PCs Pilfered, Paralyzing Populace 162
Heywood Yabuzof writes "According to this Wired story, thieves in Chile caused traffic to grind to a halt when they decided to steal the computers (15 PCs and 2 servers) that control the traffic lights in Santiago. Funny how everyone worries so much about preventing "evil hackers" from breaking in to systems remotely and causing chaos, and then some burglars just go ahead and steal the critical computers to produce the same (unintended?) results."
i hope for their sake (Score:1, Redundant)
Re:i hope for their sake (Score:1, Funny)
But while stealing the goods, valued at US$90,000, they took their time. According to police reports, these peculiar robbers smoked some cigarettes, ate a snack, and drank a few cups of joe, taking it easy before leaving the scene of the crime.
If only criminals in America were as laid back. Heh.
_
WINDOWS USERS CLICK HERE! [paware.com]
Re:i hope for their sake (Score:4, Informative)
I'd like to clarify a few points, though. Our traffic lights are fully autonomous, but the stolen computers analyze traffic flow via cameras at critical junctions and synchronize the lights from one crossroads to the next.
This works so well that, even when traffic is extremely heavy, cars keep moving along. On most mornings and evenings, if you are going "with the flow" you can drive for miles without getting a red light.
On the subject of security: apart from stealing the alarm system (we thought that was funny, too), they removed heavy cast-iron bars from a window to enter this office. To do this, they had to break down part of the wall. This was obviously a well-planned, well executed heist.
Re:i hope for their sake (Score:1)
Re:i hope for their sake (Score:2)
As for the Mini Coopers, don't forget the sewers. Legend has it that during practice runs, one of the drivers managed to do a complete barrel roll, but they were never ever to do it with the cameras running.
Car people have to watch this movie, although the destruction of the Mini's, a couple of E-Types, and an Aston Martin are a bit painful to watch...
Re:i hope for their sake (Score:1)
Re:i hope for their sake (Score:1)
Patricio Tambolini, subsecretary of transportation, told the local media that drivers should not expect a normal green light until Monday, when things may be straightened out. About half of the 800 derelict traffic lights were operational by Thursday evening, thanks to a backup version of the software that controls the lights, but no word on when the job will be completed.
So yes, they do indeed have a backup, it just takes a while to get it up and running.
Re:i hope for their sake (Score:1)
Re:i hope for their sake (Score:2, Funny)
It's a good thing... (Score:4, Funny)
Re:It's a good thing... (Score:2)
Re:It's a good thing... (Score:5, Informative)
Read the article. The traffic light were able to operate autonomously using builtin timers... What the computer did was ensure synchonization between one crossroads and the next. To make sure that when you get a green light, the lights are also green in the next few crossroads. Timers tend to drift, and hence an centralized system is necessary to keep things in sync.
And presumably the computer system also changes the timings to adapt to the differences in traffic patterns throughout the day (giving longer green periods to those directions where the most traffic is at that time). Nowadays, most city road networks operate very close to their capacity, and even little details such as the exact timing of traffic light are important to keep matters fluid.
Re:It's a good thing... (Score:2)
And it wouldn't even consist of locking the server room, and posting a rent-a-cop. LOL.
Re:It's a good thing... (Score:3, Insightful)
Considering the average over the whole day, and over all roads and streets in the network, it's probably even much lower than that. What's relevant here is peak usage: how overloaded are the main arteries at rush hour?
Re:It's a good thing... (Score:2)
Is it just me, or is there something wrong with this? Hell, I'm sure they haven't stolen our traffic control computers... so what gives? Maybe they have, but there was a coverup? Heh. My solution would solve all this, and a few more problems... and not be some multimillion dollar smartroad project with a 20 year timetable and unbelievable cost overruns.
Which pretty much guarantees no one would ever want anything to do with it.
Re:It's a good thing... (Score:2)
Re:It's a good thing... (Score:2)
Indeed. But there is a difference between long and very long...
As to your second point if you watch the lights at night (I can see them from my bedroom window) they only change when a car comes along.
That works ok only on crossroads where one direction has hardly ever a car. But as soon as higher level of traffic are to be dealt with, the system would also need to find out how many cars there are, and what the overall state of the system is. Computerized traffic control systems are pretty much common in many large cities nowadays, even though they are usually better secured than in this case.
Re:It's a good thing... (Score:1)
If they were doing any sort of analysis, though, I could see why they'd need PC's.
Tim
Re:It's a good thing... (Score:1)
Under the aegis of "traffic calming", successive sets of traffic lights are programmed to turn red. This in a city the size of, say, (Greater) London, but with 5% of the population density.
Needless to say, it doesn't leave many of us very calm :-)
Re:It's a good thing... (Score:1)
I'm not aware of any centrally contolled type systems in the U.S. that would go haywire if central went down, typically they revert to a reasonable coordination scheme according to the time-of-day in the absence of central control.
As for a 555 timer being up to the task, hardly. Traffic lights have been a whole lot more sophisticated than that since at least the early 1930's.
You've gotta love... (Score:3, Funny)
Re:You've gotta love... (Score:1)
Re:You've gotta love... (Score:5, Funny)
"Don't worry, boss, they were all transfered over to the IBM e-server!"
"Oooooh, excellent! Ah, where exactly IS the e-server?"
"Oh, that got stolen."
Re:You've gotta love... (Score:1)
Slow down! (Score:1)
Re:Slow down! (Score:1)
Physical Security (Score:5, Informative)
Re:Physical Security (Score:2, Insightful)
Physical Security (Score:2, Interesting)
Unlike the one in Santiago, this organization was very lucky that none of the hard drives were damaged or taken so there was no loss of working data, only expense and disruption of work. However, the building was sufficiently compartmentalized that they could only clean out a few administrative departments. They were already the model of security and efficiency for their primary charges. None of that is easily threatened by outsiders. However, after that they got religion about backups for even working material.
Fires, roof leaks, or clumsy people near the servers could have a similiar effect.
Re:Physical Security (Score:4, Interesting)
Other very common mistake is leaving a floppy drive set up as the first booting device, or not having password protected BIOS settings.
With e.g. Debian boot floppies [debian.org] or any other mini Linux [uga.edu] and mini Unix [cotse.com] distribution you can just insert a floppy, hit reset and wait a while until you got r00t and do whatever you want (like change the real root password in /etc/shadow on the main partition
to whatever you want).
I'm talking about it, because it's much easier than trying to write a remote exploit, much easier than writing a local exploit and much easier than actually stealing the whole hardware. It's usually also much easier than social engineering.
It wouldn't be even hard to make a floppy which automatically do something to the system (like adding new users and adding them to every group, changing passwords, reading encrypted passwords for later cracking [dircon.co.uk], leaving backdoors, etc.). When you have such a floppy, you only need few seconds to insert it, hit reset, come back after a minute when everything is done, take your floppy and hit reset again.
You can even prepare this floppy in a way, that when everything is done, your files from the floppy are deleted and "shutdown -r" is run. That way even when someone enters the room before you, he'll only find a normally working system with empty floppy in the drive. The chances are that no one will even go there to see what's wrong if the server was down for a minute and now it's OK, especially if it's a lunch brake or something.
Very dangerous and very easy if you can only go near a computer, and if it can boot the system from the floppy. And I've already seen servers without BIOS passwords and those set to boot in order of floppy,cd,hdd. It's very important and often forgotten issue, it's somewhere between physical and non-physical (logical?) security.
Re:Physical Security (Score:1)
Re:Physical Security (Score:2)
Yes, you're right. Sometimes you can even use a backdoor password. I remember that password AMI worked for every AmiBIOS some time ago (extremely stupid idea, once someone knows such a password, every system can be compromised). There's a lot of interesting articles on the Web about cracking BIOS passwords:
A Google search for BIOS Passwords [google.com] gives quite a few hits. Putting your floppy into the drive is the fastest and easiest thing you can do if you have physical access, but it's not the only issue. No one should ever be allowed to be near the important servers, except people responsible for the security.
Somehow off-topic, but speaking about security, I have to recommend one of the best texts about security (mostly about secure programming) I've ever read: Secure Programming for Linux and Unix HOWTO [dwheeler.com] by David A. Wheeler. Great read. And speaking about passwords, it's good to read great publications of Alec Muffett [dircon.co.uk], the author of the famous crack(1) and CrackLib:
It's maybe not very on-topic when speaking about physical security, but it's very important to understand the security as a whole.
Re:Physical Security (Score:3, Informative)
It's really even easier than that, in fact, without a floppy, you can just tell the bootloader (e.g. lilo) to boot with options like "linux init=/bin/sh" or something similar, and after the kernel loads you'll just get a shell.
Re:Physical Security (Score:2)
I haven't thought about it. It's even better, because you can do it on a machine without floppy and CD drive, or without knowing/cracking BIOS password, however you have to do everything manually. But it's easy to e.g. copy /bin/sh to /bin/cracksh with suid root, or even make
a simple remote backdoor.
What's important is that people think they
have hard to guess root password and a secure
system, but with access to reset switch and
keyboard anyone can be root after 10 seconds.
Re:Physical Security (Score:2)
You're right. Of course the security of UNIX doesn't fall down because I can bypass it with direct access to the hardware. The AC said that the standard Unix file permission bits are archaic. They are in fact archaic in a sense of ancient and old-fashioned, but they are not archaic in a sense of no longer current or applicable. They are archaic like the Kant's categorical imperative is.
However there are actually not 9 but 12 bits (set-uid, set-gid and sticky bit, owner read, write and execute, group read, write and execute, and others read, write and execute). This system is very simple and extremely practical, but this is not the end of Unix security mechanisms. You can mount filesystems with different restrictions, you can use additional file attributes of your filesystem, there are POSIX capabilities, etc.
With ACs there's a problem, that you never know if the one who answers is the original AC, or a different one, but I'll ask anyway: What would you change with the Unix (POSIX) security system? I guess that you only said it to start a flame war, but just in case you had anything insightful in mind, I'd like you to say some more details about Unix/Linux security and other models which you prefer, or any suggestions about features you would change or add. It could be very interesting.
I think, however, that when you fully understand Unix, you will appreciate and enjoy this powerful and flexible security model. But, as Henry Spencer once said, "Those who do not understand Unix are condemned to reinvent it, poorly."
Re:Physical Security (Score:1)
Re:Physical Security (Score:3, Informative)
Physical security is just as important as network security.
Although the point you've made here is essentially correct, physical security is actually _more_ important than network security, as without it, any and all additional security features are rendered null and void. Period.
Re:Physical Security (Score:2)
In summary, all the comments being mentioned like locking the bios, making sure it doesn't boot to floppy, etc, is "nice", but all it does is buy you a few extra minutes worth of physical security. And for a serious system, minutes are nothing. If you want physical security for a system, lock the thing in a vault and don't even let your janitors near it.
Nice job to help us waking up. (Score:1)
This is a problem all over the world (Score:5, Interesting)
Well, at least I do.
Anyway, here in Poland there's a problem with people stealing cable. Not cable-tv, but telecommunication cables. Whole neighborhoods here in Warsaw have been cut off from telephony because of stolen inter-exchange cable. Railroad lights have been known to fail because of stolen equipment (this happens way too often). It's twice as bad in Russia, trust me.
Actually, at times, it seems like everything that isn't screwed or welded down in this country (this region) will get stolen. Ah... sucks pretty bad.
Re:This is a problem all over the world (Score:2)
Against that sort of problems i sugest fibre-optics instead of copper cables. Being totally worthless for anything else is one of the great values of fibre over copper cables - a thief can sell the copper in the copper cables, but not the glass in fibre (glass is way too cheap to be worth the trouble).
Re:This is a problem all over the world (Score:2)
I know for a fact (it's happened a few times) that fibreoptic cable will get stolen because thieves don't know any better. There's not actually that much money in cables, so the guys stealing them aren't really sophisticated.
Re:This is a problem all over the world (Score:1)
I'm impressed.
I can understand the alacrity with which the salvage guys came around when the company I worked for back in the early eighties was decommissioning their Burroughs B3700. You could easily have filled a small truck with all the heavy-duty silver cable under the false floor.
I find it a bit hard to appreciate the attraction for glass cable, and I can only admire them if they can make it worthwhile...
Habitat for Humanity (Score:3, Interesting)
Re:Habitat for Humanity (Score:1)
Re:Habitat for Humanity (Score:2)
I'd be pissed off too, but it sucks even worse for the people who need the homes and aren't stealing stuff.
Skill. (Score:2)
Fault tolerance and worst case scenarios (Score:2)
Should have critical path analysis and worse case scenarios inherent in the design of the system as a whole as opposed to individual object security. I.E. don't just spend time securing the machines electronically but also ask what happens if someone boots down the door and steals the machines or if someone leaves the server room door open with a brick (I have once seen this). A more holistic view perhaps.
Re:Fault tolerance and worst case scenarios (Score:2)
Worse: leave the door to the facility open with a brick (to let fresh air into the non-airconditioned building), and in the evening, conveniently leave the brick outside near the door for the next day.
Oh, btw did I mention that it was a glass door?
Re:Fault tolerance and worst case scenarios (Score:2)
I'll grant that this was an invitation to mischief makers.
Hahah (Score:5, Funny)
The worlds most sarcastic criminals, is what we've got here
Re:Hahah (Score:1)
Re:Hahah (Score:1)
Re:Hahah (Score:2)
Stop (Score:1)
ahahaha "stop"... like the light! AHAHAHAHA OH MY GOD I THINK I JUST WET MYSELF!
ahahahhahahaha
Oh. Fuck you, you humorless swine.
Re:Stop (Score:1)
I hope they had a good backup strategy (Score:3, Insightful)
Honestly, how different is this (apart from being more spectacular) from a power spike frying your servers (maybe because of a UPS problem)?
Lesson about crypto (Score:1)
Re:Lesson about crypto? you fuckin fool (Score:2)
rofl (Score:3, Funny)
It's funny shit though:
And my favourite:
ROFL. 10/10 for style. Someone buy these clowns a beer (before they earn themselves a darwin award).
Re:rofl (Score:2)
The judges clearly giving style points for the taking of the alarm system, however there is that automatic 10th point deduction for not turning off the surveilence system.
Back to you Chuck...
Re:rofl (Score:1)
Or it could be the French judge [msnbc.com]... :)
backups backups (Score:2, Insightful)
In this case, they should have at least 2 different sites that runs the traffic light system. Much like hospitals having at least a backup power supply, critical services like this are never to be interrupted.
Imagine if this happens to the air traffic systems, then I'm sure it wouldn't even be funny.
Security through obscurity (Score:1, Insightful)
This just shows the weakness of security through obscurity. Security ends up becoming reactive rather than proactive, so the purpose ends up defeating itself, since you cannot fix holes until something is stolen through the exploitation of those holes.
Re:Security through obscurity (Score:1)
Root (Score:1)
in related news... (Score:2, Funny)
Police say they have absolutely nothing to go on.
3 AM is too late for alliteration (Score:3, Funny)
Preposterous!
Re:3 AM is too late for alliteration (Score:2)
The worst... (Score:3, Funny)
h4ck th3 pl4n37!!! (Score:4, Funny)
Cheers,
IT
Could have been worse (Score:2, Interesting)
Or maybe that wouldn't have been possible -- it's not clear from the article whether the computers controlled the signals in detail or just sent sync signals to otherwise autonomous lights.
Happens with phone copper too (Score:3, Interesting)
Re:Happens with phone copper too (Score:2)
Re:Happens with phone copper too (Score:1)
Re:Happens with phone copper too (Score:2)
It would have been funny if... (Score:3, Funny)
Re:It would have been funny if... (Score:1)
DoS? (Score:2, Funny)
Keep an eye out... (Score:5, Funny)
Not thatfunny... (Score:1)
The reason why everybody fears the hack more then the physical intrusion is because while on risk is a known one(physical) the other is a mystery to the normal person. People fear the unknown more then anything, your normal person knows they could buy a gun get some friends and scout out a place for a few weeks till they rob it, they are taught this from movies
Related Wired Links (Score:1)
Tangential Tidbit (Score:4, Interesting)
I have heard that the US phone companies store the telephone switching computers in carefully unmarked basements of various public buildings in the areas where they are performing switching.
I have also heard that these are typically UNIX systems, and- get this- your phone number represents a series of cd ("cd", as in "change directory") operations into a file tree.
So for example, if your phone number is 547-9510, then information about connecting to you is stored in directory ..../5/4/7/9/5/1/0/
I don't know if any of this is true, but I have heard it from a person who has business knowing such things, and it sounds plausible to me. =^_^=
Reply if you know better. Just a tangential tidbit.
Re:Tangential Tidbit (Score:2)
I have heard that the US phone companies store the telephone switching computers in carefully unmarked basements of various public buildings in the areas where they are performing switching.
This is someimes true; at&t leases space from buildings that doesn't show up on the directory and puts switching equipment there. Outside of the cities, they usually have there own buildings, called COs. Around here, they're typically 2 story brick buildings with no windows, but i have heard of them converting a townhouse.
I have also heard that these are typically UNIX systems, and- get this- your phone number represents a series of cd ("cd", as in "change directory") operations into a file tree.
Nope. It's a custom system written in a C variant.
Re:Tangential Tidbit (Score:1, Informative)
Re:Tangential Tidbit (Score:2)
Re:Tangential Tidbit (Score:2)
But then again...
A slashdot pundit reacts: (Score:1, Funny)
yep (Score:2)
Right, they really need to leave those dashing young hackers alone, and instead pass laws outlawing theft. OH WAIT, THEY ALREADY HAVE.
Just so you all know, this story isn't as ironic as you think it is.
Their backup system should've been what got stolen (Score:1, Funny)
The self-preservation society (Score:1)
<wander target=offtopic>
Reminds me of the story about a woman who was busy giving head to Jim Morrison. After finishing with him, she started to fellate Ray Manzarek. She was about to pleasure Mick Jagger when a Mini screamed through the wall in a shower of bricks and Michael Caine stepped out. He levelled his finger---and his gaze---at her coolly, then said:
"OI! You're only supposed to blow the bloody Doors off!"
Ahem.
Another /. POS Story? (Score:2, Funny)
No one Uses Traffic Lights in Chile or South A (Score:3, Interesting)
I am part Colombian and the rest from New Orleans(go figure). And although I live and grew up in the states I have lived three of my 32 years in South America. AND DRIVEN THROUGH EVERY COUNTRY!
No one uses stoplights. They are a like pretty christmas decorations. If it is read you do
1.the "rolling Stop",
2.haul ass and hope you don't die
3.slow down but go through(most popular)
However, the funniest thing with all the hurrah is. All latin American countries have huge police forces. Chile is no exception. But it makes you wonder if the theives can rob a government building, what about the quality of protection for the regular guy?
Re:No one Uses Traffic Lights in Chile or South A (Score:1)
But it makes you wonder if the theives can rob a government building, what about the quality of protection for the regular guy?
Particularly when traffic is usually controlled by the police themselves. Or is this normal-police vs. traffic police politics?
Oh? (Score:2)
A layer 1 problem (Score:2)
Despite this, all the cool technocrap that comes along gets sent to me and other for review, but the simple things like removing windows, chaning some alarm proceedures, and making entry into the server farm a two token process never get addressed. Instead, they keep pushing the flash stuff, and never do anything about the simple things.
I'll print out the story, and maybe, just possibilly, someone will see that physical security is slightly more important than we've been treating it to date.
Bet you can't post that 5 times fast. (Score:1)
Guess it's obvious (Score:2)
Re:Can you imagine... (Score:1)
Re:heard that (Score:2)
Yes, and that country would be the Netherlands. Only the speed cams weren't stolen, they were demolished.