SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : The Trump Presidency -- Ignore unavailable to you. Want to Upgrade?


To: Steve Lokness who wrote (85496)7/24/2018 11:01:29 AM
From: Wharf Rat1 Recommendation

Recommended By
Smart_Asset

  Read Replies (3) | Respond to of 364175
 
Russian hackers could switch America’s lights off

They can do lots of things. We can do lots of things. We'll get hurt worse, cuz we lack adequate defensive capabilities, we have more to lose, and we have gotten too fat and soft. We need to keep this a cyber cold war, not a hot one.
This is too long to post the entire article.

“Tell me what doesn’t change dramatically when key cities across half of the US don’t have power for a month.”
Russia's Cyberwar on Ukraine Is a Blueprint For What's to Come - Wired

HOW AN ENTIRE NATION BECAME RUSSIA'S TEST LAB FOR CYBERWAR

The clocks read zero when the lights went out.

It was a Saturday night last December, and Oleksii Yasinsky was sitting on the couch with his wife and teenage son in the living room of their Kiev apartment. The 40-year-old Ukrainian cybersecurity researcher and his family were an hour into Oliver Stone’s film Snowden when their building abruptly lost power.

“The hackers don’t want us to finish the movie,” Yasinsky’s wife joked. She was referring to an event that had occurred a year earlier, a cyberattack that had cut electricity to nearly a quarter-million Ukrainians two days before Christmas in 2015. Yasinsky, a chief forensic analyst at a Kiev digital security firm, didn’t laugh. He looked over at a portable clock on his desk: The time was 00:00. Precisely midnight.

Yasinsky’s television was plugged into a surge protector with a battery backup, so only the flicker of images onscreen lit the room now. The power strip started beeping plaintively. Yasinsky got up and switched it off to save its charge, leaving the room suddenly silent.

He went to the kitchen, pulled out a handful of candles and lit them. Then he stepped to the kitchen window. The thin, sandy-blond engineer looked out on a view of the city as he’d never seen it before: The entire skyline around his apartment building was dark. Only the gray glow of distant lights reflected off the clouded sky, outlining blackened hulks of modern condos and Soviet high-rises.

Noting the precise time and the date, almost exactly a year since the December 2015 grid attack, Yasinsky felt sure that this was no normal blackout. He thought of the cold outside—close to zero degrees Fahrenheit—the slowly sinking temperatures in thousands of homes, and the countdown until dead water pumps led to frozen pipes.

That’s when another paranoid thought began to work its way through his mind: For the past 14 months, Yasinsky had found himself at the center of an enveloping crisis. A growing roster of Ukrainian companies and government agencies had come to him to analyze a plague of cyberattacks that were hitting them in rapid, remorseless succession. A single group of hackers seemed to be behind all of it. Now he couldn’t suppress the sense that those same phantoms, whose fingerprints he had traced for more than a year, had reached back, out through the internet’s ether, into his home.

The Cyber-Cassandras said this would happen. For decades they warned that hackers would soon make the leap beyond purely digital mayhem and start to cause real, physical damage to the world. In 2009, when the NSA’s Stuxnet malware silently accelerated a few hundred Iranian nuclear centrifuges until they destroyed themselves, it seemed to offer a preview of this new era. “This has a whiff of August 1945,” Michael Hayden, former director of the NSA and the CIA, said in a speech. “Somebody just used a new weapon, and this weapon will not be put back in the box.”






Now, in Ukraine, the quintessential cyberwar scenario has come to life. Twice. On separate occasions, invisible saboteurs have turned off the electricity to hundreds of thousands of people. Each blackout lasted a matter of hours, only as long as it took for scrambling engineers to manually switch the power on again. But as proofs of concept, the attacks set a new precedent: In Russia’s shadow, the decades-old nightmare of hackers stopping the gears of modern society has become a reality.

And the blackouts weren’t just isolated attacks. They were part of a digital blitzkrieg that has pummeled Ukraine for the past three years—a sustained cyber­assault unlike any the world has ever seen. A hacker army has systematically undermined practically every sector of Ukraine: media, finance, transportation, military, politics, energy. Wave after wave of intrusions have deleted data, destroyed computers, and in some cases paralyzed organizations’ most basic functions. “You can’t really find a space in Ukraine where there hasn’t been an attack,” says Kenneth Geers, a NATO ambassador who focuses on cybersecurity.

In a public statement in December, Ukraine’s president, Petro Poroshenko, reported that there had been 6,500 cyberattacks on 36 Ukrainian targets in just the previous two months. International cybersecurity analysts have stopped just short of conclusively attributing these attacks to the Kremlin, but Poroshenko didn’t hesitate: Ukraine’s investigations, he said, point to the “direct or indirect involvement of secret services of Russia, which have unleashed a cyberwar against our country.” (The Russian foreign ministry didn’t respond to multiple requests for comment.)...

...What will that next step look like? In the dim back room at ISSP’s lab in Kiev, Yasinsky admits he doesn’t know. Perhaps another blackout. Or maybe a targeted attack on a water facility. “Use your imagination,” he suggests drily.

Behind him the fading afternoon light glows through the blinds, rendering his face a dark silhouette. “Cyberspace is not a target in itself,” Yasinsky says. “It’s a medium.” And that medium connects, in every direction, to the machinery of civilization itself.



To: Steve Lokness who wrote (85496)7/24/2018 11:22:54 AM
From: Bill  Respond to of 364175
 
Let's just hope that our hackers can switch theirs off too.



To: Steve Lokness who wrote (85496)7/24/2018 11:31:23 AM
From: combjelly  Read Replies (2) | Respond to of 364175
 
It isn't just about elections, you know. Stuxnet should have been a wakeup call, even if it originated with Israel and the US and was aimed at Iran. Systems can be compromised. Even ones that aren't connected to the Internet. So an "air gap"(i.e. no direct connection to the Internet) in a network is not guarantee of safety. Getting a person to compromise that security has been the bread and butter of espionage for centuries. They might not even be aware of it. Just that the pretty girl they met at a conference wants them to do it...



To: Steve Lokness who wrote (85496)7/24/2018 5:11:31 PM
From: cosmicforce1 Recommendation

Recommended By
bentway

  Respond to of 364175
 
I hope they implement one safety feature - an on/off switch to the larger internet. Logical security is one thing - but Russians aren't going to tunnel through an air gap. Any nuclear power plant that needs to access the internet to maintain its own integrity would be a bad design flaw. Grid balancing? Well I would hope that any inter-plant communications were highly secure and that alternative analog means were in place as backups. It isn't like load balancing was impossible before the internet. There should be secondary mechanisms. Let's build that before we build a wall to keep agricultural migrant workers out.



To: Steve Lokness who wrote (85496)7/24/2018 6:17:30 PM
From: Wharf Rat  Read Replies (1) | Respond to of 364175
 
"On cyber-security"

It just occurred to me that the EU nations should include cyber-security expenditures as part of their 2% NATO commitment.