
    • Possibly an insane (think Sarbanes-Oxley) amount of red tape added to many computer installations in the country.
    • Republicans and Democrats somehow finding a way to blame each other for this, deadlocking the Legislature for a while, and then in some kind of last-minute spasm, pass an appaling bill to just have the appearance of doing something.

    Only in my wildest fantasies would such an attack mobilize the country to have a rational, balanced cyber-security posture.

    • by lennier ( 44736 ) on Sunday November 08, 2009 @10:43PM (#30028008) Homepage

      "RIAA/MPAA sleezeballs capitalizing on it in ways I don't even want to contemplate."

      When you install photoelectric panels, you're BURNING our fossil fuel industry!

      Passive home heating is like passive smoking: IT KILLS! Insist on genuine 2000 Megawatt active air conditioning from a certified generation station.

      You wouldn't steal a car... so why build a windmill? Just because all your friends are doing it doesn't make it right!

      Firewood is BOLSHEVISM!

  • by 0WaitState ( 231806 ) on Sunday November 08, 2009 @09:11PM (#30027342)
    'If the power grid was taken off line in the middle of winter and it caused people to suffer and die, that would galvanize the nation

    So the enron-organized power embargo hitting california in the summer of 2001 is now being recognized as terrorism? The central valley and inland empire areas hit 100+ degrees most summer days. Wonder how many elderly died, or had their lifespans shortened due to heat stress during the rolling power outages.

  • Naive Population (Score:3, Insightful)

    by spyder-implee ( 864295 ) on Sunday November 08, 2009 @09:16PM (#30027370)
    You are extremely Naive if you believe this garbage. Blaming bandits for the shortcomings of the government is one of the oldest tricks in the book.
    • Re: (Score:3, Insightful)

      by upside ( 574799 )

      The government is just a corporate sock puppet, and blaming the government is one of the oldest tricks in the corporate handbook.

      1) Lobby for deregulation
      2) Profit
      3) Shit hits the fan
      4) Blame the goverment
      5) GOTO 1

  • Obviously the evil terrorist hackers would have to attack the electricity distribution via the control centres on the internerd, the power companies long ago stipulated that all pylons and power poles be made of adamantium and be guarded 24/7 so there is no feasible way to attack the wires strung all over the fricken country.

  • for some kind Hollywood-style heist underway?
  • Liberals (Score:5, Funny)

    by similar_name ( 1164087 ) on Sunday November 08, 2009 @09:33PM (#30027506)
    More liberal regulation. Doesn't everyone know that capitalism is best for us? Those that control the energy industry seek money and that in America is a worthwhile goal in and of itself. Money fixes everything. After all our money says 'In God We Trust'. It's practically blessed. The golden calf is god.

    I haven't been modded troll or flamebait in a long time, just thought I'd try it out.
  • Reading this article, I was thinking this security guy is exaggerating and playing down at the same time.

    First of all, in the U.S. many companies use so much crap when it comes to IT that it makes me sick, so everything is possible. However, I think it is much more probable many systems will blow up on a large scale without any malice involved, but just due to incompetence and negligence.

    At the same time this guy admits the U.S. is actively preparing and maybe even conducting cyber-warfare against other cou

  • From Experience (Score:4, Informative)

    by Anonymous Coward on Sunday November 08, 2009 @10:06PM (#30027778)

    Having worked at a utility in an IT consulting position I've had some experience supporting/implementing the control systems for a reasonably large scale SCADA system.

    What I've come across is the people running/maintaining the SCADA system often don't have a Security/IT background, they have an electrical engineering or similar background. This can often make discussions about firewalls - TCP/IP and routing challenging. On top of this, most of the guys (and it is guys) involved are older, engineering types with the culture and communication differences that that implies. They are often very reluctant to let IT in to their systems to assist. Workstations/servers are often not visible to standard IT management processes like patch management and antivirus because of inter-group politics.

    We run into the classic security vs. usability argument. More security often makes it more difficult for them to do their job (at least for them) and is also much harder to implement, maintain and troubleshoot.

    A lot of systems have historically been serial and have migrated over to IP gradually. This has often been done without adequate planning and analysis, resulting in a system that is deemed successful because it works, not because it is secure.

    Money as always is a factor. I know for a fact the enhanced security version of the SCADA solution was NOT installed, as it was too hard and too expensive and as a result was put off until later.

    In our case, all the devices and RTUs out there come in over a private network, NOT the internet. This traffic is in the process of being encrypted with IPSEC. The weak point is and will always be the client devices or terminals. Remote access to these is the achilles heel of any system. Having such systems completely separate should be a requirement, but is often put aside in the name of usability for workers to get access from home, or the ability to access the internet from the control PC.

    The requirements for criticial infrastructure exists and has done for some time, ISO27002 and NERC have a huge number of requirements. Good luck finding a utility that complies with all of them.

    A horrific incident may be the catalyst to have changes made. But in the meantime it's down to money, silos and politics.

  • by swb ( 14022 ) on Sunday November 08, 2009 @10:25PM (#30027900)

    ...it been taken out in the U.S.?

    If there's a dozen guys pissed off and zealous/brave/willing/stupid enough to hijack planes and fly them into buildings, surely there's 100s more pissed off guys with m@d sk1llz who could do this, and wouldn't be held back because it's not a suicide mission, and doesn't directly burn thousands to death in an ensuing fire and crash.

    And I'd wager that hacking the power system is probably a decidedly less resource-intensive activity than even small-scale physical attacks (bomb/gun/kidnapping/etc), the participants can engage in almost total anonymity, and there's no messy explosives/weapons to buy or store or get caught with. All this means its something that even a lone crank could pull off, opening the doors to a whole panoply of groups with gripes, including or especially all manner of domestic crackpots. You don't need Al Quaalude or zillions of dollars or a complex intelligence network.

    Forcing the grid offline and in a way that kept it down/brain damaged for any length of time over 48-72 hours, especially if it was widespread, would have such a cascading effect and probably spawn anarchy. At a minimum billions lost, thousands killed, possibly riots or widespread civil disorder. Katrina times 9/11. So the effect would be substantial and easily deniable, making it the kind of thing China or Russia or any other competitive major power might want to do just to fuck with the Americans and keep them off balance.

    Yet it hasn't happened here or Western Europe or most modern Asian countries. Why?

    • by cptdondo ( 59460 ) on Monday November 09, 2009 @12:17AM (#30028676) Journal

      >

      Yet it hasn't happened here or Western Europe or most modern Asian countries. Why?

      Well, at least where I work, we no longer allow modems to be attached to any equipment. This is a huge cost item; that means we have to fly in a tech with a laptop for several thousand dollars when something goes down instead of allowing the factory to dial in on their modem.

      We choose to do this as we are a "major" target - a medium sized public utility. I would guess many of the smaller utilities don't have the resources to do this. So it's a question of targets; if someone was to study the network, they could identify a weak small utility that could bring down a larger utility that would then cascade to a major failure down the line. I'd guess it hasn't happened because the outcome is uncertain and not guaranteed; our operators are pretty damn good at taking care of upstream failures.

    • Re: (Score:3, Interesting)

      by VShael ( 62735 )

      Yet it hasn't happened here or Western Europe or most modern Asian countries. Why?

      Because the enemies you keep hearing about, are neither as a numerous nor as powerful as your government would like you to believe.

      It suits the agenda of those in power, to have a public who are so shit-scared about terrorists, that they will accept any indignity, any intrusion into their lives, any loss of freedom... just to make the terrorism fear go away.

  • by Tweezer ( 83980 ) on Sunday November 08, 2009 @10:34PM (#30027954)

    I know all the comments are about to come flooding in that these systems should be air gapped from the Internet, but that isn't practical in today's environment. These systems need to be indirectly connected to the corporate networks, because the data is valuable to the companies. Much of this is due to deregulation. Since deregulation electric utilities no longer operate as islands with their own generation, transmission and customers. Since nobody liked monopolies in the energy industry, the pieces aren't necessarily owned by the same companies anymore. Energy is also bought and sold in a market environment with prices changing all the time and the information is exchanged over the Internet. If you want to see the current Megawatt Hour (MWh) prices in the midwest check out http://www.midwestiso.org/page/LMP+Contour+Map+(EOR) [midwestiso.org]. Needless to say air gapping isn't practical in today's environment.

  • by Anonymous Coward on Sunday November 08, 2009 @10:38PM (#30027976)

    just because the hacker didn't have an UPS...

  • by Eil ( 82413 ) on Sunday November 08, 2009 @10:45PM (#30028028) Homepage Journal

    'If I were an attacker and wanted to do strategic damage to the United States, I would either take the cold of winter or the heat of summer,' says McConnell, 'I would probably sack electric power on the US East Coast, maybe the West Coast and attempt to cause a cascading effect.'

    Oh yeah, well if I were an attacker, I would build a gravity weapon so powerful that it would pull the moon out of its orbit and crash it into the earth.

    OR I would create a poison so potent that just a few drops of it in any lake would kill everyone within a 5-mile radius.

    OR I would plant thermonuclear bombs in the capitals of the 10 largest cities in the U.S. and detonate them all at once.

    See, Mike McConnell? It's easy to invent terrorist movie plots [schneier.com]. If they gave out awards for Most Creative Terrorist Strategies That Would Never Work, you all all of your three-letter agencies would win first prize every time.

  • by kilodelta ( 843627 ) on Sunday November 08, 2009 @10:51PM (#30028068) Homepage
    The SCADA systems. Some genius decided to write a TCP/IP stack for SCADA and then put an ethernet port on the damned things. And what did the utility companies do but hook em' up to an IP network. Not very smart.
  • Obvious solution (Score:3, Insightful)

    by Mr. Freeman ( 933986 ) on Sunday November 08, 2009 @11:16PM (#30028252)
    "We need to change their motivation so that when see vulnerability like this, we can require them to fix it.'"

    Why the hell is this so hard to figure out? Hold cooperation responsible for the negative effects caused by their negligence. Power going out because a skilled hacker found an exploit that the best security experts couldn't find is one thing. But power going out because the IT dept. at the power company decided that they didn't need to take basic security measures is another, that's negligance.

    If people die because the power went out and the power went out due to negligence (i.e. some 15 year old managed to ssh into the power plant and fuck everything up because the root password was "password") then charge the company with criminally negligent homicide.

    We don't need some special, new incentive to get companies to protect the public interest. We just need to remove all of the immunity we've given the companies. The only question we have to answer here is why the fuck did we give companies immunity from the consequences of their actions?
  • by jorlando ( 145683 ) on Monday November 09, 2009 @12:32AM (#30028776)

    The blackout in 2005 was a human failure. One transmission line went down, the team recovering that line made a mistake and instead of activating the repaired line disabled the backup line. Result: 3 states withou electric power.

    The blackout in 2007 was due a circuit breaker shutting down one line, the same happening after in the backup line, that could manage the excess load (this happened during peak hours, 5 p.m. during a working day).

    Ok, these are official explanations and the blackouts may have been caused by evil hackers but, in this case, the brazilian government made an excelent job holding that information for years, leaking now thanks to an american former military that may have some vested interest spreading fear.

    2 cents..

  • cyber bullshit .. (Score:3, Insightful)

    by viralMeme ( 1461143 ) on Monday November 09, 2009 @11:55AM (#30033662)
    There is little hard evidence in the 'report' as to what caused these outages in Brazil. And given that since at least 2003 [wikipedia.org], the US administration has been well aware of the dangers of putting control equipment on the Internet, why are they still doing it? This whole cyberscare story is yet another pretext for getting more funding.

    Authorities blame human error for Jan.1 blackout - Brazil [bnamericas.com]

    A power cut .. was caused by a combination of technical and human error .. when two of the four lines running from the Cachoeira Paulista substation - between Sao Paulo and Minas Gerais states - to Rio de Janeiro failed. A third line was switched off because of the low consumption on what was a public holiday, and the system operator accidentally disconnected the fourth line

One man's constant is another man's variable. -- A.J. Perlis

Working...